diff --git a/.gitignore b/.gitignore index d7f340fc9b51..dba6c1b60ee3 100644 --- a/.gitignore +++ b/.gitignore @@ -31,3 +31,6 @@ vendor/github.com/prometheus/procfs/fixtures/26231/exe /openshift-tests /disruption /update-tls-artifacts + +.claude/*.local.json + diff --git a/cmd/openshift-tests/openshift-tests.go b/cmd/openshift-tests/openshift-tests.go index 761d7bfe93aa..165d8a99663d 100644 --- a/cmd/openshift-tests/openshift-tests.go +++ b/cmd/openshift-tests/openshift-tests.go @@ -23,6 +23,7 @@ import ( "github.com/openshift/origin/pkg/cmd/openshift-tests/dev" "github.com/openshift/origin/pkg/cmd/openshift-tests/disruption" e2e_analysis "github.com/openshift/origin/pkg/cmd/openshift-tests/e2e-analysis" + "github.com/openshift/origin/pkg/cmd/openshift-tests/generate" "github.com/openshift/origin/pkg/cmd/openshift-tests/images" "github.com/openshift/origin/pkg/cmd/openshift-tests/list" "github.com/openshift/origin/pkg/cmd/openshift-tests/monitor" @@ -105,6 +106,7 @@ func main() { timeline.NewTimelineCommand(ioStreams), run_disruption.NewRunInClusterDisruptionMonitorCommand(ioStreams), collectdiskcertificates.NewRunCollectDiskCertificatesCommand(ioStreams), + generate.NewGenerateCommand(ioStreams), versioncmd.NewVersionCommand(ioStreams), ) diff --git a/go.mod b/go.mod index 73e48b9118fd..565905aecc97 100644 --- a/go.mod +++ b/go.mod @@ -3,6 +3,7 @@ module github.com/openshift/origin go 1.24.0 require ( + cloud.google.com/go/bigquery v1.69.0 cloud.google.com/go/storage v1.56.0 github.com/Azure/azure-sdk-for-go v68.0.0+incompatible github.com/Azure/azure-sdk-for-go/sdk/azcore v1.18.1 @@ -164,6 +165,7 @@ require ( github.com/ProtonMail/go-crypto v1.1.6 // indirect github.com/ajstarks/svgo v0.0.0-20211024235047-1546f124cd8b // indirect github.com/antlr4-go/antlr/v4 v4.13.0 // indirect + github.com/apache/arrow/go/v15 v15.0.2 // indirect github.com/apparentlymart/go-textseg/v15 v15.0.0 // indirect github.com/armon/circbuf v0.0.0-20190214190532-5111143e8da2 // indirect github.com/asaskevich/govalidator v0.0.0-20230301143203-a9d515a09cc2 // indirect @@ -226,6 +228,7 @@ require ( github.com/go-playground/validator/v10 v10.26.0 // indirect github.com/go-task/slim-sprig/v3 v3.0.0 // indirect github.com/gocarina/gocsv v0.0.0-20231116093920-b87c2d0e983a // indirect + github.com/goccy/go-json v0.10.2 // indirect github.com/godbus/dbus/v5 v5.1.0 // indirect github.com/gofrs/uuid v4.4.0+incompatible // indirect github.com/gogo/protobuf v1.3.2 // indirect @@ -235,6 +238,7 @@ require ( github.com/google/btree v1.1.3 // indirect github.com/google/cadvisor v0.52.1 // indirect github.com/google/cel-go v0.26.0 // indirect + github.com/google/flatbuffers v23.5.26+incompatible // indirect github.com/google/gopacket v1.1.19 // indirect github.com/google/goterm v0.0.0-20190703233501-fc88cf888a3f // indirect github.com/google/pprof v0.0.0-20241210010833-40e02aabc2ad // indirect @@ -264,6 +268,7 @@ require ( github.com/karrick/godirwalk v1.17.0 // indirect github.com/kevinburke/ssh_config v1.2.0 // indirect github.com/klauspost/compress v1.18.0 // indirect + github.com/klauspost/cpuid/v2 v2.2.5 // indirect github.com/kylelemons/godebug v1.1.0 // indirect github.com/leodido/go-urn v1.4.0 // indirect github.com/lestrrat-go/jspointer v0.0.0-20181205001929-82fadba7561c // indirect @@ -315,6 +320,7 @@ require ( github.com/opentracing/opentracing-go v1.2.0 // indirect github.com/pelletier/go-toml v1.9.5 // indirect github.com/peterbourgon/diskv v2.0.1+incompatible // indirect + github.com/pierrec/lz4/v4 v4.1.18 // indirect github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c // indirect github.com/pkg/profile v1.7.0 // indirect github.com/planetscale/vtprotobuf v0.6.1-0.20240319094008-0393e58bdf10 // indirect @@ -344,6 +350,7 @@ require ( github.com/xlab/treeprint v1.2.0 // indirect github.com/zclconf/go-cty v1.16.2 // indirect github.com/zeebo/errs v1.4.0 // indirect + github.com/zeebo/xxh3 v1.0.2 // indirect go.etcd.io/bbolt v1.4.2 // indirect go.etcd.io/etcd/pkg/v3 v3.6.4 // indirect go.etcd.io/etcd/server/v3 v3.6.4 // indirect @@ -375,6 +382,7 @@ require ( golang.org/x/text v0.29.0 // indirect golang.org/x/time v0.12.0 // indirect golang.org/x/tools v0.36.0 // indirect + golang.org/x/xerrors v0.0.0-20240903120638-7835f813f4da // indirect gomodules.xyz/jsonpatch/v2 v2.4.0 // indirect google.golang.org/genproto v0.0.0-20250603155806-513f23925822 // indirect google.golang.org/genproto/googleapis/api v0.0.0-20250818200422-3122310a409c // indirect diff --git a/go.sum b/go.sum index b3814979cfc8..5ff2d7630c7c 100644 --- a/go.sum +++ b/go.sum @@ -34,8 +34,12 @@ cloud.google.com/go/bigquery v1.4.0/go.mod h1:S8dzgnTigyfTmLBfrtrhyYhwRxG72rYxvf cloud.google.com/go/bigquery v1.5.0/go.mod h1:snEHRnqQbz117VIFhE8bmtwIDY80NLUZUMb4Nv6dBIg= cloud.google.com/go/bigquery v1.7.0/go.mod h1://okPTzCYNXSlb24MZs83e2Do+h+VXtc4gLoIoXIAPc= cloud.google.com/go/bigquery v1.8.0/go.mod h1:J5hqkt3O0uAFnINi6JXValWIb1v0goeZM77hZzJN/fQ= +cloud.google.com/go/bigquery v1.69.0 h1:rZvHnjSUs5sHK3F9awiuFk2PeOaB8suqNuim21GbaTc= +cloud.google.com/go/bigquery v1.69.0/go.mod h1:TdGLquA3h/mGg+McX+GsqG9afAzTAcldMjqhdjHTLew= cloud.google.com/go/compute/metadata v0.8.0 h1:HxMRIbao8w17ZX6wBnjhcDkW6lTFpgcaobyVfZWqRLA= cloud.google.com/go/compute/metadata v0.8.0/go.mod h1:sYOGTp851OV9bOFJ9CH7elVvyzopvWQFNNghtDQ/Biw= +cloud.google.com/go/datacatalog v1.26.0 h1:eFgygb3DTufTWWUB8ARk+dSuXz+aefNJXTlkWlQcWwE= +cloud.google.com/go/datacatalog v1.26.0/go.mod h1:bLN2HLBAwB3kLTFT5ZKLHVPj/weNz6bR0c7nYp0LE14= cloud.google.com/go/datastore v1.0.0/go.mod h1:LXYbyblFSglQ5pkeyhO+Qmw7ukd3C+pD7TKLgZqpHYE= cloud.google.com/go/datastore v1.1.0/go.mod h1:umbIZjpQpHh4hmRpGhH4tLFup+FVzqBi1b3c64qFpCk= cloud.google.com/go/firestore v1.1.0/go.mod h1:ulACoGHTpvq5r8rxGJ4ddJZBZqakUQqClKRT5SZwBmk= @@ -203,6 +207,8 @@ github.com/anmitsu/go-shlex v0.0.0-20161002113705-648efa622239/go.mod h1:2FmKhYU github.com/antihax/optional v1.0.0/go.mod h1:uupD/76wgC+ih3iEmQUL+0Ugr19nfwCT1kdvxnR2qWY= github.com/antlr4-go/antlr/v4 v4.13.0 h1:lxCg3LAv+EUK6t1i0y1V6/SLeUi0eKEKdhQAlS8TVTI= github.com/antlr4-go/antlr/v4 v4.13.0/go.mod h1:pfChB/xh/Unjila75QW7+VU4TSnWnnk9UTnmpPaOR2g= +github.com/apache/arrow/go/v15 v15.0.2 h1:60IliRbiyTWCWjERBCkO1W4Qun9svcYoZrSLcyOsMLE= +github.com/apache/arrow/go/v15 v15.0.2/go.mod h1:DGXsR3ajT524njufqf95822i+KTh+yea1jass9YXgjA= github.com/apparentlymart/go-cidr v1.1.0 h1:2mAhrMoF+nhXqxTzSZMUzDHkLjmIHC+Zzn4tdgBZjnU= github.com/apparentlymart/go-cidr v1.1.0/go.mod h1:EBcsNrHc3zQeuaeCeCtQruQm+n9/YjEn/vI25Lg7Gwc= github.com/apparentlymart/go-textseg/v15 v15.0.0 h1:uYvfpb3DyLSCGWnctWKGj857c6ew1u1fNQOlOtuGxQY= @@ -434,6 +440,8 @@ github.com/gobwas/pool v0.2.1/go.mod h1:q8bcK0KcYlCgd9e7WYLm9LpyS+YeLd8JVDW6Wezm github.com/gobwas/ws v1.2.1/go.mod h1:hRKAFb8wOxFROYNsT1bqfWnhX+b5MFeJM9r2ZSwg/KY= github.com/gocarina/gocsv v0.0.0-20231116093920-b87c2d0e983a h1:RYfmiM0zluBJOiPDJseKLEN4BapJ42uSi9SZBQ2YyiA= github.com/gocarina/gocsv v0.0.0-20231116093920-b87c2d0e983a/go.mod h1:5YoVOkjYAQumqlV356Hj3xeYh4BdZuLE0/nRkf2NKkI= +github.com/goccy/go-json v0.10.2 h1:CrxCmQqYDkv1z7lO7Wbh2HN93uovUHgrECaO5ZrCXAU= +github.com/goccy/go-json v0.10.2/go.mod h1:6MelG93GURQebXPDq3khkgXZkazVtN9CRI+MGFi0w8I= github.com/godbus/dbus/v5 v5.0.4/go.mod h1:xhWf0FNVPg57R7Z0UbKHbJfkEywrmjJnf7w5xrFpKfA= github.com/godbus/dbus/v5 v5.1.0 h1:4KLkAxT3aOY8Li4FRJe/KvhoNFFxo0m6fNuFUO8QJUk= github.com/godbus/dbus/v5 v5.1.0/go.mod h1:xhWf0FNVPg57R7Z0UbKHbJfkEywrmjJnf7w5xrFpKfA= @@ -495,6 +503,8 @@ github.com/google/cadvisor v0.52.1 h1:sC8SZ6jio9ds+P2dk51bgbeYeufxo55n0X3tmrpA9a github.com/google/cadvisor v0.52.1/go.mod h1:OAhPcx1nOm5YwMh/JhpUOMKyv1YKLRtS9KgzWPndHmA= github.com/google/cel-go v0.26.0 h1:DPGjXackMpJWH680oGY4lZhYjIameYmR+/6RBdDGmaI= github.com/google/cel-go v0.26.0/go.mod h1:A9O8OU9rdvrK5MQyrqfIxo1a0u4g3sF8KB6PUIaryMM= +github.com/google/flatbuffers v23.5.26+incompatible h1:M9dgRyhJemaM4Sw8+66GHBu8ioaQmyPLg1b8VwK5WJg= +github.com/google/flatbuffers v23.5.26+incompatible/go.mod h1:1AeVuKshWv4vARoZatz6mlQ0JxURH0Kv5+zNeJKJCa8= github.com/google/gnostic-models v0.7.0 h1:qwTtogB15McXDaNqTZdzPJRHvaVJlAl+HVQnLmJEJxo= github.com/google/gnostic-models v0.7.0/go.mod h1:whL5G0m6dmc5cPxKc5bdKdEN3UjI7OUGxBlw57miDrQ= github.com/google/go-cmp v0.2.0/go.mod h1:oXzfMopK8JAjlY9xF4vHSVASa0yLyX7SntLO5aqRK0M= @@ -672,6 +682,8 @@ github.com/kisielk/errcheck v1.5.0/go.mod h1:pFxgyoBC7bSaBwPgfKdkLd5X25qrDl4LWUI github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck= github.com/klauspost/compress v1.18.0 h1:c/Cqfb0r+Yi+JtIEq73FWXVkRonBlf0CRNYc8Zttxdo= github.com/klauspost/compress v1.18.0/go.mod h1:2Pp+KzxcywXVXMr50+X0Q/Lsb43OQHYWRCY2AiWywWQ= +github.com/klauspost/cpuid/v2 v2.2.5 h1:0E5MSMDEoAulmXNFquVs//DdoomxaoTY1kUhbc/qbZg= +github.com/klauspost/cpuid/v2 v2.2.5/go.mod h1:Lcz8mBdAVJIBVzewtcLocK12l3Y+JytZYpaMropDUws= github.com/kr/fs v0.1.0/go.mod h1:FFnZGqtBN9Gxj7eW1uZ42v5BccTP0vu6NEaFoC2HwRg= github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo= github.com/kr/pretty v0.2.1/go.mod h1:ipq/a2n7PKx3OHsz4KJII5eveXtPO4qwEXGdVfWzfnI= @@ -900,6 +912,8 @@ github.com/pelletier/go-toml v1.9.5 h1:4yBQzkHv+7BHq2PQUZF3Mx0IYxG7LsP222s7Agd3v github.com/pelletier/go-toml v1.9.5/go.mod h1:u1nR/EPcESfeI/szUZKdtJ0xRNbUoANCkoOuaOx1Y+c= github.com/peterbourgon/diskv v2.0.1+incompatible h1:UBdAOUP5p4RWqPBg048CAvpKN+vxiaj6gdUUzhl4XmI= github.com/peterbourgon/diskv v2.0.1+incompatible/go.mod h1:uqqh8zWWbv1HBMNONnaR/tNboyR3/BZd58JJSHlUSCU= +github.com/pierrec/lz4/v4 v4.1.18 h1:xaKrnTkyoqfh1YItXl56+6KJNVYWlEEPuAQW9xsplYQ= +github.com/pierrec/lz4/v4 v4.1.18/go.mod h1:gZWDp/Ze/IJXGXf23ltt2EXimqmTUXEy0GFuRQyBid4= github.com/pjbgf/sha1cd v0.3.2 h1:a9wb0bp1oC2TGwStyn0Umc/IGKQnEgF0vVaZ8QF8eo4= github.com/pjbgf/sha1cd v0.3.2/go.mod h1:zQWigSxVmsHEZow5qaLtPYxpcKMMQpa09ixqBxuCS6A= github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c h1:+mdjkGKdHQG3305AYmdv1U2eRNDiU2ErMBj1gwrq8eQ= @@ -1047,8 +1061,12 @@ github.com/yuin/goldmark v1.3.5/go.mod h1:mwnBkeHKe2W/ZEtQ+71ViKU8L12m81fl3OWwC1 github.com/yuin/goldmark v1.4.13/go.mod h1:6yULJ656Px+3vBD8DxQVa3kxgyrAnzto9xy5taEt/CY= github.com/zclconf/go-cty v1.16.2 h1:LAJSwc3v81IRBZyUVQDUdZ7hs3SYs9jv0eZJDWHD/70= github.com/zclconf/go-cty v1.16.2/go.mod h1:VvMs5i0vgZdhYawQNq5kePSpLAoz8u1xvZgrPIxfnZE= +github.com/zeebo/assert v1.3.0 h1:g7C04CbJuIDKNPFHmsk4hwZDO5O+kntRxzaUoNXj+IQ= +github.com/zeebo/assert v1.3.0/go.mod h1:Pq9JiuJQpG8JLJdtkwrJESF0Foym2/D9XMU5ciN/wJ0= github.com/zeebo/errs v1.4.0 h1:XNdoD/RRMKP7HD0UhJnIzUy74ISdGGxURlYG8HSWSfM= github.com/zeebo/errs v1.4.0/go.mod h1:sgbWHsvVuTPHcqJJGQ1WhI5KbWlHYz+2+2C/LSEtCw4= +github.com/zeebo/xxh3 v1.0.2 h1:xZmwmqxHZA8AI603jOQ0tMqmBr9lPeFwGg6d+xy9DC0= +github.com/zeebo/xxh3 v1.0.2/go.mod h1:5NWz9Sef7zIDm2JHfFlcQvNekmcEl9ekUZQQKCYaDcA= github.com/ziutek/telnet v0.0.0-20180329124119-c3b780dc415b/go.mod h1:IZpXDfkJ6tWD3PhBK5YzgQT+xJWh7OsdwiG8hA2MkO4= go.etcd.io/bbolt v1.4.2 h1:IrUHp260R8c+zYx/Tm8QZr04CX+qWS5PGfPdevhdm1I= go.etcd.io/bbolt v1.4.2/go.mod h1:Is8rSHO/b4f3XigBC0lL0+4FwAQv3HXEEIgFMuKHceM= @@ -1417,6 +1435,8 @@ golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8T golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= +golang.org/x/xerrors v0.0.0-20240903120638-7835f813f4da h1:noIWHXmPHxILtqtCOPIhSt0ABwskkZKjD3bXGnZGpNY= +golang.org/x/xerrors v0.0.0-20240903120638-7835f813f4da/go.mod h1:NDW/Ps6MPRej6fsCIbMTohpP40sJ/P/vI1MoTEGwX90= gomodules.xyz/jsonpatch/v2 v2.4.0 h1:Ci3iUJyx9UeRx7CeFN8ARgGbkESwJK+KB9lLcWxY/Zw= gomodules.xyz/jsonpatch/v2 v2.4.0/go.mod h1:AH3dM2RI6uoBZxn3LVrfvJ3E0/9dG4cSrbuBJT4moAY= gonum.org/v1/gonum v0.16.0 h1:5+ul4Swaf3ESvrOnidPp4GZbzf0mxVQpDCYUQE7OJfk= diff --git a/pkg/cmd/openshift-tests/generate/durations/durations_command.go b/pkg/cmd/openshift-tests/generate/durations/durations_command.go new file mode 100644 index 000000000000..8b7b7361148a --- /dev/null +++ b/pkg/cmd/openshift-tests/generate/durations/durations_command.go @@ -0,0 +1,143 @@ +package durations + +import ( + "context" + "encoding/json" + "fmt" + "os" + "strings" + + "cloud.google.com/go/bigquery" + "github.com/spf13/cobra" + "google.golang.org/api/iterator" + "k8s.io/cli-runtime/pkg/genericclioptions" + "k8s.io/kubectl/pkg/util/templates" +) + +func NewDurationsCommand(streams genericclioptions.IOStreams) *cobra.Command { + o := NewDurationsOptions(streams) + + cmd := &cobra.Command{ + Use: "durations", + Short: "Generate test duration data from BigQuery", + Long: templates.LongDesc(` + Generate test duration data from BigQuery + + This command queries the BigQuery table containing junit test results and produces + a JSON file with average test durations for tests in the openshift-tests suite + from the last 7 days (configurable). Durations are calculated as the average + and rounded to the nearest second. + + By default, the output is written to pkg/test/ginkgo/testDurations.json. + + The output format is: + { + "test.name": { + "average_duration": 123 + } + } + `), + SilenceUsage: true, + SilenceErrors: true, + RunE: func(cmd *cobra.Command, args []string) error { + if err := o.Complete(args); err != nil { + return err + } + if err := o.Validate(); err != nil { + return err + } + if err := o.Run(context.Background()); err != nil { + return err + } + return nil + }, + } + + o.AddFlags(cmd.Flags()) + return cmd +} + +// DurationResult represents a test duration result from BigQuery +type DurationResult struct { + TestName string `bigquery:"test_name"` + AverageDuration float64 `bigquery:"average_duration"` +} + +// TestDurationData represents the output format for a single test +type TestDurationData struct { + AverageDuration int `json:"average_duration"` +} + +// Run executes the durations command +func (o *DurationsOptions) Run(ctx context.Context) error { + // Create BigQuery client + client, err := bigquery.NewClient(ctx, o.ProjectID) + if err != nil { + return fmt.Errorf("failed to create BigQuery client: %w", err) + } + defer client.Close() + + // Build the SQL query + query := o.buildQuery() + + // Execute the query + q := client.Query(query) + it, err := q.Read(ctx) + if err != nil { + return fmt.Errorf("failed to execute query: %w", err) + } + + // Collect results + results := make(map[string]TestDurationData) + for { + var row DurationResult + err := it.Next(&row) + if err == iterator.Done { + break + } + if err != nil { + return fmt.Errorf("failed to read query result: %w", err) + } + + // Round to nearest second and store + results[row.TestName] = TestDurationData{ + AverageDuration: int(row.AverageDuration), + } + } + + // Convert to JSON + jsonData, err := json.MarshalIndent(results, "", " ") + if err != nil { + return fmt.Errorf("failed to marshal JSON: %w", err) + } + + // Ensure the directory exists + dir := fmt.Sprintf("%s", o.OutputFile[:strings.LastIndex(o.OutputFile, "/")]) + if err := os.MkdirAll(dir, 0755); err != nil { + return fmt.Errorf("failed to create output directory: %w", err) + } + + // Write output to file + err = os.WriteFile(o.OutputFile, jsonData, 0644) + if err != nil { + return fmt.Errorf("failed to write output file: %w", err) + } + fmt.Fprintf(o.Out, "Test duration data written to %s\n", o.OutputFile) + + return nil +} + +// buildQuery constructs the BigQuery SQL query +func (o *DurationsOptions) buildQuery() string { + return fmt.Sprintf(` +SELECT + test_name, + ROUND(AVG(duration_ms / 1000.0)) as average_duration +FROM `+"`%s.%s.%s`"+` +WHERE + modified_time >= DATETIME_SUB(CURRENT_DATETIME(), INTERVAL %d DAY) + AND testsuite LIKE '%%openshift-tests%%' +GROUP BY test_name +ORDER BY test_name + `, o.ProjectID, o.DatasetID, o.TableID, o.Days) +} diff --git a/pkg/cmd/openshift-tests/generate/durations/durations_flags.go b/pkg/cmd/openshift-tests/generate/durations/durations_flags.go new file mode 100644 index 000000000000..85815e7d7ee3 --- /dev/null +++ b/pkg/cmd/openshift-tests/generate/durations/durations_flags.go @@ -0,0 +1,14 @@ +package durations + +import ( + "github.com/spf13/pflag" +) + +// AddFlags adds command-line flags to the provided flagset +func (o *DurationsOptions) AddFlags(flags *pflag.FlagSet) { + flags.StringVar(&o.ProjectID, "project", o.ProjectID, "BigQuery project ID") + flags.StringVar(&o.DatasetID, "dataset", o.DatasetID, "BigQuery dataset ID") + flags.StringVar(&o.TableID, "table", o.TableID, "BigQuery table ID") + flags.IntVar(&o.Days, "days", o.Days, "Number of days to look back for test data") + flags.StringVar(&o.OutputFile, "output", o.OutputFile, "Output file path") +} diff --git a/pkg/cmd/openshift-tests/generate/durations/durations_options.go b/pkg/cmd/openshift-tests/generate/durations/durations_options.go new file mode 100644 index 000000000000..ebf2387a7346 --- /dev/null +++ b/pkg/cmd/openshift-tests/generate/durations/durations_options.go @@ -0,0 +1,65 @@ +package durations + +import ( + "fmt" + + "k8s.io/cli-runtime/pkg/genericclioptions" +) + +// DurationsOptions contains the options for the durations command +type DurationsOptions struct { + // BigQuery configuration + ProjectID string + DatasetID string + TableID string + + // Query configuration + Days int + + // Output configuration + OutputFile string + + // IO streams + genericclioptions.IOStreams +} + +// NewDurationsOptions creates a new DurationsOptions with default values +func NewDurationsOptions(streams genericclioptions.IOStreams) *DurationsOptions { + return &DurationsOptions{ + ProjectID: "openshift-gce-devel", + DatasetID: "ci_analysis_us", + TableID: "junit", + Days: 7, + OutputFile: "pkg/test/ginkgo/testDurations.json", + IOStreams: streams, + } +} + +// Complete completes the options based on command arguments +func (o *DurationsOptions) Complete(args []string) error { + // No arguments expected for this command + if len(args) > 0 { + return fmt.Errorf("no arguments are expected") + } + return nil +} + +// Validate validates the options +func (o *DurationsOptions) Validate() error { + if o.ProjectID == "" { + return fmt.Errorf("project ID cannot be empty") + } + if o.DatasetID == "" { + return fmt.Errorf("dataset ID cannot be empty") + } + if o.TableID == "" { + return fmt.Errorf("table ID cannot be empty") + } + if o.Days <= 0 { + return fmt.Errorf("days must be a positive integer") + } + if o.Days > 365 { + return fmt.Errorf("days cannot exceed 365") + } + return nil +} diff --git a/pkg/cmd/openshift-tests/generate/generate_command.go b/pkg/cmd/openshift-tests/generate/generate_command.go new file mode 100644 index 000000000000..d74ddb27eb6a --- /dev/null +++ b/pkg/cmd/openshift-tests/generate/generate_command.go @@ -0,0 +1,20 @@ +package generate + +import ( + "github.com/openshift/origin/pkg/cmd/openshift-tests/generate/durations" + "github.com/spf13/cobra" + "k8s.io/cli-runtime/pkg/genericclioptions" +) + +func NewGenerateCommand(streams genericclioptions.IOStreams) *cobra.Command { + cmd := &cobra.Command{ + Use: "generate", + Short: "Generate test data and artifacts", + Long: "Commands for generating test-related data and artifacts from various sources", + SilenceErrors: true, + } + cmd.AddCommand( + durations.NewDurationsCommand(streams), + ) + return cmd +} diff --git a/pkg/test/ginkgo/cmd_runsuite.go b/pkg/test/ginkgo/cmd_runsuite.go index c9b3a652a027..65f102ace6c9 100644 --- a/pkg/test/ginkgo/cmd_runsuite.go +++ b/pkg/test/ginkgo/cmd_runsuite.go @@ -428,6 +428,9 @@ func (o *GinkgoRunSuiteOptions) Run(suite *TestSuite, clusterConfig *clusterdisc return err } + // Sort tests by duration (longest to shortest) to improve parallel execution efficiency + SortTestsByDuration(primaryTests) + kubeTests, openshiftTests := splitTests(primaryTests, func(t *testCase) bool { return k8sTestNames[t.name] }) diff --git a/pkg/test/ginkgo/duration_sorter.go b/pkg/test/ginkgo/duration_sorter.go new file mode 100644 index 000000000000..396ea657f8a7 --- /dev/null +++ b/pkg/test/ginkgo/duration_sorter.go @@ -0,0 +1,64 @@ +package ginkgo + +import ( + _ "embed" + "encoding/json" + "sort" + + "github.com/sirupsen/logrus" +) + +//go:embed testDurations.json +var testDurationsData []byte + +// TestDurationData represents the duration information for a single test +type TestDurationData struct { + AverageDuration int `json:"average_duration"` +} + +// testDurations holds the parsed duration data +var testDurations map[string]TestDurationData + +// init parses the embedded duration data +func init() { + if err := json.Unmarshal(testDurationsData, &testDurations); err != nil { + logrus.Warnf("Failed to parse embedded test durations: %v", err) + testDurations = make(map[string]TestDurationData) + } + logrus.Infof("Loaded duration data for %d tests", len(testDurations)) +} + +// SortTestsByDuration sorts tests by duration (longest to shortest). +// Tests without duration data are placed at the end in their original order. +func SortTestsByDuration(tests []*testCase) { + sort.SliceStable(tests, func(i, j int) bool { + iDuration, iExists := testDurations[tests[i].name] + jDuration, jExists := testDurations[tests[j].name] + + // If neither test has duration data, maintain original order + if !iExists && !jExists { + return false + } + + // If only one test has duration data, put it first + if iExists && !jExists { + return true + } + if !iExists && jExists { + return false + } + + // Both tests have duration data - sort by duration (longest first) + return iDuration.AverageDuration > jDuration.AverageDuration + }) + + // Log some statistics about the sorting + withDuration := 0 + for _, test := range tests { + if _, exists := testDurations[test.name]; exists { + withDuration++ + } + } + logrus.Infof("Sorted %d tests by duration (%d with duration data, %d without)", + len(tests), withDuration, len(tests)-withDuration) +} diff --git a/pkg/test/ginkgo/testDurations.json b/pkg/test/ginkgo/testDurations.json new file mode 100644 index 000000000000..005669e60f9c --- /dev/null +++ b/pkg/test/ginkgo/testDurations.json @@ -0,0 +1,76691 @@ +{ + " [bz-apiserver-auth][invariant] audit analysis PodSecurityViolation": { + "average_duration": 0 + }, + "API LBs follow /readyz of kube-apiserver and stop sending requests before server shutdowns for external clients": { + "average_duration": 0 + }, + "Cluster should be stable after installation is complete": { + "average_duration": 0 + }, + "Cluster should be stable before test is started": { + "average_duration": 0 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 36 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 38 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 101 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 54 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 50 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 52 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 52 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 36 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 48 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly][Feature:VolumeSourceXFS]": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 51 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly][Feature:VolumeSnapshotDataSource][Feature:VolumeSourceXFS]": { + "average_duration": 63 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 67 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] pvc-deletion-performance should delete volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 31 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 12 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 19 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 45 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 40 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 37 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 106 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 40 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 39 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 44 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 39 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 37 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 40 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 39 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 53 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 50 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 74 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 49 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 69 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] read-write-once-pod[MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] read-write-once-pod[MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 25 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 26 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": { + "average_duration": 22 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 28 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": { + "average_duration": 31 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 28 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": { + "average_duration": 22 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 22 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": { + "average_duration": 66 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 29 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 40 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 24 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 28 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 48 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 25 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 28 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 26 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 110 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 110 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": { + "average_duration": 150 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 40 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 35 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 41 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 25 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 46 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 23 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 51 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 49 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 51 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 49 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 46 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 41 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly][Feature:VolumeSourceXFS]": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 57 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly][Feature:VolumeSnapshotDataSource][Feature:VolumeSourceXFS]": { + "average_duration": 42 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 26 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 48 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 54 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 51 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 50 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 39 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly][Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly][Feature:VolumeSnapshotDataSource][Feature:VolumeSourceXFS]": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] volume-lifecycle-performance should provision volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 12 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 18 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 28 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly][Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly][Feature:VolumeSnapshotDataSource][Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 54 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 52 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 53 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 52 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 49 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 39 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 53 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 28 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should store data": { + "average_duration": 53 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 43 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 90 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 46 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 50 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 39 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 36 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly][Feature:VolumeSourceXFS]": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly][Feature:VolumeSnapshotDataSource][Feature:VolumeSourceXFS]": { + "average_duration": 59 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": { + "average_duration": 23 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": { + "average_duration": 84 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 81 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable-stress[Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 75 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 83 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable-stress[Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 89 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 73 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 69 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 71 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 106 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 40 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 114 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 36 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 64 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 6 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 6 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 10 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 9 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 33 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 34 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 102 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 32 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 63 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (xfs)] [Slow] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly][Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly][Feature:VolumeSnapshotDataSource][Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly][Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly][Feature:VolumeSnapshotDataSource][Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 84 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 2 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 85 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 83 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 109 + }, + "External Storage [Driver: cinder.csi.openstack.org] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 6 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 64 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 45 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 84 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 69 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 82 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 68 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 47 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 30 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 57 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 85 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 80 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 79 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 92 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 75 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] pvc-deletion-performance should delete volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 35 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 3 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 2 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 3 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 45 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 43 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 66 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 6 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 49 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 115 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 62 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 60 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 64 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 52 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 137 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 65 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 58 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 67 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 82 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 95 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 73 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 42 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 33 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 42 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 42 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 41 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 38 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 65 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 46 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 42 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 64 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 42 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 42 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 46 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 126 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 128 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 55 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 44 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 3 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 3 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 3 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 3 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 55 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 39 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 77 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 77 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 74 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 81 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 72 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 70 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 55 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 79 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 85 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 37 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 62 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 81 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 69 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 63 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 50 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 84 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (filesystem volmode)] volume-lifecycle-performance should provision volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 33 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 36 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 90 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 73 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 86 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 74 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 62 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 79 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 73 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 88 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 42 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should store data": { + "average_duration": 72 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 109 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 102 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 88 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 80 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 46 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 48 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 50 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 85 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 44 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 42 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 122 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 93 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 44 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 48 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 116 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 60 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 89 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Inline-volume (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 106 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 108 + }, + "External Storage [Driver: csi.kubevirt.io] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 43 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 40 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 30 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 53 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 46 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 51 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 46 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 2 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] pvc-deletion-performance should delete volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 30 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 2 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 2 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 14 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 17 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 43 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 49 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 45 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 102 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 46 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 40 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 40 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 41 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 40 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 40 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 46 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 2 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 93 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 50 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node": { + "average_duration": 28 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes": { + "average_duration": 37 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 27 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 28 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 28 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 28 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 27 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 29 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 41 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 27 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 28 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 50 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 28 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 28 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 28 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 112 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 114 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 39 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 31 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 2 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 2 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 43 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 29 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 41 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 51 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 46 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 54 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 46 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 28 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 44 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (filesystem volmode)] OpenShift CSI extended - SCSI LUN Overflow should use many PVs on a single node [Serial][Timeout:30m]": { + "average_duration": 526 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 51 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 45 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (filesystem volmode)] volume-lifecycle-performance should provision volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 16 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 18 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 59 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 46 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 59 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 44 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 28 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should store data": { + "average_duration": 43 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 36 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 37 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 38 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 66 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 34 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 34 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 104 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 63 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 35 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 34 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 102 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 39 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 66 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Inline-volume (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: csi.vsphere.vmware.com] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 233 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 33 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 122 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 41 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 134 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 87 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 97 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 178 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 147 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 191 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 215 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 161 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] pvc-deletion-performance should delete volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 74 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 91 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 77 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 115 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 238 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 106 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 108 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 102 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 99 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 119 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 112 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 120 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 104 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 120 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 103 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 118 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 171 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 218 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 159 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node": { + "average_duration": 107 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes": { + "average_duration": 153 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 79 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 72 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 87 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 87 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 91 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 85 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 103 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 73 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 95 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 91 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 87 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 74 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 91 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 172 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 175 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 98 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 88 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 88 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 77 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 116 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 84 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 43 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 151 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 28 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 125 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 114 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 98 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 150 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 126 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 95 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 105 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] OpenShift CSI extended - SCSI LUN Overflow should use many PVs on a single node [Serial][Timeout:60m]": { + "average_duration": 76 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 50 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 160 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 143 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 102 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 163 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] volume-lifecycle-performance should provision volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 90 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 84 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 86 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 58 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 139 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 35 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 131 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 124 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 88 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 139 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 133 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 78 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should store data": { + "average_duration": 114 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 162 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 197 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 119 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 115 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 89 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 4 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 83 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 188 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 4 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 4 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 4 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 4 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 99 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 98 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 4 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 89 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 192 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Inline-volume (xfs)] [Slow] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 173 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 2 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 187 + }, + "External Storage [Driver: disk.csi.azure.com] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 2 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 68 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 59 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 47 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 33 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 67 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 33 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 69 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 50 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 53 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 113 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 136 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] pvc-deletion-performance should delete volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 42 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 2 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 2 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 2 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 2 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 27 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 27 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 58 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 72 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 61 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 117 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 55 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 56 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 55 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 55 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 57 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 59 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 57 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 61 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 111 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 85 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 60 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 140 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node": { + "average_duration": 45 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes": { + "average_duration": 53 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 38 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 40 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 41 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 42 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 40 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 41 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 56 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 40 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 42 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 65 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 39 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 43 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 43 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 124 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 126 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 55 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 41 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 2 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 2 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 2 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 2 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 47 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 43 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 59 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 2 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 41 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 33 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 67 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 35 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 67 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 62 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 54 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 115 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 43 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 63 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] OpenShift CSI extended - SCSI LUN Overflow should use many PVs on a single node [Serial][Timeout:40m]": { + "average_duration": 902 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 35 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 69 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 61 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 57 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] volume-lifecycle-performance should provision volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 25 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 28 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 2 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 41 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 33 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 66 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 33 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 69 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 63 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 55 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 2 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 112 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 42 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should store data": { + "average_duration": 62 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 147 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 148 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 127 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 130 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 41 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 49 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 49 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 83 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 3 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 3 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 3 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 3 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 43 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 43 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 114 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 49 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 80 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Inline-volume (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 152 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 152 + }, + "External Storage [Driver: ebs.csi.aws.com] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] pvc-deletion-performance should delete volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow] [LinuxOnly]": { + "average_duration": 3 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 26 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 152 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 15 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 15 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 15 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 15 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 15 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 14 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 21 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 16 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 15 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 35 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 14 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 16 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 15 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 104 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 104 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 19 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 2 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 2 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 2 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 47 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 16 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 30 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] OpenShift CSI extended - SCSI LUN Overflow should use many PVs on a single node [Serial][Timeout:30m]": { + "average_duration": 288 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 38 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 36 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 36 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] volume-lifecycle-performance should provision volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 16 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 12 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 11 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 3 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 1 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 21 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 12 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 11 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 3 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 15 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 19 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Inline-volume (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: efs.csi.aws.com] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] pvc-deletion-performance should delete volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 2 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow] [LinuxOnly]": { + "average_duration": 3 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 30 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 15 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 23 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 23 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 25 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 31 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 45 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 33 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 34 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 43 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node": { + "average_duration": 20 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes": { + "average_duration": 30 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 19 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 15 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 18 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 19 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 17 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 21 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 19 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 20 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 18 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 39 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 17 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 18 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 21 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 113 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 111 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 17 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 20 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 2 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 2 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 2 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 44 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 17 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 30 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] OpenShift CSI extended - SCSI LUN Overflow should use many PVs on a single node [Serial][Timeout:30m]": { + "average_duration": 30 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 34 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 39 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 40 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 35 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 33 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 32 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] volume-lifecycle-performance should provision volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 22 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 64 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 65 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 57 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 54 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 14 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 15 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 14 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 20 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 13 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 11 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 17 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 13 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 20 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Inline-volume (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 67 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 68 + }, + "External Storage [Driver: file.csi.azure.com] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] pvc-deletion-performance should delete volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 2 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 2 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 2 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow] [LinuxOnly]": { + "average_duration": 3 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 373 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 385 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 360 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 398 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 383 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 352 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 585 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 356 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 353 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 354 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 341 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 367 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 345 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 358 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 377 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 364 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 364 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 362 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 348 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 341 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 431 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 422 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 354 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 353 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 3 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 3 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 3 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 361 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 349 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 386 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 559 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 549 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 364 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 404 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 362 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] volume-lifecycle-performance should provision volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 348 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 2 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 2 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 2 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 597 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 614 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 400 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 2 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 418 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 376 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 354 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 358 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 709 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 353 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 346 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 359 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 358 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 707 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Inline-volume (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 633 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 611 + }, + "External Storage [Driver: filestore.csi.storage.gke.io] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly][Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly][Feature:VolumeSnapshotDataSource][Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] pvc-deletion-performance should delete volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow] [LinuxOnly]": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow][LinuxOnly]": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 21 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 27 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 45 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 50 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 50 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] read-write-once-pod[MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] read-write-once-pod[MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 19 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 26 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": { + "average_duration": 21 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 36 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": { + "average_duration": 35 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 57 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": { + "average_duration": 19 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 17 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": { + "average_duration": 35 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 33 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 39 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 22 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 20 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 52 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 40 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 35 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 21 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 120 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 104 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": { + "average_duration": 130 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 71 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 20 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 67 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 40 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 49 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly][Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly][Feature:VolumeSnapshotDataSource][Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 44 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 46 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 52 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 67 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 35 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly][Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly][Feature:VolumeSnapshotDataSource][Feature:VolumeSourceXFS]": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] volume-lifecycle-performance should provision volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 21 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly][Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly][Feature:VolumeSnapshotDataSource][Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly][Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly][Feature:VolumeSnapshotDataSource][Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic PV (xfs)][Slow] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable-stress[Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable-stress[Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 71 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 26 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 14 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 2 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 50 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 71 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 72 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 18 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 71 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 92 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (xfs)] [Slow] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (xfs)][Slow] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Inline-volume (xfs)][Slow] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly][Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly][Feature:VolumeSnapshotDataSource][Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly][Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly][Feature:VolumeSnapshotDataSource][Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned PV (xfs)][Slow] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: manila.csi.openstack.org] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 65 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 61 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 116 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 64 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 60 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 51 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 51 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 93 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 114 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 91 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 306 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 131 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] pvc-deletion-performance should delete volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 39 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 2 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 2 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 2 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 29 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 28 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 63 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 65 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 52 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 119 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 52 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 51 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 49 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 54 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 52 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 50 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 51 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 56 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 108 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 91 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 54 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 91 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 314 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 124 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 38 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 39 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 44 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 43 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 42 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 41 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 52 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 41 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 41 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 60 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 39 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 40 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 45 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 124 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 123 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 48 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 40 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 2 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 2 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 2 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 47 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 41 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 57 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 3 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 41 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 61 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 61 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 63 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 48 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 98 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 112 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 40 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 59 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] OpenShift CSI extended - SCSI LUN Overflow should use many PVs on a single node [Serial][Timeout:30m]": { + "average_duration": 733 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 59 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 60 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 49 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 93 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] volume-lifecycle-performance should provision volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 31 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 28 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 4 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 44 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should modify volumes with a different volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify-stress [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] multiple pods should provision volumes with volumeAttributesClass [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 63 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 62 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 64 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 49 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 92 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 113 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 40 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should store data": { + "average_duration": 63 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 145 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 150 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 116 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 123 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 43 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 120 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 53 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 84 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 3 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 3 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 3 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 3 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 42 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 45 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 121 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 48 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 82 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Inline-volume (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should store data": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 151 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 156 + }, + "External Storage [Driver: pd.csi.storage.gke.io] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] pvc-deletion-performance should delete volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC [Slow] [LinuxOnly]": { + "average_duration": 3 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 21 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 15 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 22 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 21 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 25 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 45 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 29 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 33 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node": { + "average_duration": 20 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes": { + "average_duration": 24 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 14 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 15 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 15 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 15 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 15 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 14 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 20 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 15 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 14 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 34 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 14 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 15 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 15 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 104 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 105 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 17 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 15 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 2 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 2 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 2 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 38 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 15 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 29 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 36 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 37 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 35 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 33 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (filesystem volmode)] volume-lifecycle-performance should provision volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 17 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [Feature:VolumeAttributesClass] [FeatureGate:VolumeAttributesClass] [Beta] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 12 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 11 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 11 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 1 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 17 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 12 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 12 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 12 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 10 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 18 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Inline-volume (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: smb.csi.k8s.io] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 120 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 92 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 86 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] pvc-deletion-performance should delete volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 46 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 2 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 32 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 33 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 52 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 2 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 140 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 78 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 98 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 65 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 38 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 48 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 50 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 40 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 50 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 50 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 58 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 48 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 48 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 58 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 52 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 50 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 51 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 156 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 143 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 59 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 50 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] volume-stress multiple pods should access different volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 55 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 50 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 55 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 2 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 52 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 78 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 68 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ext4)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 46 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 63 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 75 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (filesystem volmode)] volume-lifecycle-performance should provision volumes at scale within performance constraints [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 29 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 30 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 2 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 56 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source in parallel [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should recover from invalid target VAC by updating PVC to new valid VAC [Flaky]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 74 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 80 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (xfs)] [Slow] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 50 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic PV (xfs)] [Slow] volumes should store data": { + "average_duration": 63 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable-stress [Feature:VolumeSnapshotDataSource] should support snapshotting of many volumes repeatedly [Slow] [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 50 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 113 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 50 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 96 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 3 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 3 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 3 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 1 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 3 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 48 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 50 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 130 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 52 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 85 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Inline-volume (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (block volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow] [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with different volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on different node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should access to two volumes with the same volume mode and retain data across pod recreation on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single read-only volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on different node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the single volume from pods on the same node": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and its clone from pods on the same node [LinuxOnly] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] multiVolume [Slow] should concurrently access the volume and restored snapshot from pods on the same node [LinuxOnly] [Feature:VolumeSnapshotDataSource] [Feature:VolumeSourceXFS]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned PV (xfs)] [Slow] volumes should store data": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "External Storage [Driver: vpc.block.csi.ibm.io] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "OSUpdateStarted event should be recorded for nodes that reach OSUpdateStaged": { + "average_duration": 0 + }, + "[Cloud Compute][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cloud-controller-manager": { + "average_duration": 0 + }, + "[Cloud Compute][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cloud-controller-manager-operator": { + "average_duration": 0 + }, + "[Cloud Compute][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cluster-machine-approver": { + "average_duration": 0 + }, + "[Cloud Compute][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-machine-api": { + "average_duration": 0 + }, + "[Cloud Compute][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cloud-controller-manager": { + "average_duration": 0 + }, + "[Cloud Compute][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cloud-controller-manager-operator": { + "average_duration": 0 + }, + "[Cloud Compute][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cluster-machine-approver": { + "average_duration": 0 + }, + "[Cloud Compute][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-machine-api": { + "average_duration": 0 + }, + "[Cloud Credential Operator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cloud-credential-operator": { + "average_duration": 0 + }, + "[Cloud Credential Operator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cloud-credential-operator": { + "average_duration": 0 + }, + "[Cluster Version Operator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cluster-version": { + "average_duration": 0 + }, + "[Cluster Version Operator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cluster-version": { + "average_duration": 0 + }, + "[Conformance][Suite:openshift/kube-apiserver/rollout][Jira:\"kube-apiserver\"][sig-kube-apiserver] kube-apiserver should roll out new revisions without disruption [apigroup:config.openshift.io][apigroup:operator.openshift.io]": { + "average_duration": 3969 + }, + "[Conformance][sig-api-machinery][Feature:APIServer] kube-apiserver should be accessible via api-ext endpoint [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 9 + }, + "[Conformance][sig-api-machinery][Feature:APIServer] kube-apiserver should be accessible via api-int endpoint [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 9 + }, + "[Conformance][sig-api-machinery][Feature:APIServer] kube-apiserver should be accessible via service network endpoint [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 9 + }, + "[Conformance][sig-api-machinery][Feature:APIServer] local kubeconfig \"check-endpoints.kubeconfig\" should be present in all kube-apiserver containers [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 25 + }, + "[Conformance][sig-api-machinery][Feature:APIServer] local kubeconfig \"control-plane-node.kubeconfig\" should be present in all kube-apiserver containers [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 24 + }, + "[Conformance][sig-api-machinery][Feature:APIServer] local kubeconfig \"lb-ext.kubeconfig\" should be present on all masters and work [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 13 + }, + "[Conformance][sig-api-machinery][Feature:APIServer] local kubeconfig \"lb-ext.kubeconfig\" should be present on all masters and work [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 28 + }, + "[Conformance][sig-api-machinery][Feature:APIServer] local kubeconfig \"lb-int.kubeconfig\" should be present on all masters and work [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 14 + }, + "[Conformance][sig-api-machinery][Feature:APIServer] local kubeconfig \"lb-int.kubeconfig\" should be present on all masters and work [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 24 + }, + "[Conformance][sig-api-machinery][Feature:APIServer] local kubeconfig \"localhost-recovery.kubeconfig\" should be present on all masters and work [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 13 + }, + "[Conformance][sig-api-machinery][Feature:APIServer] local kubeconfig \"localhost-recovery.kubeconfig\" should be present on all masters and work [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 22 + }, + "[Conformance][sig-api-machinery][Feature:APIServer] local kubeconfig \"localhost.kubeconfig\" should be present on all masters and work [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 13 + }, + "[Conformance][sig-api-machinery][Feature:APIServer] local kubeconfig \"localhost.kubeconfig\" should be present on all masters and work [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 23 + }, + "[Conformance][sig-sno][Serial] Cluster should allow a fast rollout of kube-apiserver with no pods restarts during API disruption [apigroup:config.openshift.io][apigroup:operator.openshift.io] [Suite:openshift/conformance/serial/minimal]": { + "average_duration": 8 + }, + "[DNS][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-dns": { + "average_duration": 0 + }, + "[DNS][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-dns-operator": { + "average_duration": 0 + }, + "[DNS][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-dns": { + "average_duration": 0 + }, + "[DNS][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-dns-operator": { + "average_duration": 0 + }, + "[Etcd][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-etcd": { + "average_duration": 0 + }, + "[Etcd][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-etcd-operator": { + "average_duration": 0 + }, + "[Etcd][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-etcd": { + "average_duration": 0 + }, + "[Etcd][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-etcd-operator": { + "average_duration": 0 + }, + "[Image Registry][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-image-registry": { + "average_duration": 0 + }, + "[Image Registry][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-image-registry": { + "average_duration": 0 + }, + "[Jira: \"kube-apiserver\"] can collect apiserver.openshift.io/disruption-actor=poller poller pod logs": { + "average_duration": 0 + }, + "[Jira: Networking / On-Prem Host Networking] Haproxy must be able to reach kubeapi server": { + "average_duration": 0 + }, + "[Jira:\"Authentication\"] monitor test legacy-authentication-invariants cleanup": { + "average_duration": 0 + }, + "[Jira:\"Authentication\"] monitor test legacy-authentication-invariants collection": { + "average_duration": 0 + }, + "[Jira:\"Authentication\"] monitor test legacy-authentication-invariants interval construction": { + "average_duration": 0 + }, + "[Jira:\"Authentication\"] monitor test legacy-authentication-invariants setup": { + "average_duration": 0 + }, + "[Jira:\"Authentication\"] monitor test legacy-authentication-invariants test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Authentication\"] monitor test legacy-authentication-invariants writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test legacy-cvo-invariants cleanup": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test legacy-cvo-invariants collection": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test legacy-cvo-invariants interval construction": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test legacy-cvo-invariants preparation": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test legacy-cvo-invariants setup": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test legacy-cvo-invariants test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test legacy-cvo-invariants writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test operator-state-analyzer cleanup": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test operator-state-analyzer collection": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test operator-state-analyzer interval construction": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test operator-state-analyzer preparation": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test operator-state-analyzer setup": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test operator-state-analyzer test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test operator-state-analyzer writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test required-scc-annotation-checker cleanup": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test required-scc-annotation-checker collection": { + "average_duration": 15 + }, + "[Jira:\"Cluster Version Operator\"] monitor test required-scc-annotation-checker interval construction": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test required-scc-annotation-checker preparation": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test required-scc-annotation-checker setup": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test required-scc-annotation-checker test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test required-scc-annotation-checker writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test termination-message-policy cleanup": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test termination-message-policy collection": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test termination-message-policy interval construction": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test termination-message-policy preparation": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test termination-message-policy setup": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test termination-message-policy test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Cluster Version Operator\"] monitor test termination-message-policy writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Cluster-Lifecycle / machine-api\"] monitor test machine-lifecycle cleanup": { + "average_duration": 0 + }, + "[Jira:\"Cluster-Lifecycle / machine-api\"] monitor test machine-lifecycle collection": { + "average_duration": 0 + }, + "[Jira:\"Cluster-Lifecycle / machine-api\"] monitor test machine-lifecycle interval construction": { + "average_duration": 0 + }, + "[Jira:\"Cluster-Lifecycle / machine-api\"] monitor test machine-lifecycle preparation": { + "average_duration": 0 + }, + "[Jira:\"Cluster-Lifecycle / machine-api\"] monitor test machine-lifecycle setup": { + "average_duration": 0 + }, + "[Jira:\"Cluster-Lifecycle / machine-api\"] monitor test machine-lifecycle test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Cluster-Lifecycle / machine-api\"] monitor test machine-lifecycle writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Image Registry\"] monitor test image-registry-availability cleanup": { + "average_duration": 0 + }, + "[Jira:\"Image Registry\"] monitor test image-registry-availability collection": { + "average_duration": 0 + }, + "[Jira:\"Image Registry\"] monitor test image-registry-availability interval construction": { + "average_duration": 0 + }, + "[Jira:\"Image Registry\"] monitor test image-registry-availability preparation": { + "average_duration": 0 + }, + "[Jira:\"Image Registry\"] monitor test image-registry-availability setup": { + "average_duration": 22 + }, + "[Jira:\"Image Registry\"] monitor test image-registry-availability test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Image Registry\"] monitor test image-registry-availability writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Monitoring\"] monitor test metrics-api-availability cleanup": { + "average_duration": 0 + }, + "[Jira:\"Monitoring\"] monitor test metrics-api-availability collection": { + "average_duration": 0 + }, + "[Jira:\"Monitoring\"] monitor test metrics-api-availability interval construction": { + "average_duration": 0 + }, + "[Jira:\"Monitoring\"] monitor test metrics-api-availability preparation": { + "average_duration": 0 + }, + "[Jira:\"Monitoring\"] monitor test metrics-api-availability setup": { + "average_duration": 0 + }, + "[Jira:\"Monitoring\"] monitor test metrics-api-availability test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Monitoring\"] monitor test metrics-api-availability writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Monitoring\"] monitor test monitoring-statefulsets-recreation cleanup": { + "average_duration": 0 + }, + "[Jira:\"Monitoring\"] monitor test monitoring-statefulsets-recreation collection": { + "average_duration": 0 + }, + "[Jira:\"Monitoring\"] monitor test monitoring-statefulsets-recreation interval construction": { + "average_duration": 0 + }, + "[Jira:\"Monitoring\"] monitor test monitoring-statefulsets-recreation preparation": { + "average_duration": 0 + }, + "[Jira:\"Monitoring\"] monitor test monitoring-statefulsets-recreation setup": { + "average_duration": 0 + }, + "[Jira:\"Monitoring\"] monitor test monitoring-statefulsets-recreation test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Monitoring\"] monitor test monitoring-statefulsets-recreation writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Network / ovn-kubernetes\"] monitor test pod-network-avalibility cleanup": { + "average_duration": 53 + }, + "[Jira:\"Network / ovn-kubernetes\"] monitor test pod-network-avalibility collection": { + "average_duration": 36 + }, + "[Jira:\"Network / ovn-kubernetes\"] monitor test pod-network-avalibility interval construction": { + "average_duration": 0 + }, + "[Jira:\"Network / ovn-kubernetes\"] monitor test pod-network-avalibility preparation": { + "average_duration": 72 + }, + "[Jira:\"Network / ovn-kubernetes\"] monitor test pod-network-avalibility setup": { + "average_duration": 7 + }, + "[Jira:\"Network / ovn-kubernetes\"] monitor test pod-network-avalibility test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Network / ovn-kubernetes\"] monitor test pod-network-avalibility writing to storage": { + "average_duration": 0 + }, + "[Jira:\"NetworkEdge\"] monitor test ingress-availability cleanup": { + "average_duration": 0 + }, + "[Jira:\"NetworkEdge\"] monitor test ingress-availability collection": { + "average_duration": 0 + }, + "[Jira:\"NetworkEdge\"] monitor test ingress-availability interval construction": { + "average_duration": 0 + }, + "[Jira:\"NetworkEdge\"] monitor test ingress-availability setup": { + "average_duration": 1 + }, + "[Jira:\"NetworkEdge\"] monitor test ingress-availability test evaluation": { + "average_duration": 0 + }, + "[Jira:\"NetworkEdge\"] monitor test ingress-availability writing to storage": { + "average_duration": 0 + }, + "[Jira:\"NetworkEdge\"] monitor test service-type-load-balancer-availability cleanup": { + "average_duration": 0 + }, + "[Jira:\"NetworkEdge\"] monitor test service-type-load-balancer-availability collection": { + "average_duration": 0 + }, + "[Jira:\"NetworkEdge\"] monitor test service-type-load-balancer-availability interval construction": { + "average_duration": 0 + }, + "[Jira:\"NetworkEdge\"] monitor test service-type-load-balancer-availability setup": { + "average_duration": 122 + }, + "[Jira:\"NetworkEdge\"] monitor test service-type-load-balancer-availability test evaluation": { + "average_duration": 0 + }, + "[Jira:\"NetworkEdge\"] monitor test service-type-load-balancer-availability writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Networking / On-Prem Host Networking\"] monitor test on-prem-haproxy cleanup": { + "average_duration": 0 + }, + "[Jira:\"Networking / On-Prem Host Networking\"] monitor test on-prem-haproxy collection": { + "average_duration": 0 + }, + "[Jira:\"Networking / On-Prem Host Networking\"] monitor test on-prem-haproxy interval construction": { + "average_duration": 0 + }, + "[Jira:\"Networking / On-Prem Host Networking\"] monitor test on-prem-haproxy preparation": { + "average_duration": 0 + }, + "[Jira:\"Networking / On-Prem Host Networking\"] monitor test on-prem-haproxy setup": { + "average_duration": 0 + }, + "[Jira:\"Networking / On-Prem Host Networking\"] monitor test on-prem-haproxy test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Networking / On-Prem Host Networking\"] monitor test on-prem-haproxy writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Networking / On-Prem Load Balancer\"] on-prem loadbalancer must achieve full priority": { + "average_duration": 0 + }, + "[Jira:\"Networking / On-Prem Loadbalancer\"] monitor test on-prem-keepalived cleanup": { + "average_duration": 0 + }, + "[Jira:\"Networking / On-Prem Loadbalancer\"] monitor test on-prem-keepalived collection": { + "average_duration": 0 + }, + "[Jira:\"Networking / On-Prem Loadbalancer\"] monitor test on-prem-keepalived interval construction": { + "average_duration": 0 + }, + "[Jira:\"Networking / On-Prem Loadbalancer\"] monitor test on-prem-keepalived preparation": { + "average_duration": 0 + }, + "[Jira:\"Networking / On-Prem Loadbalancer\"] monitor test on-prem-keepalived setup": { + "average_duration": 0 + }, + "[Jira:\"Networking / On-Prem Loadbalancer\"] monitor test on-prem-keepalived test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Networking / On-Prem Loadbalancer\"] monitor test on-prem-keepalived writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Networking / cluster-network-operator\"] monitor test legacy-networking-invariants cleanup": { + "average_duration": 0 + }, + "[Jira:\"Networking / cluster-network-operator\"] monitor test legacy-networking-invariants collection": { + "average_duration": 0 + }, + "[Jira:\"Networking / cluster-network-operator\"] monitor test legacy-networking-invariants interval construction": { + "average_duration": 0 + }, + "[Jira:\"Networking / cluster-network-operator\"] monitor test legacy-networking-invariants preparation": { + "average_duration": 0 + }, + "[Jira:\"Networking / cluster-network-operator\"] monitor test legacy-networking-invariants setup": { + "average_duration": 0 + }, + "[Jira:\"Networking / cluster-network-operator\"] monitor test legacy-networking-invariants test evaluation": { + "average_duration": 1 + }, + "[Jira:\"Networking / cluster-network-operator\"] monitor test legacy-networking-invariants writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Networking / router\"] monitor test ingress-availability cleanup": { + "average_duration": 0 + }, + "[Jira:\"Networking / router\"] monitor test ingress-availability collection": { + "average_duration": 0 + }, + "[Jira:\"Networking / router\"] monitor test ingress-availability interval construction": { + "average_duration": 0 + }, + "[Jira:\"Networking / router\"] monitor test ingress-availability preparation": { + "average_duration": 0 + }, + "[Jira:\"Networking / router\"] monitor test ingress-availability setup": { + "average_duration": 0 + }, + "[Jira:\"Networking / router\"] monitor test ingress-availability test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Networking / router\"] monitor test ingress-availability writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Networking / router\"] monitor test service-type-load-balancer-availability cleanup": { + "average_duration": 81 + }, + "[Jira:\"Networking / router\"] monitor test service-type-load-balancer-availability collection": { + "average_duration": 0 + }, + "[Jira:\"Networking / router\"] monitor test service-type-load-balancer-availability interval construction": { + "average_duration": 0 + }, + "[Jira:\"Networking / router\"] monitor test service-type-load-balancer-availability preparation": { + "average_duration": 75 + }, + "[Jira:\"Networking / router\"] monitor test service-type-load-balancer-availability setup": { + "average_duration": 49 + }, + "[Jira:\"Networking / router\"] monitor test service-type-load-balancer-availability test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Networking / router\"] monitor test service-type-load-balancer-availability writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Networking\"] monitor test legacy-networking-invariants cleanup": { + "average_duration": 0 + }, + "[Jira:\"Networking\"] monitor test legacy-networking-invariants collection": { + "average_duration": 0 + }, + "[Jira:\"Networking\"] monitor test legacy-networking-invariants interval construction": { + "average_duration": 0 + }, + "[Jira:\"Networking\"] monitor test legacy-networking-invariants setup": { + "average_duration": 0 + }, + "[Jira:\"Networking\"] monitor test legacy-networking-invariants test evaluation": { + "average_duration": 1 + }, + "[Jira:\"Networking\"] monitor test legacy-networking-invariants writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test high-cpu-metric-collector cleanup": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test high-cpu-metric-collector collection": { + "average_duration": 1 + }, + "[Jira:\"Node / Kubelet\"] monitor test high-cpu-metric-collector interval construction": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test high-cpu-metric-collector preparation": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test high-cpu-metric-collector setup": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test high-cpu-metric-collector test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test high-cpu-metric-collector writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test kubelet-container-restarts cleanup": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test kubelet-container-restarts collection": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test kubelet-container-restarts interval construction": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test kubelet-container-restarts preparation": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test kubelet-container-restarts setup": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test kubelet-container-restarts test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test kubelet-container-restarts writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test kubelet-log-collector cleanup": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test kubelet-log-collector collection": { + "average_duration": 3 + }, + "[Jira:\"Node / Kubelet\"] monitor test kubelet-log-collector interval construction": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test kubelet-log-collector preparation": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test kubelet-log-collector setup": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test kubelet-log-collector test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test kubelet-log-collector writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test legacy-node-invariants cleanup": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test legacy-node-invariants collection": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test legacy-node-invariants interval construction": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test legacy-node-invariants preparation": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test legacy-node-invariants setup": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test legacy-node-invariants test evaluation": { + "average_duration": 4 + }, + "[Jira:\"Node / Kubelet\"] monitor test legacy-node-invariants writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test node-lifecycle cleanup": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test node-lifecycle collection": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test node-lifecycle interval construction": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test node-lifecycle preparation": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test node-lifecycle setup": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test node-lifecycle test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test node-lifecycle writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test node-state-analyzer cleanup": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test node-state-analyzer collection": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test node-state-analyzer interval construction": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test node-state-analyzer preparation": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test node-state-analyzer setup": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test node-state-analyzer test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test node-state-analyzer writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test pod-lifecycle cleanup": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test pod-lifecycle collection": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test pod-lifecycle interval construction": { + "average_duration": 1 + }, + "[Jira:\"Node / Kubelet\"] monitor test pod-lifecycle preparation": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test pod-lifecycle setup": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test pod-lifecycle test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Node / Kubelet\"] monitor test pod-lifecycle writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test kubelet-log-collector cleanup": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test kubelet-log-collector collection": { + "average_duration": 2 + }, + "[Jira:\"Node\"] monitor test kubelet-log-collector interval construction": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test kubelet-log-collector setup": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test kubelet-log-collector test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test kubelet-log-collector writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test legacy-node-invariants cleanup": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test legacy-node-invariants collection": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test legacy-node-invariants interval construction": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test legacy-node-invariants setup": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test legacy-node-invariants test evaluation": { + "average_duration": 1 + }, + "[Jira:\"Node\"] monitor test legacy-node-invariants writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test node-lifecycle cleanup": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test node-lifecycle collection": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test node-lifecycle interval construction": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test node-lifecycle setup": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test node-lifecycle test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test node-lifecycle writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test node-state-analyzer cleanup": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test node-state-analyzer collection": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test node-state-analyzer interval construction": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test node-state-analyzer setup": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test node-state-analyzer test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test node-state-analyzer writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test pod-lifecycle cleanup": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test pod-lifecycle collection": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test pod-lifecycle interval construction": { + "average_duration": 1 + }, + "[Jira:\"Node\"] monitor test pod-lifecycle setup": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test pod-lifecycle test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Node\"] monitor test pod-lifecycle writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Storage\"] monitor test legacy-storage-invariants cleanup": { + "average_duration": 0 + }, + "[Jira:\"Storage\"] monitor test legacy-storage-invariants collection": { + "average_duration": 0 + }, + "[Jira:\"Storage\"] monitor test legacy-storage-invariants interval construction": { + "average_duration": 0 + }, + "[Jira:\"Storage\"] monitor test legacy-storage-invariants preparation": { + "average_duration": 0 + }, + "[Jira:\"Storage\"] monitor test legacy-storage-invariants setup": { + "average_duration": 0 + }, + "[Jira:\"Storage\"] monitor test legacy-storage-invariants test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Storage\"] monitor test legacy-storage-invariants writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] kubelet should not report DiskPressure": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test additional-events-collector cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test additional-events-collector collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test additional-events-collector interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test additional-events-collector preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test additional-events-collector setup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test additional-events-collector test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test additional-events-collector writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test alert-summary-serializer cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test alert-summary-serializer collection": { + "average_duration": 1 + }, + "[Jira:\"Test Framework\"] monitor test alert-summary-serializer interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test alert-summary-serializer preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test alert-summary-serializer setup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test alert-summary-serializer test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test alert-summary-serializer writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test azure-metrics-collector cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test azure-metrics-collector collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test azure-metrics-collector interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test azure-metrics-collector preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test azure-metrics-collector setup": { + "average_duration": 2 + }, + "[Jira:\"Test Framework\"] monitor test azure-metrics-collector test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test azure-metrics-collector writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test cluster-info-serializer cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test cluster-info-serializer collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test cluster-info-serializer interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test cluster-info-serializer preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test cluster-info-serializer setup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test cluster-info-serializer test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test cluster-info-serializer writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test clusteroperator-collector cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test clusteroperator-collector collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test clusteroperator-collector interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test clusteroperator-collector preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test clusteroperator-collector setup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test clusteroperator-collector test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test clusteroperator-collector writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test disruption-summary-serializer cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test disruption-summary-serializer collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test disruption-summary-serializer interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test disruption-summary-serializer preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test disruption-summary-serializer setup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test disruption-summary-serializer test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test disruption-summary-serializer writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test e2e-test-analyzer cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test e2e-test-analyzer collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test e2e-test-analyzer interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test e2e-test-analyzer preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test e2e-test-analyzer setup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test e2e-test-analyzer test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test e2e-test-analyzer writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test event-collector cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test event-collector collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test event-collector interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test event-collector preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test event-collector setup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test event-collector test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test event-collector writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-aws-cloud-service-availability cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-aws-cloud-service-availability collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-aws-cloud-service-availability interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-aws-cloud-service-availability preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-aws-cloud-service-availability setup": { + "average_duration": 1 + }, + "[Jira:\"Test Framework\"] monitor test external-aws-cloud-service-availability test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-aws-cloud-service-availability writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-azure-cloud-service-availability cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-azure-cloud-service-availability collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-azure-cloud-service-availability interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-azure-cloud-service-availability preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-azure-cloud-service-availability setup": { + "average_duration": 1 + }, + "[Jira:\"Test Framework\"] monitor test external-azure-cloud-service-availability test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-azure-cloud-service-availability writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-gcp-cloud-service-availability cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-gcp-cloud-service-availability collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-gcp-cloud-service-availability interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-gcp-cloud-service-availability preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-gcp-cloud-service-availability setup": { + "average_duration": 1 + }, + "[Jira:\"Test Framework\"] monitor test external-gcp-cloud-service-availability test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-gcp-cloud-service-availability writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-service-availability cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-service-availability collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-service-availability interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-service-availability preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-service-availability setup": { + "average_duration": 3 + }, + "[Jira:\"Test Framework\"] monitor test external-service-availability test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test external-service-availability writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test high-cpu-test-analyzer cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test high-cpu-test-analyzer collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test high-cpu-test-analyzer interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test high-cpu-test-analyzer preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test high-cpu-test-analyzer setup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test high-cpu-test-analyzer test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test high-cpu-test-analyzer writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test initial-and-final-operator-log-scraper cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test initial-and-final-operator-log-scraper collection": { + "average_duration": 27 + }, + "[Jira:\"Test Framework\"] monitor test initial-and-final-operator-log-scraper interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test initial-and-final-operator-log-scraper preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test initial-and-final-operator-log-scraper setup": { + "average_duration": 20 + }, + "[Jira:\"Test Framework\"] monitor test initial-and-final-operator-log-scraper test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test initial-and-final-operator-log-scraper writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test interval-serializer cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test interval-serializer collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test interval-serializer interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test interval-serializer preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test interval-serializer setup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test interval-serializer test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test interval-serializer writing to storage": { + "average_duration": 1 + }, + "[Jira:\"Test Framework\"] monitor test known-image-checker cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test known-image-checker collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test known-image-checker interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test known-image-checker preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test known-image-checker setup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test known-image-checker test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test known-image-checker writing to storage": { + "average_duration": 1 + }, + "[Jira:\"Test Framework\"] monitor test lease-checker cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test lease-checker collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test lease-checker interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test lease-checker preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test lease-checker setup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test lease-checker test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test lease-checker writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants setup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants test evaluation": { + "average_duration": 11 + }, + "[Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test metrics-endpoints-down cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test metrics-endpoints-down collection": { + "average_duration": 1 + }, + "[Jira:\"Test Framework\"] monitor test metrics-endpoints-down interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test metrics-endpoints-down preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test metrics-endpoints-down setup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test metrics-endpoints-down test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test metrics-endpoints-down writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test pathological-event-analyzer cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test pathological-event-analyzer collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test pathological-event-analyzer interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test pathological-event-analyzer preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test pathological-event-analyzer setup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test pathological-event-analyzer test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test pathological-event-analyzer writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test timeline-serializer cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test timeline-serializer collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test timeline-serializer interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test timeline-serializer preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test timeline-serializer setup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test timeline-serializer test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test timeline-serializer writing to storage": { + "average_duration": 2 + }, + "[Jira:\"Test Framework\"] monitor test tracked-resources-serializer cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test tracked-resources-serializer collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test tracked-resources-serializer interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test tracked-resources-serializer preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test tracked-resources-serializer setup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test tracked-resources-serializer test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test tracked-resources-serializer writing to storage": { + "average_duration": 3 + }, + "[Jira:\"Test Framework\"] monitor test upload-to-loki-serializer cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test upload-to-loki-serializer collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test upload-to-loki-serializer interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test upload-to-loki-serializer setup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test upload-to-loki-serializer test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test upload-to-loki-serializer writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test watch-namespaces cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test watch-namespaces collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test watch-namespaces interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test watch-namespaces preparation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test watch-namespaces setup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test watch-namespaces test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test watch-namespaces writing to storage": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test watch-request-counts-collector cleanup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test watch-request-counts-collector collection": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test watch-request-counts-collector interval construction": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test watch-request-counts-collector setup": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test watch-request-counts-collector test evaluation": { + "average_duration": 0 + }, + "[Jira:\"Test Framework\"] monitor test watch-request-counts-collector writing to storage": { + "average_duration": 1 + }, + "[Jira:\"apiserver-auth\"] monitor test legacy-authentication-invariants cleanup": { + "average_duration": 0 + }, + "[Jira:\"apiserver-auth\"] monitor test legacy-authentication-invariants collection": { + "average_duration": 0 + }, + "[Jira:\"apiserver-auth\"] monitor test legacy-authentication-invariants interval construction": { + "average_duration": 0 + }, + "[Jira:\"apiserver-auth\"] monitor test legacy-authentication-invariants preparation": { + "average_duration": 0 + }, + "[Jira:\"apiserver-auth\"] monitor test legacy-authentication-invariants setup": { + "average_duration": 0 + }, + "[Jira:\"apiserver-auth\"] monitor test legacy-authentication-invariants test evaluation": { + "average_duration": 0 + }, + "[Jira:\"apiserver-auth\"] monitor test legacy-authentication-invariants writing to storage": { + "average_duration": 0 + }, + "[Jira:\"etcd\"] monitor test etcd-disk-fsync cleanup": { + "average_duration": 0 + }, + "[Jira:\"etcd\"] monitor test etcd-disk-fsync collection": { + "average_duration": 0 + }, + "[Jira:\"etcd\"] monitor test etcd-disk-fsync interval construction": { + "average_duration": 0 + }, + "[Jira:\"etcd\"] monitor test etcd-disk-fsync setup": { + "average_duration": 0 + }, + "[Jira:\"etcd\"] monitor test etcd-disk-fsync test evaluation": { + "average_duration": 0 + }, + "[Jira:\"etcd\"] monitor test etcd-disk-fsync writing to storage": { + "average_duration": 0 + }, + "[Jira:\"etcd\"] monitor test etcd-log-analyzer cleanup": { + "average_duration": 0 + }, + "[Jira:\"etcd\"] monitor test etcd-log-analyzer collection": { + "average_duration": 0 + }, + "[Jira:\"etcd\"] monitor test etcd-log-analyzer interval construction": { + "average_duration": 0 + }, + "[Jira:\"etcd\"] monitor test etcd-log-analyzer preparation": { + "average_duration": 0 + }, + "[Jira:\"etcd\"] monitor test etcd-log-analyzer setup": { + "average_duration": 0 + }, + "[Jira:\"etcd\"] monitor test etcd-log-analyzer test evaluation": { + "average_duration": 0 + }, + "[Jira:\"etcd\"] monitor test etcd-log-analyzer writing to storage": { + "average_duration": 0 + }, + "[Jira:\"etcd\"] monitor test legacy-etcd-invariants cleanup": { + "average_duration": 0 + }, + "[Jira:\"etcd\"] monitor test legacy-etcd-invariants collection": { + "average_duration": 0 + }, + "[Jira:\"etcd\"] monitor test legacy-etcd-invariants interval construction": { + "average_duration": 0 + }, + "[Jira:\"etcd\"] monitor test legacy-etcd-invariants preparation": { + "average_duration": 0 + }, + "[Jira:\"etcd\"] monitor test legacy-etcd-invariants setup": { + "average_duration": 0 + }, + "[Jira:\"etcd\"] monitor test legacy-etcd-invariants test evaluation": { + "average_duration": 0 + }, + "[Jira:\"etcd\"] monitor test legacy-etcd-invariants writing to storage": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] API resources are not updated excessively": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] kube API servers should not experience disruption near the start of E2E testing": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test api-unreachable-from-client-metrics cleanup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test api-unreachable-from-client-metrics collection": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test api-unreachable-from-client-metrics interval construction": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test api-unreachable-from-client-metrics preparation": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test api-unreachable-from-client-metrics setup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test api-unreachable-from-client-metrics test evaluation": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test api-unreachable-from-client-metrics writing to storage": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-availability cleanup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-availability collection": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-availability interval construction": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-availability setup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-availability test evaluation": { + "average_duration": 1 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-availability writing to storage": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-disruption-invariant cleanup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-disruption-invariant collection": { + "average_duration": 2 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-disruption-invariant interval construction": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-disruption-invariant preparation": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-disruption-invariant setup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-disruption-invariant test evaluation": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-disruption-invariant writing to storage": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-external-availability cleanup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-external-availability collection": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-external-availability interval construction": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-external-availability preparation": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-external-availability setup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-external-availability test evaluation": { + "average_duration": 1 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-external-availability writing to storage": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-incluster-availability cleanup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-incluster-availability collection": { + "average_duration": 27 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-incluster-availability interval construction": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-incluster-availability preparation": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-incluster-availability setup": { + "average_duration": 18 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-incluster-availability test evaluation": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-incluster-availability writing to storage": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-new-disruption-invariant cleanup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-new-disruption-invariant collection": { + "average_duration": 2 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-new-disruption-invariant interval construction": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-new-disruption-invariant setup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-new-disruption-invariant test evaluation": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test apiserver-new-disruption-invariant writing to storage": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test audit-log-analyzer cleanup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test audit-log-analyzer collection": { + "average_duration": 33 + }, + "[Jira:\"kube-apiserver\"] monitor test audit-log-analyzer interval construction": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test audit-log-analyzer preparation": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test audit-log-analyzer setup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test audit-log-analyzer test evaluation": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test audit-log-analyzer writing to storage": { + "average_duration": 1 + }, + "[Jira:\"kube-apiserver\"] monitor test faulty-load-balancer cleanup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test faulty-load-balancer collection": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test faulty-load-balancer interval construction": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test faulty-load-balancer preparation": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test faulty-load-balancer setup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test faulty-load-balancer test evaluation": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test faulty-load-balancer writing to storage": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test generation-analyzer cleanup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test generation-analyzer collection": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test generation-analyzer interval construction": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test generation-analyzer preparation": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test generation-analyzer setup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test generation-analyzer test evaluation": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test generation-analyzer writing to storage": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test graceful-shutdown-analyzer cleanup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test graceful-shutdown-analyzer collection": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test graceful-shutdown-analyzer interval construction": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test graceful-shutdown-analyzer preparation": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test graceful-shutdown-analyzer setup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test graceful-shutdown-analyzer test evaluation": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test graceful-shutdown-analyzer writing to storage": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test legacy-kube-apiserver-invariants cleanup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test legacy-kube-apiserver-invariants collection": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test legacy-kube-apiserver-invariants interval construction": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test legacy-kube-apiserver-invariants preparation": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test legacy-kube-apiserver-invariants setup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test legacy-kube-apiserver-invariants test evaluation": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test legacy-kube-apiserver-invariants writing to storage": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test staicpod-install-monitor cleanup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test staicpod-install-monitor collection": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test staicpod-install-monitor interval construction": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test staicpod-install-monitor preparation": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test staicpod-install-monitor setup": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test staicpod-install-monitor test evaluation": { + "average_duration": 0 + }, + "[Jira:\"kube-apiserver\"] monitor test staicpod-install-monitor writing to storage": { + "average_duration": 0 + }, + "[Jira:\"oauth-apiserver\"] oauth API servers should not experience disruption near the start of E2E testing": { + "average_duration": 0 + }, + "[Jira:\"oc / update\"] monitor test oc-adm-upgrade-status cleanup": { + "average_duration": 0 + }, + "[Jira:\"oc / update\"] monitor test oc-adm-upgrade-status collection": { + "average_duration": 0 + }, + "[Jira:\"oc / update\"] monitor test oc-adm-upgrade-status interval construction": { + "average_duration": 0 + }, + "[Jira:\"oc / update\"] monitor test oc-adm-upgrade-status preparation": { + "average_duration": 0 + }, + "[Jira:\"oc / update\"] monitor test oc-adm-upgrade-status setup": { + "average_duration": 0 + }, + "[Jira:\"oc / update\"] monitor test oc-adm-upgrade-status test evaluation": { + "average_duration": 0 + }, + "[Jira:\"oc / update\"] monitor test oc-adm-upgrade-status writing to storage": { + "average_duration": 0 + }, + "[Jira:Monitoring][sig-instrumentation] sanity test should always pass [Suite:openshift/cluster-monitoring-operator/conformance/parallel]": { + "average_duration": 0 + }, + "[Jira:config-operator][sig-api-machinery] sanity test should always pass [Suite:openshift/cluster-config-operator/conformance/parallel]": { + "average_duration": 0 + }, + "[Jira:etcd][sig-etcd] sanity test should always pass [Suite:openshift/cluster-etcd-operator/conformance/parallel]": { + "average_duration": 0 + }, + "[Jira:kube-apiserver] kube-apiserver should not have internal failures": { + "average_duration": 0 + }, + "[Jira:kube-apiserver][sig-api-machinery] sanity test should always pass [Suite:openshift/cluster-kube-apiserver-operator/conformance/parallel]": { + "average_duration": 0 + }, + "[Jira:kube-controller-manager][sig-api-machinery] sanity test should always pass [Suite:openshift/cluster-kube-controller-manager-operator/conformance/parallel]": { + "average_duration": 0 + }, + "[Jira:oauth-apiserver][sig-api-machinery] sanity test should always pass [Suite:openshift/oauth-apiserver/conformance/parallel]": { + "average_duration": 0 + }, + "[Jira:openshift-apiserver][sig-api-machinery] sanity test should always pass [Suite:openshift/cluster-openshift-apiserver-operator/conformance/parallel]": { + "average_duration": 0 + }, + "[Jira:openshift-apiserver][sig-api-machinery] sanity test should always pass [Suite:openshift/openshift-apiserver/conformance/parallel]": { + "average_duration": 0 + }, + "[Jira:openshift-controller-manager][sig-openshift-controller-manager] sanity test should always pass [Suite:openshift/cluster-openshift-controller-manager-operator/conformance/parallel]": { + "average_duration": 0 + }, + "[Jira:openshift-controller-manager][sig-openshift-controller-manager] sanity test should always pass [Suite:openshift/openshift-controller-manager/conformance/parallel]": { + "average_duration": 0 + }, + "[Jira:service-ca][sig-api-machinery] Service CA Operator should always pass [Suite:openshift/service-ca-operator/conformance/parallel]": { + "average_duration": 0 + }, + "[Jira:service-ca][sig-api-machinery] sanity test should always pass [Suite:openshift/service-ca-operator/conformance/parallel]": { + "average_duration": 0 + }, + "[Jira:storage-version-migrator][sig-api-machinery] sanity test should always pass [Suite:openshift/cluster-kube-storage-version-migrator-operator/conformance/parallel]": { + "average_duration": 0 + }, + "[Machine Config Operator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-machine-config-operator": { + "average_duration": 0 + }, + "[Machine Config Operator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-machine-config-operator": { + "average_duration": 0 + }, + "[Management Console][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-console": { + "average_duration": 0 + }, + "[Management Console][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-console-operator": { + "average_duration": 0 + }, + "[Management Console][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-console": { + "average_duration": 0 + }, + "[Management Console][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-console-operator": { + "average_duration": 0 + }, + "[Monitor:additional-events-collector][Jira:\"Test Framework\"] monitor test additional-events-collector cleanup": { + "average_duration": 0 + }, + "[Monitor:additional-events-collector][Jira:\"Test Framework\"] monitor test additional-events-collector collection": { + "average_duration": 0 + }, + "[Monitor:additional-events-collector][Jira:\"Test Framework\"] monitor test additional-events-collector interval construction": { + "average_duration": 0 + }, + "[Monitor:additional-events-collector][Jira:\"Test Framework\"] monitor test additional-events-collector preparation": { + "average_duration": 0 + }, + "[Monitor:additional-events-collector][Jira:\"Test Framework\"] monitor test additional-events-collector setup": { + "average_duration": 0 + }, + "[Monitor:additional-events-collector][Jira:\"Test Framework\"] monitor test additional-events-collector test evaluation": { + "average_duration": 0 + }, + "[Monitor:additional-events-collector][Jira:\"Test Framework\"] monitor test additional-events-collector writing to storage": { + "average_duration": 0 + }, + "[Monitor:alert-summary-serializer][Jira:\"Test Framework\"] monitor test alert-summary-serializer cleanup": { + "average_duration": 0 + }, + "[Monitor:alert-summary-serializer][Jira:\"Test Framework\"] monitor test alert-summary-serializer collection": { + "average_duration": 1 + }, + "[Monitor:alert-summary-serializer][Jira:\"Test Framework\"] monitor test alert-summary-serializer interval construction": { + "average_duration": 0 + }, + "[Monitor:alert-summary-serializer][Jira:\"Test Framework\"] monitor test alert-summary-serializer preparation": { + "average_duration": 0 + }, + "[Monitor:alert-summary-serializer][Jira:\"Test Framework\"] monitor test alert-summary-serializer setup": { + "average_duration": 0 + }, + "[Monitor:alert-summary-serializer][Jira:\"Test Framework\"] monitor test alert-summary-serializer test evaluation": { + "average_duration": 0 + }, + "[Monitor:alert-summary-serializer][Jira:\"Test Framework\"] monitor test alert-summary-serializer writing to storage": { + "average_duration": 0 + }, + "[Monitor:api-unreachable-from-client-metrics][Jira:\"kube-apiserver\"] monitor test api-unreachable-from-client-metrics cleanup": { + "average_duration": 0 + }, + "[Monitor:api-unreachable-from-client-metrics][Jira:\"kube-apiserver\"] monitor test api-unreachable-from-client-metrics collection": { + "average_duration": 0 + }, + "[Monitor:api-unreachable-from-client-metrics][Jira:\"kube-apiserver\"] monitor test api-unreachable-from-client-metrics interval construction": { + "average_duration": 0 + }, + "[Monitor:api-unreachable-from-client-metrics][Jira:\"kube-apiserver\"] monitor test api-unreachable-from-client-metrics preparation": { + "average_duration": 0 + }, + "[Monitor:api-unreachable-from-client-metrics][Jira:\"kube-apiserver\"] monitor test api-unreachable-from-client-metrics setup": { + "average_duration": 0 + }, + "[Monitor:api-unreachable-from-client-metrics][Jira:\"kube-apiserver\"] monitor test api-unreachable-from-client-metrics test evaluation": { + "average_duration": 0 + }, + "[Monitor:api-unreachable-from-client-metrics][Jira:\"kube-apiserver\"] monitor test api-unreachable-from-client-metrics writing to storage": { + "average_duration": 0 + }, + "[Monitor:apiserver-disruption-invariant][Jira:\"kube-apiserver\"] monitor test apiserver-disruption-invariant cleanup": { + "average_duration": 0 + }, + "[Monitor:apiserver-disruption-invariant][Jira:\"kube-apiserver\"] monitor test apiserver-disruption-invariant collection": { + "average_duration": 1 + }, + "[Monitor:apiserver-disruption-invariant][Jira:\"kube-apiserver\"] monitor test apiserver-disruption-invariant interval construction": { + "average_duration": 0 + }, + "[Monitor:apiserver-disruption-invariant][Jira:\"kube-apiserver\"] monitor test apiserver-disruption-invariant preparation": { + "average_duration": 0 + }, + "[Monitor:apiserver-disruption-invariant][Jira:\"kube-apiserver\"] monitor test apiserver-disruption-invariant setup": { + "average_duration": 0 + }, + "[Monitor:apiserver-disruption-invariant][Jira:\"kube-apiserver\"] monitor test apiserver-disruption-invariant test evaluation": { + "average_duration": 0 + }, + "[Monitor:apiserver-disruption-invariant][Jira:\"kube-apiserver\"] monitor test apiserver-disruption-invariant writing to storage": { + "average_duration": 0 + }, + "[Monitor:apiserver-external-availability][Jira:\"kube-apiserver\"] monitor test apiserver-external-availability cleanup": { + "average_duration": 0 + }, + "[Monitor:apiserver-external-availability][Jira:\"kube-apiserver\"] monitor test apiserver-external-availability collection": { + "average_duration": 0 + }, + "[Monitor:apiserver-external-availability][Jira:\"kube-apiserver\"] monitor test apiserver-external-availability interval construction": { + "average_duration": 0 + }, + "[Monitor:apiserver-external-availability][Jira:\"kube-apiserver\"] monitor test apiserver-external-availability preparation": { + "average_duration": 0 + }, + "[Monitor:apiserver-external-availability][Jira:\"kube-apiserver\"] monitor test apiserver-external-availability setup": { + "average_duration": 0 + }, + "[Monitor:apiserver-external-availability][Jira:\"kube-apiserver\"] monitor test apiserver-external-availability test evaluation": { + "average_duration": 1 + }, + "[Monitor:apiserver-external-availability][Jira:\"kube-apiserver\"] monitor test apiserver-external-availability writing to storage": { + "average_duration": 0 + }, + "[Monitor:apiserver-external-availability][sig-api-machinery] disruption/cache-kube-api apiserver/kube-apiserver connection/new should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:apiserver-external-availability][sig-api-machinery] disruption/cache-kube-api apiserver/kube-apiserver connection/reused should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:apiserver-external-availability][sig-api-machinery] disruption/cache-oauth-api apiserver/oauth-apiserver connection/new should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:apiserver-external-availability][sig-api-machinery] disruption/cache-oauth-api apiserver/oauth-apiserver connection/reused should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:apiserver-external-availability][sig-api-machinery] disruption/cache-openshift-api apiserver/openshift-apiserver connection/new should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:apiserver-external-availability][sig-api-machinery] disruption/cache-openshift-api apiserver/openshift-apiserver connection/reused should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:apiserver-external-availability][sig-api-machinery] disruption/kube-api apiserver/kube-apiserver connection/new should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:apiserver-external-availability][sig-api-machinery] disruption/kube-api apiserver/kube-apiserver connection/reused should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:apiserver-external-availability][sig-api-machinery] disruption/oauth-api apiserver/oauth-apiserver connection/new should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:apiserver-external-availability][sig-api-machinery] disruption/oauth-api apiserver/oauth-apiserver connection/reused should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:apiserver-external-availability][sig-api-machinery] disruption/openshift-api apiserver/openshift-apiserver connection/new should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:apiserver-external-availability][sig-api-machinery] disruption/openshift-api apiserver/openshift-apiserver connection/reused should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:apiserver-incluster-availability][Jira: \"kube-apiserver\"] can collect apiserver.openshift.io/disruption-actor=poller poller pod logs": { + "average_duration": 0 + }, + "[Monitor:apiserver-incluster-availability][Jira:\"kube-apiserver\"] monitor test apiserver-incluster-availability cleanup": { + "average_duration": 0 + }, + "[Monitor:apiserver-incluster-availability][Jira:\"kube-apiserver\"] monitor test apiserver-incluster-availability collection": { + "average_duration": 27 + }, + "[Monitor:apiserver-incluster-availability][Jira:\"kube-apiserver\"] monitor test apiserver-incluster-availability interval construction": { + "average_duration": 0 + }, + "[Monitor:apiserver-incluster-availability][Jira:\"kube-apiserver\"] monitor test apiserver-incluster-availability preparation": { + "average_duration": 0 + }, + "[Monitor:apiserver-incluster-availability][Jira:\"kube-apiserver\"] monitor test apiserver-incluster-availability setup": { + "average_duration": 13 + }, + "[Monitor:apiserver-incluster-availability][Jira:\"kube-apiserver\"] monitor test apiserver-incluster-availability test evaluation": { + "average_duration": 0 + }, + "[Monitor:apiserver-incluster-availability][Jira:\"kube-apiserver\"] monitor test apiserver-incluster-availability writing to storage": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer] [bz-apiserver-auth][invariant] audit analysis PodSecurityViolation": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer][Jira:\"kube-apiserver\"] API resources are not updated excessively": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer][Jira:\"kube-apiserver\"] monitor test audit-log-analyzer cleanup": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer][Jira:\"kube-apiserver\"] monitor test audit-log-analyzer collection": { + "average_duration": 26 + }, + "[Monitor:audit-log-analyzer][Jira:\"kube-apiserver\"] monitor test audit-log-analyzer interval construction": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer][Jira:\"kube-apiserver\"] monitor test audit-log-analyzer preparation": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer][Jira:\"kube-apiserver\"] monitor test audit-log-analyzer setup": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer][Jira:\"kube-apiserver\"] monitor test audit-log-analyzer test evaluation": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer][Jira:\"kube-apiserver\"] monitor test audit-log-analyzer writing to storage": { + "average_duration": 1 + }, + "[Monitor:audit-log-analyzer][Jira:kube-apiserver] kube-apiserver should not have internal failures": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer][sig-api-machinery][Feature:APIServer] API LBs follow /readyz of kube-apiserver and stop sending requests before server shutdowns for external clients": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer][sig-arch][Late] operators should have watch channel requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer][sig-arch][Late] operators should not create watch channels very often": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/default must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/default must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/default must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/default must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/default must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/kube-node-lease must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/kube-node-lease must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/kube-node-lease must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/kube-node-lease must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/kube-node-lease must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/kube-public must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/kube-public must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/kube-public must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/kube-public must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/kube-public must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/kube-system must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/kube-system must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/kube-system must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/kube-system must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/kube-system must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-addon-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-addon-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-addon-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-addon-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-addon-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-apiserver must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-apiserver must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-apiserver must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-apiserver must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-apiserver must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-apiserver-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-apiserver-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-apiserver-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-apiserver-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-apiserver-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-aqua must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-aqua must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-aqua must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-aqua must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-aqua must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-authentication must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-authentication must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-authentication must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-authentication must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-authentication must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-authentication-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-authentication-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-authentication-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-authentication-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-authentication-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-cee must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-cee must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-cee must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-cee must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-cee must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-csa must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-csa must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-csa must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-csa must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-csa must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-cse must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-cse must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-cse must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-cse must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-cse must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-csm must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-csm must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-csm must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-csm must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-csm must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-managed-scripts must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-managed-scripts must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-managed-scripts must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-managed-scripts must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-managed-scripts must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-mcs-tier-two must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-mcs-tier-two must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-mcs-tier-two must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-mcs-tier-two must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-mcs-tier-two must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-mobb must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-mobb must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-mobb must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-mobb must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-mobb must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-sdcicd must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-sdcicd must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-sdcicd must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-sdcicd must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-sdcicd must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-srep must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-srep must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-srep must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-srep must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-srep must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-tam must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-tam must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-tam must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-tam must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-backplane-tam must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-catalogd must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-catalogd must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-catalogd must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-catalogd must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-catalogd must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-controller-manager must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-controller-manager must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-controller-manager must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-controller-manager must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-controller-manager must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-controller-manager-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-controller-manager-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-controller-manager-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-controller-manager-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-controller-manager-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-credential-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-credential-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-credential-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-credential-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-credential-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-ingress-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-ingress-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-ingress-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-ingress-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-ingress-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-network-config-controller must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-network-config-controller must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-network-config-controller must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-network-config-controller must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-network-config-controller must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-platform-infra must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-platform-infra must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-platform-infra must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-platform-infra must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cloud-platform-infra must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-api must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-api must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-api must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-api must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-api must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-csi-drivers must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-csi-drivers must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-csi-drivers must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-csi-drivers must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-csi-drivers must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-machine-approver must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-machine-approver must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-machine-approver must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-machine-approver must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-machine-approver must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-node-tuning-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-node-tuning-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-node-tuning-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-node-tuning-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-node-tuning-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-olm-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-olm-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-olm-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-olm-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-olm-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-samples-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-samples-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-samples-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-samples-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-samples-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-storage-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-storage-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-storage-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-storage-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-storage-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-version must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-version must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-version must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-version must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cluster-version must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cnv must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cnv must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cnv must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cnv must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-cnv must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-codeready-workspaces must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-codeready-workspaces must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-codeready-workspaces must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-codeready-workspaces must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-codeready-workspaces must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-commatrix-test must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-commatrix-test must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-commatrix-test must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-commatrix-test must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-commatrix-test must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-config must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-config must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-config must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-config must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-config must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-config-managed must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-config-managed must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-config-managed must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-config-managed must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-config-managed must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-config-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-config-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-config-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-config-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-config-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-console must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-console must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-console must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-console must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-console must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-console-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-console-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-console-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-console-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-console-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-console-user-settings must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-console-user-settings must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-console-user-settings must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-console-user-settings must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-console-user-settings must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-controller-manager must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-controller-manager must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-controller-manager must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-controller-manager must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-controller-manager must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-controller-manager-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-controller-manager-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-controller-manager-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-controller-manager-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-controller-manager-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-24r7f must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-24r7f must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-24r7f must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-24r7f must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-24r7f must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-299b8 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-299b8 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-299b8 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-299b8 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-299b8 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-2sqsl must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-2sqsl must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-2sqsl must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-2sqsl must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-2sqsl must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-4278x must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-4278x must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-4278x must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-4278x must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-4278x must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-4489f must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-4489f must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-4489f must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-4489f must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-4489f must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-4cf28 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-4cf28 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-4cf28 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-4cf28 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-4cf28 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-5qh8p must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-5qh8p must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-5qh8p must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-5qh8p must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-5qh8p must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-5s95q must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-5s95q must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-5s95q must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-5s95q must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-5s95q must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-5wvf9 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-5wvf9 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-5wvf9 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-5wvf9 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-5wvf9 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-65cbx must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-65cbx must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-65cbx must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-65cbx must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-65cbx must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-675nb must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-675nb must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-675nb must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-675nb must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-675nb must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-68fnk must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-68fnk must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-68fnk must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-68fnk must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-68fnk must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6cr8v must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6cr8v must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6cr8v must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6cr8v must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6cr8v must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6p4jx must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6p4jx must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6p4jx must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6p4jx must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6p4jx must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6rdmb must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6rdmb must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6rdmb must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6rdmb must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6rdmb must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6rg44 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6rg44 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6rg44 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6rg44 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6rg44 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6rzk4 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6rzk4 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6rzk4 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6rzk4 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6rzk4 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6s66k must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6s66k must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6s66k must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6s66k must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-6s66k must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-79k6l must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-79k6l must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-79k6l must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-79k6l must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-79k6l must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7d6nn must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7d6nn must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7d6nn must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7d6nn must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7d6nn must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7fn64 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7fn64 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7fn64 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7fn64 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7fn64 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7kqcn must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7kqcn must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7kqcn must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7kqcn must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7kqcn must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7nj6f must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7nj6f must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7nj6f must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7nj6f must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7nj6f must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7qf7l must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7qf7l must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7qf7l must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7qf7l must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7qf7l must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7r8cl must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7r8cl must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7r8cl must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7r8cl must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-7r8cl must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-86qlg must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-86qlg must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-86qlg must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-86qlg must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-86qlg must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-88m98 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-88m98 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-88m98 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-88m98 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-88m98 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8g7sn must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8g7sn must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8g7sn must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8g7sn must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8g7sn must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8lfjj must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8lfjj must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8lfjj must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8lfjj must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8lfjj must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8sswj must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8sswj must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8sswj must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8sswj must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8sswj must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8tt24 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8tt24 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8tt24 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8tt24 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8tt24 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8v7js must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8v7js must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8v7js must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8v7js must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8v7js must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8vnzp must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8vnzp must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8vnzp must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8vnzp must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-8vnzp must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-9gvcd must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-9gvcd must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-9gvcd must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-9gvcd must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-9gvcd must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-9h95v must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-9h95v must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-9h95v must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-9h95v must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-9h95v must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-9v69n must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-9v69n must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-9v69n must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-9v69n must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-9v69n must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-b52k4 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-b52k4 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-b52k4 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-b52k4 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-b52k4 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-c56wj must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-c56wj must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-c56wj must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-c56wj must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-c56wj must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-c8z57 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-c8z57 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-c8z57 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-c8z57 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-c8z57 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ccxdw must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ccxdw must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ccxdw must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ccxdw must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ccxdw must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-cd8n6 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-cd8n6 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-cd8n6 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-cd8n6 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-cd8n6 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ckxhb must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ckxhb must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ckxhb must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ckxhb must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ckxhb must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-cl8qc must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-cl8qc must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-cl8qc must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-cl8qc must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-cl8qc must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-cphs9 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-cphs9 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-cphs9 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-cphs9 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-cphs9 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-d2s8q must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-d2s8q must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-d2s8q must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-d2s8q must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-d2s8q must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-d89kn must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-d89kn must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-d89kn must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-d89kn must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-d89kn must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-dhjvr must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-dhjvr must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-dhjvr must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-dhjvr must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-dhjvr must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-dkvc8 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-dkvc8 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-dkvc8 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-dkvc8 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-dkvc8 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-f2xrf must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-f2xrf must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-f2xrf must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-f2xrf must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-f2xrf must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-f4xrs must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-f4xrs must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-f4xrs must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-f4xrs must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-f4xrs must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-f6x4h must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-f6x4h must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-f6x4h must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-f6x4h must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-f6x4h must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-fc8f4 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-fc8f4 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-fc8f4 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-fc8f4 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-fc8f4 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-fchtd must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-fchtd must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-fchtd must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-fchtd must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-fchtd must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-fdrrn must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-fdrrn must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-fdrrn must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-fdrrn must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-fdrrn must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ftwnt must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ftwnt must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ftwnt must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ftwnt must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ftwnt must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-fxbhm must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-fxbhm must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-fxbhm must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-fxbhm must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-fxbhm must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gdwdk must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gdwdk must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gdwdk must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gdwdk must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gdwdk must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gkzzr must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gkzzr must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gkzzr must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gkzzr must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gkzzr must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gp6dt must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gp6dt must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gp6dt must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gp6dt must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gp6dt must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gqhr4 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gqhr4 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gqhr4 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gqhr4 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gqhr4 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gzgq2 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gzgq2 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gzgq2 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gzgq2 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-gzgq2 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hbmqf must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hbmqf must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hbmqf must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hbmqf must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hbmqf must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hdngb must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hdngb must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hdngb must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hdngb must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hdngb must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hm7cp must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hm7cp must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hm7cp must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hm7cp must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hm7cp must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hsswz must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hsswz must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hsswz must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hsswz must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hsswz must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hxxhx must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hxxhx must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hxxhx must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hxxhx must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hxxhx must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hznp8 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hznp8 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hznp8 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hznp8 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hznp8 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hznwk must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hznwk must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hznwk must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hznwk must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-hznwk must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j42mr must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j42mr must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j42mr must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j42mr must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j42mr must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j75pq must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j75pq must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j75pq must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j75pq must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j75pq must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j7gv7 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j7gv7 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j7gv7 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j7gv7 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j7gv7 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j7nns must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j7nns must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j7nns must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j7nns must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j7nns must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j8dlg must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j8dlg must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j8dlg must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j8dlg must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-j8dlg must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jc8mz must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jc8mz must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jc8mz must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jc8mz must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jc8mz must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jhcmq must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jhcmq must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jhcmq must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jhcmq must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jhcmq must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jpchn must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jpchn must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jpchn must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jpchn must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jpchn must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jtt7m must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jtt7m must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jtt7m must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jtt7m must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jtt7m must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jttgk must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jttgk must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jttgk must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jttgk must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jttgk must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jxl72 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jxl72 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jxl72 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jxl72 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-jxl72 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-k4v2q must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-k4v2q must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-k4v2q must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-k4v2q must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-k4v2q must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-k677k must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-k677k must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-k677k must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-k677k must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-k677k must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-k8nt2 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-k8nt2 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-k8nt2 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-k8nt2 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-k8nt2 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kdkqb must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kdkqb must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kdkqb must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kdkqb must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kdkqb must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kk2cc must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kk2cc must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kk2cc must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kk2cc must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kk2cc must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kk6zz must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kk6zz must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kk6zz must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kk6zz must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kk6zz must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kk8r7 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kk8r7 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kk8r7 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kk8r7 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kk8r7 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kp2pm must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kp2pm must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kp2pm must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kp2pm must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kp2pm must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kq7kt must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kq7kt must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kq7kt must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kq7kt must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kq7kt must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kr9q9 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kr9q9 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kr9q9 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kr9q9 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kr9q9 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ksr47 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ksr47 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ksr47 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ksr47 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ksr47 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kxvtb must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kxvtb must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kxvtb must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kxvtb must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-kxvtb must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-lnlxc must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-lnlxc must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-lnlxc must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-lnlxc must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-lnlxc must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-lqn66 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-lqn66 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-lqn66 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-lqn66 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-lqn66 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-m8m8p must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-m8m8p must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-m8m8p must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-m8m8p must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-m8m8p must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-md4p7 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-md4p7 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-md4p7 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-md4p7 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-md4p7 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-mq9bm must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-mq9bm must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-mq9bm must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-mq9bm must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-mq9bm must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-mqchm must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-mqchm must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-mqchm must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-mqchm must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-mqchm must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-mtgf4 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-mtgf4 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-mtgf4 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-mtgf4 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-mtgf4 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-mwcbq must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-mwcbq must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-mwcbq must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-mwcbq must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-mwcbq must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-n29h5 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-n29h5 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-n29h5 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-n29h5 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-n29h5 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-n84s7 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-n84s7 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-n84s7 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-n84s7 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-n84s7 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-n8dv7 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-n8dv7 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-n8dv7 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-n8dv7 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-n8dv7 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nc5f2 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nc5f2 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nc5f2 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nc5f2 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nc5f2 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ng74j must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ng74j must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ng74j must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ng74j must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-ng74j must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nnl8g must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nnl8g must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nnl8g must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nnl8g must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nnl8g must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nqr9f must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nqr9f must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nqr9f must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nqr9f must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nqr9f must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nstkq must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nstkq must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nstkq must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nstkq must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nstkq must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nwdf4 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nwdf4 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nwdf4 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nwdf4 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-nwdf4 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-pbj7j must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-pbj7j must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-pbj7j must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-pbj7j must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-pbj7j must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-phnpm must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-phnpm must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-phnpm must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-phnpm must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-phnpm must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-pjjnv must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-pjjnv must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-pjjnv must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-pjjnv must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-pjjnv must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-pxspr must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-pxspr must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-pxspr must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-pxspr must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-pxspr must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-pzlnj must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-pzlnj must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-pzlnj must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-pzlnj must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-pzlnj must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-q4sgc must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-q4sgc must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-q4sgc must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-q4sgc must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-q4sgc must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-q6886 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-q6886 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-q6886 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-q6886 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-q6886 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-q9fw5 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-q9fw5 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-q9fw5 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-q9fw5 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-q9fw5 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qb8mr must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qb8mr must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qb8mr must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qb8mr must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qb8mr must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qqbzq must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qqbzq must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qqbzq must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qqbzq must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qqbzq must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qr5d8 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qr5d8 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qr5d8 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qr5d8 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qr5d8 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qvmnb must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qvmnb must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qvmnb must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qvmnb must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qvmnb must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qwb28 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qwb28 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qwb28 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qwb28 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-qwb28 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-r26hg must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-r26hg must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-r26hg must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-r26hg must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-r26hg must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-r4tj8 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-r4tj8 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-r4tj8 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-r4tj8 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-r4tj8 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-rjb2j must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-rjb2j must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-rjb2j must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-rjb2j must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-rjb2j must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-rmrvh must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-rmrvh must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-rmrvh must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-rmrvh must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-rmrvh must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sdqzz must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sdqzz must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sdqzz must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sdqzz must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sdqzz must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sfgzr must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sfgzr must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sfgzr must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sfgzr must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sfgzr must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sfjn5 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sfjn5 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sfjn5 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sfjn5 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sfjn5 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sg2xj must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sg2xj must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sg2xj must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sg2xj must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sg2xj must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-skhlb must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-skhlb must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-skhlb must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-skhlb must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-skhlb must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-skvsh must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-skvsh must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-skvsh must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-skvsh must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-skvsh must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sqmvn must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sqmvn must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sqmvn must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sqmvn must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-sqmvn must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-t9bqm must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-t9bqm must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-t9bqm must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-t9bqm must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-t9bqm must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tbq6c must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tbq6c must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tbq6c must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tbq6c must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tbq6c must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-thqxp must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-thqxp must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-thqxp must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-thqxp must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-thqxp must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tngtj must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tngtj must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tngtj must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tngtj must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tngtj must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tnmx2 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tnmx2 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tnmx2 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tnmx2 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tnmx2 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tq8kp must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tq8kp must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tq8kp must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tq8kp must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tq8kp must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tzqvd must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tzqvd must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tzqvd must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tzqvd must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-tzqvd must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v2dd7 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v2dd7 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v2dd7 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v2dd7 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v2dd7 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v2mwh must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v2mwh must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v2mwh must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v2mwh must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v2mwh must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v4mpw must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v4mpw must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v4mpw must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v4mpw must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v4mpw must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v6mgn must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v6mgn must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v6mgn must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v6mgn must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v6mgn must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v85sq must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v85sq must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v85sq must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v85sq must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-v85sq must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vhzst must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vhzst must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vhzst must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vhzst must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vhzst must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vlcwg must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vlcwg must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vlcwg must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vlcwg must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vlcwg must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vsnkc must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vsnkc must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vsnkc must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vsnkc must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vsnkc must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vswrb must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vswrb must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vswrb must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vswrb must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vswrb must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vtt49 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vtt49 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vtt49 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vtt49 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vtt49 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vzlsz must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vzlsz must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vzlsz must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vzlsz must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vzlsz must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vztdn must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vztdn must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vztdn must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vztdn must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-vztdn must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-w565w must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-w565w must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-w565w must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-w565w must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-w565w must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wc4jp must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wc4jp must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wc4jp must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wc4jp must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wc4jp must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wg6zz must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wg6zz must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wg6zz must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wg6zz must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wg6zz must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wjnxs must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wjnxs must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wjnxs must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wjnxs must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wjnxs must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wjp2x must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wjp2x must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wjp2x must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wjp2x must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wjp2x must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wwp4q must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wwp4q must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wwp4q must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wwp4q must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-wwp4q must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-x5pcs must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-x5pcs must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-x5pcs must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-x5pcs must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-x5pcs must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-x6qhs must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-x6qhs must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-x6qhs must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-x6qhs must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-x6qhs must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xf4jl must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xf4jl must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xf4jl must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xf4jl must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xf4jl must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xjxqb must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xjxqb must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xjxqb must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xjxqb must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xjxqb must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xnbpf must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xnbpf must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xnbpf must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xnbpf must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xnbpf must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xntq9 must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xntq9 must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xntq9 must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xntq9 must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xntq9 must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xnznp must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xnznp must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xnznp must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xnznp must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xnznp must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xq7wm must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xq7wm must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xq7wm must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xq7wm must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-xq7wm must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-zcchd must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-zcchd must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-zcchd must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-zcchd must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-zcchd must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-zjllh must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-zjllh must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-zjllh must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-zjllh must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-zjllh must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-zjzvc must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-zjzvc must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-zjzvc must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-zjzvc must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-copy-to-node-zjzvc must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-custom-domains-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-custom-domains-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-custom-domains-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-custom-domains-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-custom-domains-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-customer-monitoring must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-customer-monitoring must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-customer-monitoring must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-customer-monitoring must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-customer-monitoring must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-deployment-validation-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-deployment-validation-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-deployment-validation-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-deployment-validation-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-deployment-validation-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-dns must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-dns must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-dns must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-dns must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-dns must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-dns-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-dns-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-dns-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-dns-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-dns-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-e2e-loki must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-e2e-loki must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-e2e-loki must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-e2e-loki must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-e2e-loki must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-etcd must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-etcd must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-etcd must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-etcd must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-etcd must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-etcd-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-etcd-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-etcd-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-etcd-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-etcd-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-frr-k8s must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-frr-k8s must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-frr-k8s must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-frr-k8s must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-frr-k8s must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-host-network must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-host-network must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-host-network must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-host-network must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-host-network must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-image-registry must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-image-registry must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-image-registry must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-image-registry must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-image-registry must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-infra must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-infra must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-infra must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-infra must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-infra must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ingress must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ingress must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ingress must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ingress must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ingress must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ingress-canary must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ingress-canary must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ingress-canary must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ingress-canary must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ingress-canary must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ingress-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ingress-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ingress-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ingress-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ingress-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-insights must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-insights must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-insights must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-insights must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-insights must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kni-infra must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kni-infra must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kni-infra must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kni-infra must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kni-infra must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-apiserver must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-apiserver must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-apiserver must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-apiserver must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-apiserver must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-apiserver-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-apiserver-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-apiserver-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-apiserver-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-apiserver-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-controller-manager must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-controller-manager must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-controller-manager must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-controller-manager must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-controller-manager must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-controller-manager-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-controller-manager-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-controller-manager-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-controller-manager-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-controller-manager-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-proxy must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-proxy must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-proxy must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-proxy must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-proxy must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-scheduler must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-scheduler must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-scheduler must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-scheduler must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-scheduler must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-scheduler-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-scheduler-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-scheduler-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-scheduler-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-scheduler-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-storage-version-migrator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-storage-version-migrator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-storage-version-migrator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-storage-version-migrator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-storage-version-migrator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-storage-version-migrator-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-storage-version-migrator-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-storage-version-migrator-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-storage-version-migrator-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-kube-storage-version-migrator-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-logging must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-logging must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-logging must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-logging must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-logging must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-machine-api must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-machine-api must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-machine-api must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-machine-api must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-machine-api must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-machine-config-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-machine-config-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-machine-config-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-machine-config-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-machine-config-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-managed-node-metadata-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-managed-node-metadata-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-managed-node-metadata-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-managed-node-metadata-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-managed-node-metadata-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-managed-upgrade-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-managed-upgrade-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-managed-upgrade-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-managed-upgrade-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-managed-upgrade-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-manila-csi-driver must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-manila-csi-driver must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-manila-csi-driver must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-manila-csi-driver must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-manila-csi-driver must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-marketplace must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-marketplace must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-marketplace must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-marketplace must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-marketplace must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-metallb-system must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-metallb-system must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-metallb-system must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-metallb-system must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-metallb-system must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-monitoring must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-monitoring must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-monitoring must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-monitoring must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-monitoring must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-multus must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-multus must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-multus must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-multus must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-multus must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-network-console must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-network-console must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-network-console must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-network-console must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-network-console must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-network-diagnostics must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-network-diagnostics must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-network-diagnostics must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-network-diagnostics must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-network-diagnostics must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-network-node-identity must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-network-node-identity must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-network-node-identity must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-network-node-identity must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-network-node-identity must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-network-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-network-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-network-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-network-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-network-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-nmstate must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-nmstate must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-nmstate must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-nmstate must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-nmstate must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-node must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-node must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-node must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-node must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-node must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-nutanix-infra must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-nutanix-infra must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-nutanix-infra must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-nutanix-infra must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-nutanix-infra must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-oauth-apiserver must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-oauth-apiserver must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-oauth-apiserver must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-oauth-apiserver must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-oauth-apiserver must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-observability-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-observability-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-observability-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-observability-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-observability-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ocm-agent-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ocm-agent-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ocm-agent-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ocm-agent-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ocm-agent-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-openstack-infra must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-openstack-infra must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-openstack-infra must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-openstack-infra must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-openstack-infra must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-operator-controller must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-operator-controller must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-operator-controller must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-operator-controller must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-operator-controller must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-operator-lifecycle-manager must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-operator-lifecycle-manager must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-operator-lifecycle-manager must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-operator-lifecycle-manager must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-operator-lifecycle-manager must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-operators must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-operators must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-operators must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-operators must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-operators must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-operators-redhat must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-operators-redhat must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-operators-redhat must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-operators-redhat must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-operators-redhat must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-osd-metrics must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-osd-metrics must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-osd-metrics must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-osd-metrics must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-osd-metrics must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ovirt-infra must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ovirt-infra must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ovirt-infra must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ovirt-infra must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ovirt-infra must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ovn-kubernetes must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ovn-kubernetes must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ovn-kubernetes must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ovn-kubernetes must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-ovn-kubernetes must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-package-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-package-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-package-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-package-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-package-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-rbac-permissions must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-rbac-permissions must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-rbac-permissions must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-rbac-permissions must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-rbac-permissions must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-route-controller-manager must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-route-controller-manager must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-route-controller-manager must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-route-controller-manager must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-route-controller-manager must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-route-monitor-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-route-monitor-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-route-monitor-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-route-monitor-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-route-monitor-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-security must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-security must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-security must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-security must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-security must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-service-ca must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-service-ca must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-service-ca must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-service-ca must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-service-ca must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-service-ca-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-service-ca-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-service-ca-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-service-ca-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-service-ca-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-splunk-forwarder-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-splunk-forwarder-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-splunk-forwarder-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-splunk-forwarder-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-splunk-forwarder-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-sre-pruning must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-sre-pruning must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-sre-pruning must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-sre-pruning must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-sre-pruning must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-sriov-network-operator must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-sriov-network-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-sriov-network-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-sriov-network-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-sriov-network-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-storage must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-storage must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-storage must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-storage must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-storage must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-user-workload-monitoring must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-user-workload-monitoring must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-user-workload-monitoring must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-user-workload-monitoring must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-user-workload-monitoring must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-validation-webhook must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-validation-webhook must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-validation-webhook must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-validation-webhook must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-validation-webhook must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-velero must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-velero must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-velero must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-velero must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-velero must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-virtualization-os-images must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-virtualization-os-images must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-virtualization-os-images must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-virtualization-os-images must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-virtualization-os-images must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-vsphere-infra must not produce too many applies": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-vsphere-infra must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-vsphere-infra must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-vsphere-infra must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "[Monitor:audit-log-analyzer]users in ns/openshift-vsphere-infra must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "[Monitor:azure-metrics-collector][Jira:\"Test Framework\"] monitor test azure-metrics-collector cleanup": { + "average_duration": 1 + }, + "[Monitor:azure-metrics-collector][Jira:\"Test Framework\"] monitor test azure-metrics-collector collection": { + "average_duration": 1 + }, + "[Monitor:azure-metrics-collector][Jira:\"Test Framework\"] monitor test azure-metrics-collector interval construction": { + "average_duration": 0 + }, + "[Monitor:azure-metrics-collector][Jira:\"Test Framework\"] monitor test azure-metrics-collector preparation": { + "average_duration": 0 + }, + "[Monitor:azure-metrics-collector][Jira:\"Test Framework\"] monitor test azure-metrics-collector setup": { + "average_duration": 6 + }, + "[Monitor:azure-metrics-collector][Jira:\"Test Framework\"] monitor test azure-metrics-collector test evaluation": { + "average_duration": 0 + }, + "[Monitor:azure-metrics-collector][Jira:\"Test Framework\"] monitor test azure-metrics-collector writing to storage": { + "average_duration": 0 + }, + "[Monitor:cluster-info-serializer][Jira:\"Test Framework\"] monitor test cluster-info-serializer cleanup": { + "average_duration": 0 + }, + "[Monitor:cluster-info-serializer][Jira:\"Test Framework\"] monitor test cluster-info-serializer collection": { + "average_duration": 0 + }, + "[Monitor:cluster-info-serializer][Jira:\"Test Framework\"] monitor test cluster-info-serializer interval construction": { + "average_duration": 0 + }, + "[Monitor:cluster-info-serializer][Jira:\"Test Framework\"] monitor test cluster-info-serializer preparation": { + "average_duration": 0 + }, + "[Monitor:cluster-info-serializer][Jira:\"Test Framework\"] monitor test cluster-info-serializer setup": { + "average_duration": 0 + }, + "[Monitor:cluster-info-serializer][Jira:\"Test Framework\"] monitor test cluster-info-serializer test evaluation": { + "average_duration": 0 + }, + "[Monitor:cluster-info-serializer][Jira:\"Test Framework\"] monitor test cluster-info-serializer writing to storage": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][Jira:\"Cluster Version Operator\"] monitor test cluster-version-checker cleanup": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][Jira:\"Cluster Version Operator\"] monitor test cluster-version-checker collection": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][Jira:\"Cluster Version Operator\"] monitor test cluster-version-checker interval construction": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][Jira:\"Cluster Version Operator\"] monitor test cluster-version-checker preparation": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][Jira:\"Cluster Version Operator\"] monitor test cluster-version-checker setup": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][Jira:\"Cluster Version Operator\"] monitor test cluster-version-checker test evaluation": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][Jira:\"Cluster Version Operator\"] monitor test cluster-version-checker writing to storage": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-Bare Metal Hardware Provisioning] clusteroperator/baremetal must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-Cloud Compute] clusteroperator/cloud-controller-manager must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-Cloud Compute] clusteroperator/cluster-autoscaler must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-Cloud Compute] clusteroperator/control-plane-machine-set must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-Cloud Compute] clusteroperator/machine-api must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-Cloud Compute] clusteroperator/machine-approver must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-Cloud Credential Operator] clusteroperator/cloud-credential must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-Cluster Version Operator] cluster version should not report Failing=Unknown during a normal cluster upgrade": { + "average_duration": 8191 + }, + "[Monitor:cluster-version-checker][bz-DNS] clusteroperator/dns must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-Etcd] clusteroperator/etcd must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-Image Registry] clusteroperator/image-registry must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-Insights Operator] clusteroperator/insights must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-Machine Config Operator] clusteroperator/machine-config must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-Management Console] clusteroperator/console must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-Monitoring] clusteroperator/monitoring must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-Networking] clusteroperator/network must complete version change within limited time": { + "average_duration": 2 + }, + "[Monitor:cluster-version-checker][bz-Node Tuning Operator] clusteroperator/node-tuning must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-OLM] clusteroperator/marketplace must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-OLM] clusteroperator/olm must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-OLM] clusteroperator/operator-lifecycle-manager must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-OLM] clusteroperator/operator-lifecycle-manager-catalog must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-OLM] clusteroperator/operator-lifecycle-manager-packageserver must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-Routing] clusteroperator/ingress must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-Samples] clusteroperator/openshift-samples must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-Storage] clusteroperator/csi-snapshot-controller must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-Storage] clusteroperator/storage must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-apiserver-auth] clusteroperator/authentication must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-config-operator] clusteroperator/config-operator must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-kube-apiserver] clusteroperator/kube-apiserver must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-kube-controller-manager] clusteroperator/kube-controller-manager must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-kube-scheduler] clusteroperator/kube-scheduler must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-kube-storage-version-migrator] clusteroperator/kube-storage-version-migrator must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-openshift-apiserver] clusteroperator/openshift-apiserver must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-openshift-controller-manager] clusteroperator/openshift-controller-manager must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:cluster-version-checker][bz-service-ca] clusteroperator/service-ca must complete version change within limited time": { + "average_duration": 0 + }, + "[Monitor:clusteroperator-collector][Jira:\"Test Framework\"] monitor test clusteroperator-collector cleanup": { + "average_duration": 0 + }, + "[Monitor:clusteroperator-collector][Jira:\"Test Framework\"] monitor test clusteroperator-collector collection": { + "average_duration": 0 + }, + "[Monitor:clusteroperator-collector][Jira:\"Test Framework\"] monitor test clusteroperator-collector interval construction": { + "average_duration": 0 + }, + "[Monitor:clusteroperator-collector][Jira:\"Test Framework\"] monitor test clusteroperator-collector preparation": { + "average_duration": 0 + }, + "[Monitor:clusteroperator-collector][Jira:\"Test Framework\"] monitor test clusteroperator-collector setup": { + "average_duration": 0 + }, + "[Monitor:clusteroperator-collector][Jira:\"Test Framework\"] monitor test clusteroperator-collector test evaluation": { + "average_duration": 0 + }, + "[Monitor:clusteroperator-collector][Jira:\"Test Framework\"] monitor test clusteroperator-collector writing to storage": { + "average_duration": 0 + }, + "[Monitor:disruption-summary-serializer][Jira:\"Test Framework\"] monitor test disruption-summary-serializer cleanup": { + "average_duration": 0 + }, + "[Monitor:disruption-summary-serializer][Jira:\"Test Framework\"] monitor test disruption-summary-serializer collection": { + "average_duration": 0 + }, + "[Monitor:disruption-summary-serializer][Jira:\"Test Framework\"] monitor test disruption-summary-serializer interval construction": { + "average_duration": 0 + }, + "[Monitor:disruption-summary-serializer][Jira:\"Test Framework\"] monitor test disruption-summary-serializer preparation": { + "average_duration": 0 + }, + "[Monitor:disruption-summary-serializer][Jira:\"Test Framework\"] monitor test disruption-summary-serializer setup": { + "average_duration": 0 + }, + "[Monitor:disruption-summary-serializer][Jira:\"Test Framework\"] monitor test disruption-summary-serializer test evaluation": { + "average_duration": 0 + }, + "[Monitor:disruption-summary-serializer][Jira:\"Test Framework\"] monitor test disruption-summary-serializer writing to storage": { + "average_duration": 0 + }, + "[Monitor:e2e-test-analyzer][Jira:\"Test Framework\"] monitor test e2e-test-analyzer cleanup": { + "average_duration": 0 + }, + "[Monitor:e2e-test-analyzer][Jira:\"Test Framework\"] monitor test e2e-test-analyzer collection": { + "average_duration": 0 + }, + "[Monitor:e2e-test-analyzer][Jira:\"Test Framework\"] monitor test e2e-test-analyzer interval construction": { + "average_duration": 0 + }, + "[Monitor:e2e-test-analyzer][Jira:\"Test Framework\"] monitor test e2e-test-analyzer preparation": { + "average_duration": 0 + }, + "[Monitor:e2e-test-analyzer][Jira:\"Test Framework\"] monitor test e2e-test-analyzer setup": { + "average_duration": 0 + }, + "[Monitor:e2e-test-analyzer][Jira:\"Test Framework\"] monitor test e2e-test-analyzer test evaluation": { + "average_duration": 0 + }, + "[Monitor:e2e-test-analyzer][Jira:\"Test Framework\"] monitor test e2e-test-analyzer writing to storage": { + "average_duration": 0 + }, + "[Monitor:etcd-disk-metrics-intervals][Jira:\"etcd\"] monitor test etcd-disk-metrics-intervals cleanup": { + "average_duration": 0 + }, + "[Monitor:etcd-disk-metrics-intervals][Jira:\"etcd\"] monitor test etcd-disk-metrics-intervals collection": { + "average_duration": 1 + }, + "[Monitor:etcd-disk-metrics-intervals][Jira:\"etcd\"] monitor test etcd-disk-metrics-intervals interval construction": { + "average_duration": 0 + }, + "[Monitor:etcd-disk-metrics-intervals][Jira:\"etcd\"] monitor test etcd-disk-metrics-intervals preparation": { + "average_duration": 0 + }, + "[Monitor:etcd-disk-metrics-intervals][Jira:\"etcd\"] monitor test etcd-disk-metrics-intervals setup": { + "average_duration": 0 + }, + "[Monitor:etcd-disk-metrics-intervals][Jira:\"etcd\"] monitor test etcd-disk-metrics-intervals test evaluation": { + "average_duration": 0 + }, + "[Monitor:etcd-disk-metrics-intervals][Jira:\"etcd\"] monitor test etcd-disk-metrics-intervals writing to storage": { + "average_duration": 0 + }, + "[Monitor:etcd-log-analyzer][Jira:\"etcd\"] monitor test etcd-log-analyzer cleanup": { + "average_duration": 0 + }, + "[Monitor:etcd-log-analyzer][Jira:\"etcd\"] monitor test etcd-log-analyzer collection": { + "average_duration": 0 + }, + "[Monitor:etcd-log-analyzer][Jira:\"etcd\"] monitor test etcd-log-analyzer interval construction": { + "average_duration": 0 + }, + "[Monitor:etcd-log-analyzer][Jira:\"etcd\"] monitor test etcd-log-analyzer preparation": { + "average_duration": 0 + }, + "[Monitor:etcd-log-analyzer][Jira:\"etcd\"] monitor test etcd-log-analyzer setup": { + "average_duration": 0 + }, + "[Monitor:etcd-log-analyzer][Jira:\"etcd\"] monitor test etcd-log-analyzer test evaluation": { + "average_duration": 0 + }, + "[Monitor:etcd-log-analyzer][Jira:\"etcd\"] monitor test etcd-log-analyzer writing to storage": { + "average_duration": 0 + }, + "[Monitor:etcd-log-analyzer][sig-etcd] cluster should not be without a leader for too long": { + "average_duration": 0 + }, + "[Monitor:event-collector][Jira:\"Test Framework\"] monitor test event-collector cleanup": { + "average_duration": 0 + }, + "[Monitor:event-collector][Jira:\"Test Framework\"] monitor test event-collector collection": { + "average_duration": 0 + }, + "[Monitor:event-collector][Jira:\"Test Framework\"] monitor test event-collector interval construction": { + "average_duration": 0 + }, + "[Monitor:event-collector][Jira:\"Test Framework\"] monitor test event-collector preparation": { + "average_duration": 0 + }, + "[Monitor:event-collector][Jira:\"Test Framework\"] monitor test event-collector setup": { + "average_duration": 0 + }, + "[Monitor:event-collector][Jira:\"Test Framework\"] monitor test event-collector test evaluation": { + "average_duration": 0 + }, + "[Monitor:event-collector][Jira:\"Test Framework\"] monitor test event-collector writing to storage": { + "average_duration": 0 + }, + "[Monitor:external-aws-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-aws-cloud-service-availability cleanup": { + "average_duration": 0 + }, + "[Monitor:external-aws-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-aws-cloud-service-availability collection": { + "average_duration": 0 + }, + "[Monitor:external-aws-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-aws-cloud-service-availability interval construction": { + "average_duration": 0 + }, + "[Monitor:external-aws-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-aws-cloud-service-availability preparation": { + "average_duration": 0 + }, + "[Monitor:external-aws-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-aws-cloud-service-availability setup": { + "average_duration": 1 + }, + "[Monitor:external-aws-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-aws-cloud-service-availability test evaluation": { + "average_duration": 0 + }, + "[Monitor:external-aws-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-aws-cloud-service-availability writing to storage": { + "average_duration": 0 + }, + "[Monitor:external-azure-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-azure-cloud-service-availability cleanup": { + "average_duration": 0 + }, + "[Monitor:external-azure-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-azure-cloud-service-availability collection": { + "average_duration": 0 + }, + "[Monitor:external-azure-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-azure-cloud-service-availability interval construction": { + "average_duration": 0 + }, + "[Monitor:external-azure-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-azure-cloud-service-availability preparation": { + "average_duration": 0 + }, + "[Monitor:external-azure-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-azure-cloud-service-availability setup": { + "average_duration": 1 + }, + "[Monitor:external-azure-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-azure-cloud-service-availability test evaluation": { + "average_duration": 0 + }, + "[Monitor:external-azure-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-azure-cloud-service-availability writing to storage": { + "average_duration": 0 + }, + "[Monitor:external-gcp-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-gcp-cloud-service-availability cleanup": { + "average_duration": 0 + }, + "[Monitor:external-gcp-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-gcp-cloud-service-availability collection": { + "average_duration": 0 + }, + "[Monitor:external-gcp-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-gcp-cloud-service-availability interval construction": { + "average_duration": 0 + }, + "[Monitor:external-gcp-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-gcp-cloud-service-availability preparation": { + "average_duration": 0 + }, + "[Monitor:external-gcp-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-gcp-cloud-service-availability setup": { + "average_duration": 1 + }, + "[Monitor:external-gcp-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-gcp-cloud-service-availability test evaluation": { + "average_duration": 0 + }, + "[Monitor:external-gcp-cloud-service-availability][Jira:\"Test Framework\"] monitor test external-gcp-cloud-service-availability writing to storage": { + "average_duration": 0 + }, + "[Monitor:external-service-availability][Jira:\"Test Framework\"] monitor test external-service-availability cleanup": { + "average_duration": 0 + }, + "[Monitor:external-service-availability][Jira:\"Test Framework\"] monitor test external-service-availability collection": { + "average_duration": 0 + }, + "[Monitor:external-service-availability][Jira:\"Test Framework\"] monitor test external-service-availability interval construction": { + "average_duration": 0 + }, + "[Monitor:external-service-availability][Jira:\"Test Framework\"] monitor test external-service-availability preparation": { + "average_duration": 0 + }, + "[Monitor:external-service-availability][Jira:\"Test Framework\"] monitor test external-service-availability setup": { + "average_duration": 0 + }, + "[Monitor:external-service-availability][Jira:\"Test Framework\"] monitor test external-service-availability test evaluation": { + "average_duration": 0 + }, + "[Monitor:external-service-availability][Jira:\"Test Framework\"] monitor test external-service-availability writing to storage": { + "average_duration": 0 + }, + "[Monitor:faulty-load-balancer][Jira:\"kube-apiserver\"] monitor test faulty-load-balancer cleanup": { + "average_duration": 0 + }, + "[Monitor:faulty-load-balancer][Jira:\"kube-apiserver\"] monitor test faulty-load-balancer collection": { + "average_duration": 0 + }, + "[Monitor:faulty-load-balancer][Jira:\"kube-apiserver\"] monitor test faulty-load-balancer interval construction": { + "average_duration": 0 + }, + "[Monitor:faulty-load-balancer][Jira:\"kube-apiserver\"] monitor test faulty-load-balancer preparation": { + "average_duration": 0 + }, + "[Monitor:faulty-load-balancer][Jira:\"kube-apiserver\"] monitor test faulty-load-balancer setup": { + "average_duration": 0 + }, + "[Monitor:faulty-load-balancer][Jira:\"kube-apiserver\"] monitor test faulty-load-balancer test evaluation": { + "average_duration": 0 + }, + "[Monitor:faulty-load-balancer][Jira:\"kube-apiserver\"] monitor test faulty-load-balancer writing to storage": { + "average_duration": 0 + }, + "[Monitor:faulty-load-balancer][sig-apimachinery] new and reused connections to kube-apiserver should be handled gracefully during the graceful termination process": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer][Jira:\"kube-apiserver\"] monitor test generation-analyzer cleanup": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer][Jira:\"kube-apiserver\"] monitor test generation-analyzer collection": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer][Jira:\"kube-apiserver\"] monitor test generation-analyzer interval construction": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer][Jira:\"kube-apiserver\"] monitor test generation-analyzer preparation": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer][Jira:\"kube-apiserver\"] monitor test generation-analyzer setup": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer][Jira:\"kube-apiserver\"] monitor test generation-analyzer test evaluation": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer][Jira:\"kube-apiserver\"] monitor test generation-analyzer writing to storage": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/default should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/default should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/kube-node-lease should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/kube-node-lease should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/kube-public should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/kube-public should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/kube-system should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/kube-system should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-addon-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-addon-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-apiserver should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-apiserver should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-apiserver-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-apiserver-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-aqua should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-aqua should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-authentication should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-authentication should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-authentication-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-authentication-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane-cee should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane-cee should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane-csa should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane-csa should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane-cse should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane-cse should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane-csm should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane-csm should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane-managed-scripts should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane-managed-scripts should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane-mcs-tier-two should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane-mcs-tier-two should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane-mobb should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane-mobb should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane-sdcicd should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane-sdcicd should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane-srep should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane-srep should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane-tam should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-backplane-tam should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-catalogd should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-catalogd should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cloud-controller-manager should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cloud-controller-manager should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cloud-controller-manager-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cloud-controller-manager-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cloud-credential-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cloud-credential-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cloud-ingress-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cloud-ingress-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cloud-network-config-controller should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cloud-network-config-controller should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cloud-platform-infra should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cloud-platform-infra should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cluster-api should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cluster-api should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cluster-csi-drivers should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cluster-csi-drivers should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cluster-machine-approver should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cluster-machine-approver should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cluster-node-tuning-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cluster-node-tuning-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cluster-olm-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cluster-olm-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cluster-samples-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cluster-samples-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cluster-storage-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cluster-storage-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cluster-version should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cluster-version should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cnv should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-cnv should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-codeready-workspaces should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-codeready-workspaces should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-commatrix-test should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-commatrix-test should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-config should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-config should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-config-managed should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-config-managed should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-config-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-config-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-console should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-console should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-console-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-console-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-console-user-settings should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-console-user-settings should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-controller-manager should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-controller-manager should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-controller-manager-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-controller-manager-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-24r7f should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-24r7f should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-299b8 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-299b8 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-2sqsl should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-2sqsl should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-4278x should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-4278x should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-4489f should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-4489f should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-4cf28 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-4cf28 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-5qh8p should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-5qh8p should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-5s95q should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-5s95q should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-5wvf9 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-5wvf9 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-65cbx should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-65cbx should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-675nb should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-675nb should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-68fnk should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-68fnk should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-6cr8v should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-6cr8v should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-6p4jx should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-6p4jx should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-6rdmb should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-6rdmb should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-6rg44 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-6rg44 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-6rzk4 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-6rzk4 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-6s66k should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-6s66k should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-79k6l should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-79k6l should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-7d6nn should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-7d6nn should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-7fn64 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-7fn64 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-7kqcn should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-7kqcn should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-7nj6f should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-7nj6f should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-7qf7l should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-7qf7l should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-7r8cl should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-7r8cl should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-86qlg should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-86qlg should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-88m98 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-88m98 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-8g7sn should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-8g7sn should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-8lfjj should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-8lfjj should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-8sswj should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-8sswj should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-8tt24 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-8tt24 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-8v7js should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-8v7js should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-8vnzp should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-8vnzp should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-9gvcd should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-9gvcd should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-9h95v should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-9h95v should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-9v69n should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-9v69n should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-b52k4 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-b52k4 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-c56wj should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-c56wj should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-c8z57 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-c8z57 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-ccxdw should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-ccxdw should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-cd8n6 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-cd8n6 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-ckxhb should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-ckxhb should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-cl8qc should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-cl8qc should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-cphs9 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-cphs9 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-d2s8q should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-d2s8q should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-d89kn should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-d89kn should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-dhjvr should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-dhjvr should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-dkvc8 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-dkvc8 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-f2xrf should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-f2xrf should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-f4xrs should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-f4xrs should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-f6x4h should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-f6x4h should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-fc8f4 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-fc8f4 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-fchtd should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-fchtd should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-fdrrn should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-fdrrn should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-ftwnt should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-ftwnt should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-fxbhm should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-fxbhm should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-gdwdk should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-gdwdk should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-gkzzr should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-gkzzr should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-gp6dt should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-gp6dt should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-gqhr4 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-gqhr4 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-gzgq2 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-gzgq2 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-hbmqf should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-hbmqf should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-hdngb should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-hdngb should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-hm7cp should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-hm7cp should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-hsswz should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-hsswz should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-hxxhx should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-hxxhx should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-hznp8 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-hznp8 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-hznwk should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-hznwk should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-j42mr should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-j42mr should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-j75pq should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-j75pq should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-j7gv7 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-j7gv7 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-j7nns should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-j7nns should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-j8dlg should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-j8dlg should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-jc8mz should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-jc8mz should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-jhcmq should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-jhcmq should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-jpchn should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-jpchn should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-jtt7m should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-jtt7m should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-jttgk should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-jttgk should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-jxl72 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-jxl72 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-k4v2q should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-k4v2q should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-k677k should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-k677k should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-k8nt2 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-k8nt2 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-kdkqb should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-kdkqb should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-kk2cc should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-kk2cc should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-kk6zz should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-kk6zz should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-kk8r7 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-kk8r7 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-kp2pm should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-kp2pm should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-kq7kt should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-kq7kt should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-kr9q9 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-kr9q9 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-ksr47 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-ksr47 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-kxvtb should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-kxvtb should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-lnlxc should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-lnlxc should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-lqn66 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-lqn66 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-m8m8p should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-m8m8p should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-md4p7 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-md4p7 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-mq9bm should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-mq9bm should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-mqchm should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-mqchm should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-mtgf4 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-mtgf4 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-mwcbq should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-mwcbq should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-n29h5 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-n29h5 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-n84s7 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-n84s7 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-n8dv7 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-n8dv7 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-nc5f2 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-nc5f2 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-ng74j should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-ng74j should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-nnl8g should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-nnl8g should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-nqr9f should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-nqr9f should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-nstkq should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-nstkq should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-nwdf4 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-nwdf4 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-pbj7j should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-pbj7j should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-phnpm should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-phnpm should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-pjjnv should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-pjjnv should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-pxspr should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-pxspr should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-pzlnj should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-pzlnj should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-q4sgc should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-q4sgc should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-q6886 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-q6886 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-q9fw5 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-q9fw5 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-qb8mr should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-qb8mr should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-qqbzq should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-qqbzq should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-qr5d8 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-qr5d8 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-qvmnb should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-qvmnb should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-qwb28 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-qwb28 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-r26hg should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-r26hg should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-r4tj8 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-r4tj8 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-rjb2j should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-rjb2j should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-rmrvh should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-rmrvh should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-sdqzz should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-sdqzz should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-sfgzr should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-sfgzr should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-sfjn5 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-sfjn5 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-sg2xj should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-sg2xj should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-skhlb should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-skhlb should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-skvsh should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-skvsh should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-sqmvn should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-sqmvn should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-t9bqm should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-t9bqm should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-tbq6c should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-tbq6c should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-thqxp should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-thqxp should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-tngtj should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-tngtj should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-tnmx2 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-tnmx2 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-tq8kp should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-tq8kp should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-tzqvd should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-tzqvd should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-v2dd7 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-v2dd7 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-v2mwh should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-v2mwh should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-v4mpw should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-v4mpw should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-v6mgn should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-v6mgn should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-v85sq should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-v85sq should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-vhzst should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-vhzst should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-vlcwg should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-vlcwg should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-vsnkc should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-vsnkc should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-vswrb should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-vswrb should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-vtt49 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-vtt49 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-vzlsz should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-vzlsz should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-vztdn should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-vztdn should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-w565w should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-w565w should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-wc4jp should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-wc4jp should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-wg6zz should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-wg6zz should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-wjnxs should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-wjnxs should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-wjp2x should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-wjp2x should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-wwp4q should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-wwp4q should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-x5pcs should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-x5pcs should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-x6qhs should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-x6qhs should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-xf4jl should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-xf4jl should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-xjxqb should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-xjxqb should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-xnbpf should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-xnbpf should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-xntq9 should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-xntq9 should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-xnznp should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-xnznp should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-xq7wm should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-xq7wm should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-zcchd should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-zcchd should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-zjllh should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-zjllh should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-zjzvc should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-copy-to-node-zjzvc should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-custom-domains-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-custom-domains-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-customer-monitoring should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-customer-monitoring should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-deployment-validation-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-deployment-validation-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-dns should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-dns should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-dns-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-dns-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-e2e-loki should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-e2e-loki should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-etcd should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-etcd should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-etcd-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-etcd-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-frr-k8s should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-frr-k8s should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-host-network should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-host-network should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-image-registry should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-image-registry should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-infra should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-infra should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-ingress should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-ingress should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-ingress-canary should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-ingress-canary should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-ingress-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-ingress-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-insights should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-insights should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-kni-infra should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-kni-infra should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-kube-apiserver should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-kube-apiserver should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-kube-apiserver-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-kube-apiserver-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-kube-controller-manager should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-kube-controller-manager should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-kube-controller-manager-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-kube-controller-manager-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-kube-proxy should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-kube-proxy should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-kube-scheduler should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-kube-scheduler should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-kube-scheduler-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-kube-scheduler-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-kube-storage-version-migrator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-kube-storage-version-migrator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-kube-storage-version-migrator-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-kube-storage-version-migrator-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-logging should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-logging should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-machine-api should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-machine-api should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-machine-config-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-machine-config-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-managed-node-metadata-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-managed-node-metadata-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-managed-upgrade-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-managed-upgrade-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-manila-csi-driver should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-manila-csi-driver should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-marketplace should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-marketplace should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-metallb-system should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-metallb-system should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-monitoring should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-monitoring should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-multus should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-multus should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-network-console should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-network-console should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-network-diagnostics should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-network-diagnostics should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-network-node-identity should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-network-node-identity should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-network-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-network-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-nmstate should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-nmstate should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-node should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-node should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-nutanix-infra should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-nutanix-infra should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-oauth-apiserver should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-oauth-apiserver should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-observability-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-observability-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-ocm-agent-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-ocm-agent-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-openstack-infra should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-openstack-infra should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-operator-controller should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-operator-controller should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-operator-lifecycle-manager should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-operator-lifecycle-manager should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-operators should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-operators should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-operators-redhat should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-operators-redhat should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-osd-metrics should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-osd-metrics should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-ovirt-infra should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-ovirt-infra should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-ovn-kubernetes should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-ovn-kubernetes should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-package-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-package-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-rbac-permissions should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-rbac-permissions should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-route-controller-manager should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-route-controller-manager should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-route-monitor-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-route-monitor-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-security should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-security should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-service-ca should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-service-ca should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-service-ca-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-service-ca-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-splunk-forwarder-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-splunk-forwarder-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-sre-pruning should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-sre-pruning should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-sriov-network-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-sriov-network-operator should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-storage should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-storage should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-user-workload-monitoring should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-user-workload-monitoring should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-validation-webhook should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-validation-webhook should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-velero should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-velero should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-virtualization-os-images should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-virtualization-os-images should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-vsphere-infra should have generation increasing monotonically": { + "average_duration": 0 + }, + "[Monitor:generation-analyzer]objects in ns/openshift-vsphere-infra should not have too many generations": { + "average_duration": 0 + }, + "[Monitor:graceful-shutdown-analyzer][Jira:\"kube-apiserver\"] monitor test graceful-shutdown-analyzer cleanup": { + "average_duration": 0 + }, + "[Monitor:graceful-shutdown-analyzer][Jira:\"kube-apiserver\"] monitor test graceful-shutdown-analyzer collection": { + "average_duration": 0 + }, + "[Monitor:graceful-shutdown-analyzer][Jira:\"kube-apiserver\"] monitor test graceful-shutdown-analyzer interval construction": { + "average_duration": 0 + }, + "[Monitor:graceful-shutdown-analyzer][Jira:\"kube-apiserver\"] monitor test graceful-shutdown-analyzer preparation": { + "average_duration": 0 + }, + "[Monitor:graceful-shutdown-analyzer][Jira:\"kube-apiserver\"] monitor test graceful-shutdown-analyzer setup": { + "average_duration": 0 + }, + "[Monitor:graceful-shutdown-analyzer][Jira:\"kube-apiserver\"] monitor test graceful-shutdown-analyzer test evaluation": { + "average_duration": 0 + }, + "[Monitor:graceful-shutdown-analyzer][Jira:\"kube-apiserver\"] monitor test graceful-shutdown-analyzer writing to storage": { + "average_duration": 0 + }, + "[Monitor:high-cpu-metric-collector][Jira:\"Node / Kubelet\"] monitor test high-cpu-metric-collector cleanup": { + "average_duration": 0 + }, + "[Monitor:high-cpu-metric-collector][Jira:\"Node / Kubelet\"] monitor test high-cpu-metric-collector collection": { + "average_duration": 1 + }, + "[Monitor:high-cpu-metric-collector][Jira:\"Node / Kubelet\"] monitor test high-cpu-metric-collector interval construction": { + "average_duration": 0 + }, + "[Monitor:high-cpu-metric-collector][Jira:\"Node / Kubelet\"] monitor test high-cpu-metric-collector preparation": { + "average_duration": 0 + }, + "[Monitor:high-cpu-metric-collector][Jira:\"Node / Kubelet\"] monitor test high-cpu-metric-collector setup": { + "average_duration": 0 + }, + "[Monitor:high-cpu-metric-collector][Jira:\"Node / Kubelet\"] monitor test high-cpu-metric-collector test evaluation": { + "average_duration": 0 + }, + "[Monitor:high-cpu-metric-collector][Jira:\"Node / Kubelet\"] monitor test high-cpu-metric-collector writing to storage": { + "average_duration": 0 + }, + "[Monitor:high-cpu-test-analyzer][Jira:\"Test Framework\"] monitor test high-cpu-test-analyzer cleanup": { + "average_duration": 0 + }, + "[Monitor:high-cpu-test-analyzer][Jira:\"Test Framework\"] monitor test high-cpu-test-analyzer collection": { + "average_duration": 0 + }, + "[Monitor:high-cpu-test-analyzer][Jira:\"Test Framework\"] monitor test high-cpu-test-analyzer interval construction": { + "average_duration": 0 + }, + "[Monitor:high-cpu-test-analyzer][Jira:\"Test Framework\"] monitor test high-cpu-test-analyzer preparation": { + "average_duration": 0 + }, + "[Monitor:high-cpu-test-analyzer][Jira:\"Test Framework\"] monitor test high-cpu-test-analyzer setup": { + "average_duration": 0 + }, + "[Monitor:high-cpu-test-analyzer][Jira:\"Test Framework\"] monitor test high-cpu-test-analyzer test evaluation": { + "average_duration": 0 + }, + "[Monitor:high-cpu-test-analyzer][Jira:\"Test Framework\"] monitor test high-cpu-test-analyzer writing to storage": { + "average_duration": 0 + }, + "[Monitor:image-registry-availability][Jira:\"Image Registry\"] monitor test image-registry-availability cleanup": { + "average_duration": 0 + }, + "[Monitor:image-registry-availability][Jira:\"Image Registry\"] monitor test image-registry-availability collection": { + "average_duration": 0 + }, + "[Monitor:image-registry-availability][Jira:\"Image Registry\"] monitor test image-registry-availability interval construction": { + "average_duration": 0 + }, + "[Monitor:image-registry-availability][Jira:\"Image Registry\"] monitor test image-registry-availability preparation": { + "average_duration": 0 + }, + "[Monitor:image-registry-availability][Jira:\"Image Registry\"] monitor test image-registry-availability setup": { + "average_duration": 22 + }, + "[Monitor:image-registry-availability][Jira:\"Image Registry\"] monitor test image-registry-availability test evaluation": { + "average_duration": 0 + }, + "[Monitor:image-registry-availability][Jira:\"Image Registry\"] monitor test image-registry-availability writing to storage": { + "average_duration": 0 + }, + "[Monitor:image-registry-availability][sig-imageregistry] disruption/image-registry connection/new should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:image-registry-availability][sig-imageregistry] disruption/image-registry connection/reused should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:ingress-availability][Jira:\"Networking / router\"] monitor test ingress-availability cleanup": { + "average_duration": 0 + }, + "[Monitor:ingress-availability][Jira:\"Networking / router\"] monitor test ingress-availability collection": { + "average_duration": 0 + }, + "[Monitor:ingress-availability][Jira:\"Networking / router\"] monitor test ingress-availability interval construction": { + "average_duration": 0 + }, + "[Monitor:ingress-availability][Jira:\"Networking / router\"] monitor test ingress-availability preparation": { + "average_duration": 0 + }, + "[Monitor:ingress-availability][Jira:\"Networking / router\"] monitor test ingress-availability setup": { + "average_duration": 0 + }, + "[Monitor:ingress-availability][Jira:\"Networking / router\"] monitor test ingress-availability test evaluation": { + "average_duration": 0 + }, + "[Monitor:ingress-availability][Jira:\"Networking / router\"] monitor test ingress-availability writing to storage": { + "average_duration": 0 + }, + "[Monitor:ingress-availability][sig-network-edge] ns/openshift-authentication route/oauth-openshift disruption/ingress-to-oauth-server connection/new should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:ingress-availability][sig-network-edge] ns/openshift-authentication route/oauth-openshift disruption/ingress-to-oauth-server connection/reused should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:ingress-availability][sig-network-edge] ns/openshift-console route/console disruption/ingress-to-console connection/new should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:ingress-availability][sig-network-edge] ns/openshift-console route/console disruption/ingress-to-console connection/reused should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper][Jira:\"Test Framework\"] monitor test initial-and-final-operator-log-scraper cleanup": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper][Jira:\"Test Framework\"] monitor test initial-and-final-operator-log-scraper collection": { + "average_duration": 20 + }, + "[Monitor:initial-and-final-operator-log-scraper][Jira:\"Test Framework\"] monitor test initial-and-final-operator-log-scraper interval construction": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper][Jira:\"Test Framework\"] monitor test initial-and-final-operator-log-scraper preparation": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper][Jira:\"Test Framework\"] monitor test initial-and-final-operator-log-scraper setup": { + "average_duration": 18 + }, + "[Monitor:initial-and-final-operator-log-scraper][Jira:\"Test Framework\"] monitor test initial-and-final-operator-log-scraper test evaluation": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper][Jira:\"Test Framework\"] monitor test initial-and-final-operator-log-scraper writing to storage": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/default should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/kube-node-lease should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/kube-public should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/kube-system should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-addon-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-apiserver should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-apiserver-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-aqua should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-authentication should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-authentication-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-backplane should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-backplane-cee should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-backplane-csa should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-backplane-cse should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-backplane-csm should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-backplane-managed-scripts should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-backplane-mcs-tier-two should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-backplane-mobb should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-backplane-sdcicd should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-backplane-srep should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-backplane-tam should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-catalogd should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-cloud-controller-manager should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-cloud-controller-manager-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-cloud-credential-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-cloud-ingress-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-cloud-network-config-controller should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-cloud-platform-infra should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-cluster-api should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-cluster-csi-drivers should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-cluster-machine-approver should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-cluster-node-tuning-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-cluster-olm-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-cluster-samples-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-cluster-storage-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-cluster-version should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-cnv should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-codeready-workspaces should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-commatrix-test should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-config should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-config-managed should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-config-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-console should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-console-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-console-user-settings should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-controller-manager should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-controller-manager-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-24r7f should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-299b8 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-2sqsl should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-4278x should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-4489f should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-4cf28 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-5qh8p should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-5s95q should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-5wvf9 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-65cbx should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-675nb should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-68fnk should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-6cr8v should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-6p4jx should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-6rdmb should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-6rg44 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-6rzk4 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-6s66k should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-79k6l should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-7d6nn should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-7fn64 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-7kqcn should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-7nj6f should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-7qf7l should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-7r8cl should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-86qlg should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-88m98 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-8g7sn should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-8lfjj should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-8sswj should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-8tt24 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-8v7js should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-8vnzp should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-9gvcd should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-9h95v should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-9v69n should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-b52k4 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-c56wj should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-c8z57 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-ccxdw should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-cd8n6 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-ckxhb should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-cl8qc should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-cphs9 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-d2s8q should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-d89kn should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-dhjvr should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-dkvc8 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-f2xrf should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-f4xrs should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-f6x4h should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-fc8f4 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-fchtd should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-fdrrn should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-ftwnt should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-fxbhm should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-gdwdk should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-gkzzr should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-gp6dt should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-gqhr4 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-gzgq2 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-hbmqf should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-hdngb should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-hm7cp should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-hsswz should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-hxxhx should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-hznp8 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-hznwk should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-j42mr should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-j75pq should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-j7gv7 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-j7nns should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-j8dlg should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-jc8mz should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-jhcmq should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-jpchn should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-jtt7m should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-jttgk should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-jxl72 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-k4v2q should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-k677k should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-k8nt2 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-kdkqb should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-kk2cc should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-kk6zz should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-kk8r7 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-kp2pm should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-kq7kt should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-kr9q9 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-ksr47 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-kxvtb should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-lnlxc should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-lqn66 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-m8m8p should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-md4p7 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-mq9bm should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-mqchm should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-mtgf4 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-mwcbq should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-n29h5 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-n84s7 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-n8dv7 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-nc5f2 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-ng74j should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-nnl8g should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-nqr9f should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-nstkq should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-nwdf4 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-pbj7j should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-phnpm should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-pjjnv should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-pxspr should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-pzlnj should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-q4sgc should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-q6886 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-q9fw5 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-qb8mr should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-qqbzq should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-qr5d8 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-qvmnb should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-qwb28 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-r26hg should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-r4tj8 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-rjb2j should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-rmrvh should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-sdqzz should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-sfgzr should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-sfjn5 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-sg2xj should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-skhlb should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-skvsh should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-sqmvn should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-t9bqm should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-tbq6c should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-thqxp should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-tngtj should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-tnmx2 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-tq8kp should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-tzqvd should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-v2dd7 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-v2mwh should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-v4mpw should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-v6mgn should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-v85sq should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-vhzst should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-vlcwg should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-vsnkc should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-vswrb should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-vtt49 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-vzlsz should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-vztdn should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-w565w should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-wc4jp should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-wg6zz should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-wjnxs should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-wjp2x should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-wwp4q should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-x5pcs should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-x6qhs should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-xf4jl should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-xjxqb should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-xnbpf should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-xntq9 should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-xnznp should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-xq7wm should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-zcchd should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-zjllh should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-copy-to-node-zjzvc should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-custom-domains-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-customer-monitoring should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-deployment-validation-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-dns should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-dns-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-e2e-loki should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-etcd should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-etcd-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-frr-k8s should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-host-network should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-image-registry should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-infra should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-ingress should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-ingress-canary should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-ingress-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-insights should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-kni-infra should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-kube-apiserver should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-kube-apiserver-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-kube-controller-manager should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-kube-controller-manager-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-kube-proxy should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-kube-scheduler should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-kube-scheduler-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-kube-storage-version-migrator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-kube-storage-version-migrator-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-logging should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-machine-api should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-machine-config-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-managed-node-metadata-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-managed-upgrade-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-manila-csi-driver should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-marketplace should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-metallb-system should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-monitoring should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-multus should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-network-console should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-network-diagnostics should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-network-node-identity should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-network-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-nmstate should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-node should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-nutanix-infra should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-oauth-apiserver should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-observability-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-ocm-agent-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-openstack-infra should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-operator-controller should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-operator-lifecycle-manager should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-operators should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-operators-redhat should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-osd-metrics should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-ovirt-infra should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-ovn-kubernetes should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-package-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-rbac-permissions should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-route-controller-manager should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-route-monitor-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-security should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-service-ca should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-service-ca-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-splunk-forwarder-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-sre-pruning should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-sriov-network-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-storage should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-user-workload-monitoring should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-validation-webhook should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-velero should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-virtualization-os-images should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:initial-and-final-operator-log-scraper]operators in in ns/openshift-vsphere-infra should not submit invalid apply statements": { + "average_duration": 0 + }, + "[Monitor:interval-serializer][Jira:\"Test Framework\"] monitor test interval-serializer cleanup": { + "average_duration": 0 + }, + "[Monitor:interval-serializer][Jira:\"Test Framework\"] monitor test interval-serializer collection": { + "average_duration": 0 + }, + "[Monitor:interval-serializer][Jira:\"Test Framework\"] monitor test interval-serializer interval construction": { + "average_duration": 0 + }, + "[Monitor:interval-serializer][Jira:\"Test Framework\"] monitor test interval-serializer preparation": { + "average_duration": 0 + }, + "[Monitor:interval-serializer][Jira:\"Test Framework\"] monitor test interval-serializer setup": { + "average_duration": 0 + }, + "[Monitor:interval-serializer][Jira:\"Test Framework\"] monitor test interval-serializer test evaluation": { + "average_duration": 0 + }, + "[Monitor:interval-serializer][Jira:\"Test Framework\"] monitor test interval-serializer writing to storage": { + "average_duration": 1 + }, + "[Monitor:known-image-checker][Jira:\"Test Framework\"] monitor test known-image-checker cleanup": { + "average_duration": 0 + }, + "[Monitor:known-image-checker][Jira:\"Test Framework\"] monitor test known-image-checker collection": { + "average_duration": 0 + }, + "[Monitor:known-image-checker][Jira:\"Test Framework\"] monitor test known-image-checker interval construction": { + "average_duration": 0 + }, + "[Monitor:known-image-checker][Jira:\"Test Framework\"] monitor test known-image-checker preparation": { + "average_duration": 0 + }, + "[Monitor:known-image-checker][Jira:\"Test Framework\"] monitor test known-image-checker setup": { + "average_duration": 0 + }, + "[Monitor:known-image-checker][Jira:\"Test Framework\"] monitor test known-image-checker test evaluation": { + "average_duration": 0 + }, + "[Monitor:known-image-checker][Jira:\"Test Framework\"] monitor test known-image-checker writing to storage": { + "average_duration": 0 + }, + "[Monitor:known-image-checker][sig-arch] Only known images used by tests": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][Jira:\"Node / Kubelet\"] monitor test kubelet-container-restarts cleanup": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][Jira:\"Node / Kubelet\"] monitor test kubelet-container-restarts collection": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][Jira:\"Node / Kubelet\"] monitor test kubelet-container-restarts interval construction": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][Jira:\"Node / Kubelet\"] monitor test kubelet-container-restarts preparation": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][Jira:\"Node / Kubelet\"] monitor test kubelet-container-restarts setup": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][Jira:\"Node / Kubelet\"] monitor test kubelet-container-restarts test evaluation": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][Jira:\"Node / Kubelet\"] monitor test kubelet-container-restarts writing to storage": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/default should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/default should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/default should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/kube-node-lease should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/kube-node-lease should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/kube-node-lease should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/kube-public should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/kube-public should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/kube-public should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/kube-system should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/kube-system should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/kube-system should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-addon-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-addon-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-addon-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-apiserver should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-apiserver should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-apiserver should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-apiserver-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-apiserver-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-apiserver-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-aqua should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-aqua should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-aqua should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-authentication should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-authentication should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-authentication should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-authentication-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-authentication-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-authentication-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-cee should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-cee should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-cee should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-csa should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-csa should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-csa should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-cse should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-cse should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-cse should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-csm should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-csm should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-csm should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-managed-scripts should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-managed-scripts should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-managed-scripts should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-mcs-tier-two should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-mcs-tier-two should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-mcs-tier-two should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-mobb should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-mobb should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-mobb should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-sdcicd should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-sdcicd should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-sdcicd should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-srep should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-srep should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-srep should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-tam should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-tam should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-backplane-tam should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-catalogd should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-catalogd should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-catalogd should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cloud-controller-manager should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cloud-controller-manager should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cloud-controller-manager should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cloud-controller-manager-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cloud-controller-manager-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cloud-controller-manager-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cloud-credential-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cloud-credential-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cloud-credential-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cloud-ingress-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cloud-ingress-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cloud-ingress-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cloud-network-config-controller should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cloud-network-config-controller should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cloud-network-config-controller should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cloud-platform-infra should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cloud-platform-infra should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cloud-platform-infra should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-api should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-api should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-api should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-csi-drivers should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-csi-drivers should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-csi-drivers should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-machine-approver should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-machine-approver should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-machine-approver should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-node-tuning-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-node-tuning-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-node-tuning-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-olm-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-olm-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-olm-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-samples-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-samples-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-samples-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-storage-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-storage-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-storage-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-version should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-version should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cluster-version should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cnv should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cnv should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-cnv should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-codeready-workspaces should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-codeready-workspaces should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-codeready-workspaces should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-commatrix-test should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-commatrix-test should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-commatrix-test should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-config should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-config should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-config should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-config-managed should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-config-managed should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-config-managed should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-config-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-config-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-config-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-console should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-console should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-console should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-console-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-console-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-console-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-console-user-settings should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-console-user-settings should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-console-user-settings should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-controller-manager should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-controller-manager should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-controller-manager should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-controller-manager-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-controller-manager-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-controller-manager-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-custom-domains-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-custom-domains-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-custom-domains-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-customer-monitoring should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-customer-monitoring should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-customer-monitoring should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-deployment-validation-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-deployment-validation-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-deployment-validation-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-dns should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-dns should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-dns should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-dns-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-dns-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-dns-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-e2e-loki should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-e2e-loki should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-e2e-loki should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-etcd should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-etcd should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-etcd should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-etcd-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-etcd-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-etcd-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-frr-k8s should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-frr-k8s should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-frr-k8s should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-host-network should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-host-network should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-host-network should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-image-registry should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-image-registry should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-image-registry should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-infra should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-infra should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-infra should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-ingress should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-ingress should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-ingress should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-ingress-canary should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-ingress-canary should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-ingress-canary should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-ingress-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-ingress-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-ingress-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-insights should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-insights should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-insights should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kni-infra should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kni-infra should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kni-infra should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-apiserver should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-apiserver should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-apiserver should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-apiserver-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-apiserver-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-apiserver-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-controller-manager should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-controller-manager should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-controller-manager should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-controller-manager-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-controller-manager-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-controller-manager-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-proxy should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-proxy should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-proxy should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-scheduler should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-scheduler should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-scheduler should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-scheduler-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-scheduler-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-scheduler-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-storage-version-migrator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-storage-version-migrator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-storage-version-migrator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-storage-version-migrator-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-storage-version-migrator-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-kube-storage-version-migrator-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-logging should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-logging should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-logging should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-machine-api should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-machine-api should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-machine-api should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-machine-config-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-machine-config-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-machine-config-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-managed-node-metadata-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-managed-node-metadata-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-managed-node-metadata-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-managed-upgrade-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-managed-upgrade-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-managed-upgrade-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-manila-csi-driver should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-manila-csi-driver should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-manila-csi-driver should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-marketplace should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-marketplace should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-marketplace should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-metallb-system should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-metallb-system should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-metallb-system should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-monitoring should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-monitoring should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-monitoring should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-multus should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-multus should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-multus should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-network-console should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-network-console should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-network-console should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-network-diagnostics should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-network-diagnostics should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-network-diagnostics should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-network-node-identity should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-network-node-identity should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-network-node-identity should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-network-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-network-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-network-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-nmstate should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-nmstate should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-nmstate should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-node should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-node should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-node should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-nutanix-infra should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-nutanix-infra should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-nutanix-infra should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-oauth-apiserver should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-oauth-apiserver should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-oauth-apiserver should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-observability-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-observability-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-observability-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-ocm-agent-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-ocm-agent-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-ocm-agent-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-openstack-infra should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-openstack-infra should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-openstack-infra should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-operator-controller should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-operator-controller should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-operator-controller should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-operator-lifecycle-manager should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-operator-lifecycle-manager should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-operator-lifecycle-manager should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-operators should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-operators should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-operators should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-operators-redhat should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-operators-redhat should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-operators-redhat should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-osd-metrics should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-osd-metrics should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-osd-metrics should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-ovirt-infra should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-ovirt-infra should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-ovirt-infra should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-ovn-kubernetes should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-ovn-kubernetes should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-ovn-kubernetes should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-package-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-package-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-package-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-rbac-permissions should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-rbac-permissions should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-rbac-permissions should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-route-controller-manager should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-route-controller-manager should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-route-controller-manager should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-route-monitor-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-route-monitor-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-route-monitor-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-security should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-security should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-security should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-service-ca should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-service-ca should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-service-ca should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-service-ca-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-service-ca-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-service-ca-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-splunk-forwarder-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-splunk-forwarder-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-splunk-forwarder-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-sre-pruning should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-sre-pruning should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-sre-pruning should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-sriov-network-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-sriov-network-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-sriov-network-operator should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-storage should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-storage should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-storage should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-user-workload-monitoring should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-user-workload-monitoring should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-user-workload-monitoring should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-validation-webhook should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-validation-webhook should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-validation-webhook should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-velero should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-velero should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-velero should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-virtualization-os-images should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-virtualization-os-images should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-virtualization-os-images should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-vsphere-infra should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-vsphere-infra should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[Monitor:kubelet-container-restarts][sig-architecture] platform pods in ns/openshift-vsphere-infra should not fail to start": { + "average_duration": 0 + }, + "[Monitor:kubelet-log-collector][Jira:\"Node / Kubelet\"] monitor test kubelet-log-collector cleanup": { + "average_duration": 0 + }, + "[Monitor:kubelet-log-collector][Jira:\"Node / Kubelet\"] monitor test kubelet-log-collector collection": { + "average_duration": 3 + }, + "[Monitor:kubelet-log-collector][Jira:\"Node / Kubelet\"] monitor test kubelet-log-collector interval construction": { + "average_duration": 0 + }, + "[Monitor:kubelet-log-collector][Jira:\"Node / Kubelet\"] monitor test kubelet-log-collector preparation": { + "average_duration": 0 + }, + "[Monitor:kubelet-log-collector][Jira:\"Node / Kubelet\"] monitor test kubelet-log-collector setup": { + "average_duration": 0 + }, + "[Monitor:kubelet-log-collector][Jira:\"Node / Kubelet\"] monitor test kubelet-log-collector test evaluation": { + "average_duration": 0 + }, + "[Monitor:kubelet-log-collector][Jira:\"Node / Kubelet\"] monitor test kubelet-log-collector writing to storage": { + "average_duration": 0 + }, + "[Monitor:kubelet-log-collector][Jira:\"Test Framework\"] should not find any systemd-coredump logs in system journal": { + "average_duration": 0 + }, + "[Monitor:kubelet-log-collector][sig-node] kubelet-log-collector detected lease failures in backoff": { + "average_duration": 0 + }, + "[Monitor:kubelet-log-collector][sig-node] kubelet-log-collector detects node failed to lease events in rapid succession": { + "average_duration": 0 + }, + "[Monitor:lease-checker][Jira:\"Test Framework\"] monitor test lease-checker cleanup": { + "average_duration": 0 + }, + "[Monitor:lease-checker][Jira:\"Test Framework\"] monitor test lease-checker collection": { + "average_duration": 0 + }, + "[Monitor:lease-checker][Jira:\"Test Framework\"] monitor test lease-checker interval construction": { + "average_duration": 0 + }, + "[Monitor:lease-checker][Jira:\"Test Framework\"] monitor test lease-checker preparation": { + "average_duration": 0 + }, + "[Monitor:lease-checker][Jira:\"Test Framework\"] monitor test lease-checker setup": { + "average_duration": 0 + }, + "[Monitor:lease-checker][Jira:\"Test Framework\"] monitor test lease-checker test evaluation": { + "average_duration": 0 + }, + "[Monitor:lease-checker][Jira:\"Test Framework\"] monitor test lease-checker writing to storage": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/ must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/default must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/kube-system must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-addon-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-apiserver must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-apiserver-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-authentication must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-authentication-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-cloud-controller-manager must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-cloud-controller-manager-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-cloud-credential-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-cloud-network-config-controller must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-cluster-api must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-cluster-csi-drivers must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-cluster-machine-approver must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-cluster-node-tuning-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-cluster-olm-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-cluster-samples-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-cluster-storage-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-cluster-version must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-cnv must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-config must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-config-managed must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-config-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-console must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-console-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-controller-manager must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-controller-manager-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-dns must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-dns-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-etcd must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-etcd-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-host-network must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-image-registry must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-infra must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-ingress must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-ingress-canary must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-ingress-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-insights must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-kni-infra must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-kube-apiserver must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-kube-apiserver-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-kube-controller-manager must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-kube-controller-manager-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-kube-scheduler must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-kube-scheduler-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-kube-storage-version-migrator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-kube-storage-version-migrator-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-machine-api must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-machine-config-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-managed-node-metadata-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-managed-upgrade-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-marketplace must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-metallb-system must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-monitoring must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-multus must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-network-diagnostics must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-network-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-nutanix-infra must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-oauth-apiserver must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-openstack-infra must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-operator-controller must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-operator-lifecycle-manager must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-operators must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-ovirt-infra must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-ovn-kubernetes must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-package-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-service-ca must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-service-ca-operator must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-user-workload-monitoring must gracefully release": { + "average_duration": 0 + }, + "[Monitor:lease-checker][sig-arch] all leases in ns/openshift-vsphere-infra must gracefully release": { + "average_duration": 0 + }, + "[Monitor:legacy-authentication-invariants][Jira:\"apiserver-auth\"] monitor test legacy-authentication-invariants cleanup": { + "average_duration": 0 + }, + "[Monitor:legacy-authentication-invariants][Jira:\"apiserver-auth\"] monitor test legacy-authentication-invariants collection": { + "average_duration": 0 + }, + "[Monitor:legacy-authentication-invariants][Jira:\"apiserver-auth\"] monitor test legacy-authentication-invariants interval construction": { + "average_duration": 0 + }, + "[Monitor:legacy-authentication-invariants][Jira:\"apiserver-auth\"] monitor test legacy-authentication-invariants preparation": { + "average_duration": 0 + }, + "[Monitor:legacy-authentication-invariants][Jira:\"apiserver-auth\"] monitor test legacy-authentication-invariants setup": { + "average_duration": 0 + }, + "[Monitor:legacy-authentication-invariants][Jira:\"apiserver-auth\"] monitor test legacy-authentication-invariants test evaluation": { + "average_duration": 0 + }, + "[Monitor:legacy-authentication-invariants][Jira:\"apiserver-auth\"] monitor test legacy-authentication-invariants writing to storage": { + "average_duration": 0 + }, + "[Monitor:legacy-authentication-invariants][bz-apiserver-auth] openshift-oauth-apiserver should not get probe error on liveness probe due to timeout": { + "average_duration": 0 + }, + "[Monitor:legacy-authentication-invariants][bz-apiserver-auth] openshift-oauth-apiserver should not get probe error on readiness probe due to connection refused": { + "average_duration": 0 + }, + "[Monitor:legacy-authentication-invariants][bz-apiserver-auth] openshift-oauth-apiserver should not get probe error on readiness probe due to timeout": { + "average_duration": 0 + }, + "[Monitor:legacy-cvo-invariants]OSUpdateStarted event should be recorded for nodes that reach OSUpdateStaged": { + "average_duration": 0 + }, + "[Monitor:legacy-cvo-invariants][Jira:\"Cluster Version Operator\"] monitor test legacy-cvo-invariants cleanup": { + "average_duration": 0 + }, + "[Monitor:legacy-cvo-invariants][Jira:\"Cluster Version Operator\"] monitor test legacy-cvo-invariants collection": { + "average_duration": 0 + }, + "[Monitor:legacy-cvo-invariants][Jira:\"Cluster Version Operator\"] monitor test legacy-cvo-invariants interval construction": { + "average_duration": 0 + }, + "[Monitor:legacy-cvo-invariants][Jira:\"Cluster Version Operator\"] monitor test legacy-cvo-invariants preparation": { + "average_duration": 0 + }, + "[Monitor:legacy-cvo-invariants][Jira:\"Cluster Version Operator\"] monitor test legacy-cvo-invariants setup": { + "average_duration": 0 + }, + "[Monitor:legacy-cvo-invariants][Jira:\"Cluster Version Operator\"] monitor test legacy-cvo-invariants test evaluation": { + "average_duration": 0 + }, + "[Monitor:legacy-cvo-invariants][Jira:\"Cluster Version Operator\"] monitor test legacy-cvo-invariants writing to storage": { + "average_duration": 0 + }, + "[Monitor:legacy-cvo-invariants][bz-Bare Metal Hardware Provisioning] clusteroperator/baremetal must go Progressing=True during an upgrade test": { + "average_duration": 1809 + }, + "[Monitor:legacy-cvo-invariants][bz-Bare Metal Hardware Provisioning] clusteroperator/baremetal should not change condition/Available": { + "average_duration": 5981 + }, + "[Monitor:legacy-cvo-invariants][bz-Bare Metal Hardware Provisioning] clusteroperator/baremetal should not change condition/Degraded": { + "average_duration": 5978 + }, + "[Monitor:legacy-cvo-invariants][bz-Bare Metal Hardware Provisioning] clusteroperator/baremetal should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 45 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Compute] clusteroperator/cloud-controller-manager must go Progressing=True during an upgrade test": { + "average_duration": 1808 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Compute] clusteroperator/cloud-controller-manager should not change condition/Available": { + "average_duration": 5975 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Compute] clusteroperator/cloud-controller-manager should not change condition/Degraded": { + "average_duration": 5980 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Compute] clusteroperator/cloud-controller-manager should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 45 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Compute] clusteroperator/cluster-autoscaler must go Progressing=True during an upgrade test": { + "average_duration": 1880 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Compute] clusteroperator/cluster-autoscaler should not change condition/Available": { + "average_duration": 5981 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Compute] clusteroperator/cluster-autoscaler should not change condition/Degraded": { + "average_duration": 5981 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Compute] clusteroperator/cluster-autoscaler should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 45 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Compute] clusteroperator/control-plane-machine-set must go Progressing=True during an upgrade test": { + "average_duration": 1809 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Compute] clusteroperator/control-plane-machine-set should not change condition/Available": { + "average_duration": 5973 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Compute] clusteroperator/control-plane-machine-set should not change condition/Degraded": { + "average_duration": 5979 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Compute] clusteroperator/control-plane-machine-set should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 45 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Compute] clusteroperator/machine-api must go Progressing=True during an upgrade test": { + "average_duration": 3435 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Compute] clusteroperator/machine-api should not change condition/Available": { + "average_duration": 5981 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Compute] clusteroperator/machine-api should not change condition/Degraded": { + "average_duration": 5981 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Compute] clusteroperator/machine-api should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 84 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Compute] clusteroperator/machine-approver must go Progressing=True during an upgrade test": { + "average_duration": 1811 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Compute] clusteroperator/machine-approver should not change condition/Available": { + "average_duration": 5981 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Compute] clusteroperator/machine-approver should not change condition/Degraded": { + "average_duration": 5981 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Compute] clusteroperator/machine-approver should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 45 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Credential Operator] clusteroperator/cloud-credential must go Progressing=True during an upgrade test": { + "average_duration": 1834 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Credential Operator] clusteroperator/cloud-credential should not change condition/Available": { + "average_duration": 5974 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Credential Operator] clusteroperator/cloud-credential should not change condition/Degraded": { + "average_duration": 5989 + }, + "[Monitor:legacy-cvo-invariants][bz-Cloud Credential Operator] clusteroperator/cloud-credential should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 91 + }, + "[Monitor:legacy-cvo-invariants][bz-DNS] clusteroperator/dns must go Progressing=True during an upgrade test": { + "average_duration": 3365 + }, + "[Monitor:legacy-cvo-invariants][bz-DNS] clusteroperator/dns should not change condition/Available": { + "average_duration": 5056 + }, + "[Monitor:legacy-cvo-invariants][bz-DNS] clusteroperator/dns should not change condition/Degraded": { + "average_duration": 5350 + }, + "[Monitor:legacy-cvo-invariants][bz-DNS] clusteroperator/dns should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 1835 + }, + "[Monitor:legacy-cvo-invariants][bz-Etcd] clusteroperator/etcd must go Progressing=True during an upgrade test": { + "average_duration": 3210 + }, + "[Monitor:legacy-cvo-invariants][bz-Etcd] clusteroperator/etcd should not change condition/Available": { + "average_duration": 5358 + }, + "[Monitor:legacy-cvo-invariants][bz-Etcd] clusteroperator/etcd should not change condition/Degraded": { + "average_duration": 5787 + }, + "[Monitor:legacy-cvo-invariants][bz-Etcd] clusteroperator/etcd should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 92 + }, + "[Monitor:legacy-cvo-invariants][bz-Image Registry] clusteroperator/image-registry must go Progressing=True during an upgrade test": { + "average_duration": 3421 + }, + "[Monitor:legacy-cvo-invariants][bz-Image Registry] clusteroperator/image-registry should not change condition/Available": { + "average_duration": 5129 + }, + "[Monitor:legacy-cvo-invariants][bz-Image Registry] clusteroperator/image-registry should not change condition/Degraded": { + "average_duration": 5070 + }, + "[Monitor:legacy-cvo-invariants][bz-Image Registry] clusteroperator/image-registry should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 1773 + }, + "[Monitor:legacy-cvo-invariants][bz-Insights Operator] clusteroperator/insights must go Progressing=True during an upgrade test": { + "average_duration": 1810 + }, + "[Monitor:legacy-cvo-invariants][bz-Insights Operator] clusteroperator/insights should not change condition/Available": { + "average_duration": 5861 + }, + "[Monitor:legacy-cvo-invariants][bz-Insights Operator] clusteroperator/insights should not change condition/Degraded": { + "average_duration": 5861 + }, + "[Monitor:legacy-cvo-invariants][bz-Insights Operator] clusteroperator/insights should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 45 + }, + "[Monitor:legacy-cvo-invariants][bz-Machine Config Operator] Nodes should reach OSUpdateStaged in a timely fashion": { + "average_duration": 0 + }, + "[Monitor:legacy-cvo-invariants][bz-Machine Config Operator] clusteroperator/machine-config must go Progressing=True during an upgrade test": { + "average_duration": 3471 + }, + "[Monitor:legacy-cvo-invariants][bz-Machine Config Operator] clusteroperator/machine-config should not change condition/Available": { + "average_duration": 5719 + }, + "[Monitor:legacy-cvo-invariants][bz-Machine Config Operator] clusteroperator/machine-config should not change condition/Degraded": { + "average_duration": 5812 + }, + "[Monitor:legacy-cvo-invariants][bz-Management Console] clusteroperator/console must go Progressing=True during an upgrade test": { + "average_duration": 3435 + }, + "[Monitor:legacy-cvo-invariants][bz-Management Console] clusteroperator/console should not change condition/Available": { + "average_duration": 5842 + }, + "[Monitor:legacy-cvo-invariants][bz-Management Console] clusteroperator/console should not change condition/Degraded": { + "average_duration": 5836 + }, + "[Monitor:legacy-cvo-invariants][bz-Management Console] clusteroperator/console should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 154 + }, + "[Monitor:legacy-cvo-invariants][bz-Monitoring] clusteroperator/monitoring must go Progressing=True during an upgrade test": { + "average_duration": 3435 + }, + "[Monitor:legacy-cvo-invariants][bz-Monitoring] clusteroperator/monitoring should not change condition/Available": { + "average_duration": 5982 + }, + "[Monitor:legacy-cvo-invariants][bz-Monitoring] clusteroperator/monitoring should not change condition/Degraded": { + "average_duration": 5983 + }, + "[Monitor:legacy-cvo-invariants][bz-Monitoring] clusteroperator/monitoring should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 84 + }, + "[Monitor:legacy-cvo-invariants][bz-Networking] clusteroperator/network must go Progressing=True during an upgrade test": { + "average_duration": 3418 + }, + "[Monitor:legacy-cvo-invariants][bz-Networking] clusteroperator/network should not change condition/Available": { + "average_duration": 5029 + }, + "[Monitor:legacy-cvo-invariants][bz-Networking] clusteroperator/network should not change condition/Degraded": { + "average_duration": 5118 + }, + "[Monitor:legacy-cvo-invariants][bz-Networking] clusteroperator/network should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 1775 + }, + "[Monitor:legacy-cvo-invariants][bz-Node Tuning Operator] clusteroperator/node-tuning must go Progressing=True during an upgrade test": { + "average_duration": 3435 + }, + "[Monitor:legacy-cvo-invariants][bz-Node Tuning Operator] clusteroperator/node-tuning should not change condition/Available": { + "average_duration": 5089 + }, + "[Monitor:legacy-cvo-invariants][bz-Node Tuning Operator] clusteroperator/node-tuning should not change condition/Degraded": { + "average_duration": 5076 + }, + "[Monitor:legacy-cvo-invariants][bz-Node Tuning Operator] clusteroperator/node-tuning should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 1769 + }, + "[Monitor:legacy-cvo-invariants][bz-OLM] clusteroperator/marketplace must go Progressing=True during an upgrade test": { + "average_duration": 1872 + }, + "[Monitor:legacy-cvo-invariants][bz-OLM] clusteroperator/marketplace should not change condition/Available": { + "average_duration": 5981 + }, + "[Monitor:legacy-cvo-invariants][bz-OLM] clusteroperator/marketplace should not change condition/Degraded": { + "average_duration": 5981 + }, + "[Monitor:legacy-cvo-invariants][bz-OLM] clusteroperator/marketplace should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 45 + }, + "[Monitor:legacy-cvo-invariants][bz-OLM] clusteroperator/olm must go Progressing=True during an upgrade test": { + "average_duration": 3210 + }, + "[Monitor:legacy-cvo-invariants][bz-OLM] clusteroperator/olm should not change condition/Available": { + "average_duration": 2567 + }, + "[Monitor:legacy-cvo-invariants][bz-OLM] clusteroperator/olm should not change condition/Degraded": { + "average_duration": 1458 + }, + "[Monitor:legacy-cvo-invariants][bz-OLM] clusteroperator/olm should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 591 + }, + "[Monitor:legacy-cvo-invariants][bz-OLM] clusteroperator/operator-lifecycle-manager must go Progressing=True during an upgrade test": { + "average_duration": 1810 + }, + "[Monitor:legacy-cvo-invariants][bz-OLM] clusteroperator/operator-lifecycle-manager should not change condition/Available": { + "average_duration": 5981 + }, + "[Monitor:legacy-cvo-invariants][bz-OLM] clusteroperator/operator-lifecycle-manager should not change condition/Degraded": { + "average_duration": 5981 + }, + "[Monitor:legacy-cvo-invariants][bz-OLM] clusteroperator/operator-lifecycle-manager should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 45 + }, + "[Monitor:legacy-cvo-invariants][bz-OLM] clusteroperator/operator-lifecycle-manager-catalog must go Progressing=True during an upgrade test": { + "average_duration": 3435 + }, + "[Monitor:legacy-cvo-invariants][bz-OLM] clusteroperator/operator-lifecycle-manager-catalog should not change condition/Available": { + "average_duration": 5981 + }, + "[Monitor:legacy-cvo-invariants][bz-OLM] clusteroperator/operator-lifecycle-manager-catalog should not change condition/Degraded": { + "average_duration": 5981 + }, + "[Monitor:legacy-cvo-invariants][bz-OLM] clusteroperator/operator-lifecycle-manager-catalog should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 84 + }, + "[Monitor:legacy-cvo-invariants][bz-OLM] clusteroperator/operator-lifecycle-manager-packageserver must go Progressing=True during an upgrade test": { + "average_duration": 3287 + }, + "[Monitor:legacy-cvo-invariants][bz-OLM] clusteroperator/operator-lifecycle-manager-packageserver should not change condition/Available": { + "average_duration": 5995 + }, + "[Monitor:legacy-cvo-invariants][bz-OLM] clusteroperator/operator-lifecycle-manager-packageserver should not change condition/Degraded": { + "average_duration": 5981 + }, + "[Monitor:legacy-cvo-invariants][bz-OLM] clusteroperator/operator-lifecycle-manager-packageserver should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 335 + }, + "[Monitor:legacy-cvo-invariants][bz-Routing] clusteroperator/ingress must go Progressing=True during an upgrade test": { + "average_duration": 3384 + }, + "[Monitor:legacy-cvo-invariants][bz-Routing] clusteroperator/ingress should not change condition/Available": { + "average_duration": 1599 + }, + "[Monitor:legacy-cvo-invariants][bz-Routing] clusteroperator/ingress should not change condition/Degraded": { + "average_duration": 1588 + }, + "[Monitor:legacy-cvo-invariants][bz-Routing] clusteroperator/ingress should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 1831 + }, + "[Monitor:legacy-cvo-invariants][bz-Samples] clusteroperator/openshift-samples must go Progressing=True during an upgrade test": { + "average_duration": 1832 + }, + "[Monitor:legacy-cvo-invariants][bz-Samples] clusteroperator/openshift-samples should not change condition/Available": { + "average_duration": 5984 + }, + "[Monitor:legacy-cvo-invariants][bz-Samples] clusteroperator/openshift-samples should not change condition/Degraded": { + "average_duration": 5984 + }, + "[Monitor:legacy-cvo-invariants][bz-Samples] clusteroperator/openshift-samples should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 45 + }, + "[Monitor:legacy-cvo-invariants][bz-Storage] clusteroperator/csi-snapshot-controller must go Progressing=True during an upgrade test": { + "average_duration": 3345 + }, + "[Monitor:legacy-cvo-invariants][bz-Storage] clusteroperator/csi-snapshot-controller should not change condition/Available": { + "average_duration": 5956 + }, + "[Monitor:legacy-cvo-invariants][bz-Storage] clusteroperator/csi-snapshot-controller should not change condition/Degraded": { + "average_duration": 5964 + }, + "[Monitor:legacy-cvo-invariants][bz-Storage] clusteroperator/csi-snapshot-controller should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 1770 + }, + "[Monitor:legacy-cvo-invariants][bz-Storage] clusteroperator/storage must go Progressing=True during an upgrade test": { + "average_duration": 3435 + }, + "[Monitor:legacy-cvo-invariants][bz-Storage] clusteroperator/storage should not change condition/Available": { + "average_duration": 5425 + }, + "[Monitor:legacy-cvo-invariants][bz-Storage] clusteroperator/storage should not change condition/Degraded": { + "average_duration": 5421 + }, + "[Monitor:legacy-cvo-invariants][bz-Storage] clusteroperator/storage should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 1742 + }, + "[Monitor:legacy-cvo-invariants][bz-apiserver-auth] clusteroperator/authentication must go Progressing=True during an upgrade test": { + "average_duration": 3223 + }, + "[Monitor:legacy-cvo-invariants][bz-apiserver-auth] clusteroperator/authentication should not change condition/Available": { + "average_duration": 5397 + }, + "[Monitor:legacy-cvo-invariants][bz-apiserver-auth] clusteroperator/authentication should not change condition/Degraded": { + "average_duration": 5354 + }, + "[Monitor:legacy-cvo-invariants][bz-apiserver-auth] clusteroperator/authentication should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 96 + }, + "[Monitor:legacy-cvo-invariants][bz-config-operator] clusteroperator/config-operator must go Progressing=True during an upgrade test": { + "average_duration": 1809 + }, + "[Monitor:legacy-cvo-invariants][bz-config-operator] clusteroperator/config-operator should not change condition/Available": { + "average_duration": 5957 + }, + "[Monitor:legacy-cvo-invariants][bz-config-operator] clusteroperator/config-operator should not change condition/Degraded": { + "average_duration": 5957 + }, + "[Monitor:legacy-cvo-invariants][bz-config-operator] clusteroperator/config-operator should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 0 + }, + "[Monitor:legacy-cvo-invariants][bz-kube-apiserver] clusteroperator/kube-apiserver must go Progressing=True during an upgrade test": { + "average_duration": 3460 + }, + "[Monitor:legacy-cvo-invariants][bz-kube-apiserver] clusteroperator/kube-apiserver should not change condition/Available": { + "average_duration": 678 + }, + "[Monitor:legacy-cvo-invariants][bz-kube-apiserver] clusteroperator/kube-apiserver should not change condition/Degraded": { + "average_duration": 1519 + }, + "[Monitor:legacy-cvo-invariants][bz-kube-apiserver] clusteroperator/kube-apiserver should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 84 + }, + "[Monitor:legacy-cvo-invariants][bz-kube-controller-manager] clusteroperator/kube-controller-manager must go Progressing=True during an upgrade test": { + "average_duration": 3442 + }, + "[Monitor:legacy-cvo-invariants][bz-kube-controller-manager] clusteroperator/kube-controller-manager should not change condition/Available": { + "average_duration": 5967 + }, + "[Monitor:legacy-cvo-invariants][bz-kube-controller-manager] clusteroperator/kube-controller-manager should not change condition/Degraded": { + "average_duration": 6103 + }, + "[Monitor:legacy-cvo-invariants][bz-kube-controller-manager] clusteroperator/kube-controller-manager should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 84 + }, + "[Monitor:legacy-cvo-invariants][bz-kube-scheduler] clusteroperator/kube-scheduler must go Progressing=True during an upgrade test": { + "average_duration": 3364 + }, + "[Monitor:legacy-cvo-invariants][bz-kube-scheduler] clusteroperator/kube-scheduler should not change condition/Available": { + "average_duration": 5967 + }, + "[Monitor:legacy-cvo-invariants][bz-kube-scheduler] clusteroperator/kube-scheduler should not change condition/Degraded": { + "average_duration": 6103 + }, + "[Monitor:legacy-cvo-invariants][bz-kube-scheduler] clusteroperator/kube-scheduler should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 84 + }, + "[Monitor:legacy-cvo-invariants][bz-kube-storage-version-migrator] clusteroperator/kube-storage-version-migrator must go Progressing=True during an upgrade test": { + "average_duration": 3335 + }, + "[Monitor:legacy-cvo-invariants][bz-kube-storage-version-migrator] clusteroperator/kube-storage-version-migrator should not change condition/Available": { + "average_duration": 6215 + }, + "[Monitor:legacy-cvo-invariants][bz-kube-storage-version-migrator] clusteroperator/kube-storage-version-migrator should not change condition/Degraded": { + "average_duration": 5961 + }, + "[Monitor:legacy-cvo-invariants][bz-kube-storage-version-migrator] clusteroperator/kube-storage-version-migrator should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 1726 + }, + "[Monitor:legacy-cvo-invariants][bz-openshift-apiserver] clusteroperator/openshift-apiserver must go Progressing=True during an upgrade test": { + "average_duration": 3182 + }, + "[Monitor:legacy-cvo-invariants][bz-openshift-apiserver] clusteroperator/openshift-apiserver should not change condition/Available": { + "average_duration": 5945 + }, + "[Monitor:legacy-cvo-invariants][bz-openshift-apiserver] clusteroperator/openshift-apiserver should not change condition/Degraded": { + "average_duration": 5949 + }, + "[Monitor:legacy-cvo-invariants][bz-openshift-apiserver] clusteroperator/openshift-apiserver should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 92 + }, + "[Monitor:legacy-cvo-invariants][bz-openshift-controller-manager] clusteroperator/openshift-controller-manager must go Progressing=True during an upgrade test": { + "average_duration": 3432 + }, + "[Monitor:legacy-cvo-invariants][bz-openshift-controller-manager] clusteroperator/openshift-controller-manager should not change condition/Available": { + "average_duration": 5889 + }, + "[Monitor:legacy-cvo-invariants][bz-openshift-controller-manager] clusteroperator/openshift-controller-manager should not change condition/Degraded": { + "average_duration": 5896 + }, + "[Monitor:legacy-cvo-invariants][bz-openshift-controller-manager] clusteroperator/openshift-controller-manager should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 499 + }, + "[Monitor:legacy-cvo-invariants][bz-service-ca] clusteroperator/service-ca must go Progressing=True during an upgrade test": { + "average_duration": 3342 + }, + "[Monitor:legacy-cvo-invariants][bz-service-ca] clusteroperator/service-ca should not change condition/Available": { + "average_duration": 5966 + }, + "[Monitor:legacy-cvo-invariants][bz-service-ca] clusteroperator/service-ca should not change condition/Degraded": { + "average_duration": 5965 + }, + "[Monitor:legacy-cvo-invariants][bz-service-ca] clusteroperator/service-ca should stay Progressing=False while MCO is Progressing=True": { + "average_duration": 1736 + }, + "[Monitor:legacy-etcd-invariants][Jira:\"etcd\"] monitor test legacy-etcd-invariants cleanup": { + "average_duration": 0 + }, + "[Monitor:legacy-etcd-invariants][Jira:\"etcd\"] monitor test legacy-etcd-invariants collection": { + "average_duration": 0 + }, + "[Monitor:legacy-etcd-invariants][Jira:\"etcd\"] monitor test legacy-etcd-invariants interval construction": { + "average_duration": 0 + }, + "[Monitor:legacy-etcd-invariants][Jira:\"etcd\"] monitor test legacy-etcd-invariants preparation": { + "average_duration": 0 + }, + "[Monitor:legacy-etcd-invariants][Jira:\"etcd\"] monitor test legacy-etcd-invariants setup": { + "average_duration": 0 + }, + "[Monitor:legacy-etcd-invariants][Jira:\"etcd\"] monitor test legacy-etcd-invariants test evaluation": { + "average_duration": 0 + }, + "[Monitor:legacy-etcd-invariants][Jira:\"etcd\"] monitor test legacy-etcd-invariants writing to storage": { + "average_duration": 0 + }, + "[Monitor:legacy-etcd-invariants][bz-etcd] pathological event should not see excessive RequiredInstallerResourcesMissing secrets": { + "average_duration": 0 + }, + "[Monitor:legacy-etcd-invariants][sig-etcd] etcd pod logs do not log dropped internal Raft messages": { + "average_duration": 0 + }, + "[Monitor:legacy-etcd-invariants][sig-etcd] etcd pod logs do not log slow fdatasync": { + "average_duration": 0 + }, + "[Monitor:legacy-etcd-invariants][sig-etcd] etcd should not log excessive overloaded network messages": { + "average_duration": 0 + }, + "[Monitor:legacy-etcd-invariants][sig-node] pathological event OperatorStatusChanged condition does not occur too often": { + "average_duration": 0 + }, + "[Monitor:legacy-kube-apiserver-invariants][Jira:\"kube-apiserver\"] kube API servers should not experience disruption near the start of E2E testing": { + "average_duration": 0 + }, + "[Monitor:legacy-kube-apiserver-invariants][Jira:\"kube-apiserver\"] monitor test legacy-kube-apiserver-invariants cleanup": { + "average_duration": 0 + }, + "[Monitor:legacy-kube-apiserver-invariants][Jira:\"kube-apiserver\"] monitor test legacy-kube-apiserver-invariants collection": { + "average_duration": 0 + }, + "[Monitor:legacy-kube-apiserver-invariants][Jira:\"kube-apiserver\"] monitor test legacy-kube-apiserver-invariants interval construction": { + "average_duration": 0 + }, + "[Monitor:legacy-kube-apiserver-invariants][Jira:\"kube-apiserver\"] monitor test legacy-kube-apiserver-invariants preparation": { + "average_duration": 0 + }, + "[Monitor:legacy-kube-apiserver-invariants][Jira:\"kube-apiserver\"] monitor test legacy-kube-apiserver-invariants setup": { + "average_duration": 0 + }, + "[Monitor:legacy-kube-apiserver-invariants][Jira:\"kube-apiserver\"] monitor test legacy-kube-apiserver-invariants test evaluation": { + "average_duration": 0 + }, + "[Monitor:legacy-kube-apiserver-invariants][Jira:\"kube-apiserver\"] monitor test legacy-kube-apiserver-invariants writing to storage": { + "average_duration": 0 + }, + "[Monitor:legacy-kube-apiserver-invariants][Jira:\"oauth-apiserver\"] oauth API servers should not experience disruption near the start of E2E testing": { + "average_duration": 0 + }, + "[Monitor:legacy-kube-apiserver-invariants][bz-kube-apiserver] kube-apiserver should be accessible by clients using internal load balancer without iptables issues": { + "average_duration": 0 + }, + "[Monitor:legacy-kube-apiserver-invariants][sig-api-machinery] the pod.spec.nodeName field is immutable, once set cannot be changed": { + "average_duration": 0 + }, + "[Monitor:legacy-kube-apiserver-invariants][sig-node] static pods should start after being created": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][Jira:\"Networking / cluster-network-operator\"] monitor test legacy-networking-invariants cleanup": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][Jira:\"Networking / cluster-network-operator\"] monitor test legacy-networking-invariants collection": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][Jira:\"Networking / cluster-network-operator\"] monitor test legacy-networking-invariants interval construction": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][Jira:\"Networking / cluster-network-operator\"] monitor test legacy-networking-invariants preparation": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][Jira:\"Networking / cluster-network-operator\"] monitor test legacy-networking-invariants setup": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][Jira:\"Networking / cluster-network-operator\"] monitor test legacy-networking-invariants test evaluation": { + "average_duration": 1 + }, + "[Monitor:legacy-networking-invariants][Jira:\"Networking / cluster-network-operator\"] monitor test legacy-networking-invariants writing to storage": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][bz-networking] ovnkube-node readiness probe should not fail repeatedly": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][bz-networking] pod IPs should not be used by two pods at the same time": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] Disruption should not overlap with DNS problems in cluster running tests": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] NetworkManager should not log too many netlink events to system journal": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] ovs-vswitchd should not log any unreasonably long poll intervals to system journal": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] pods should successfully create sandboxes by adding pod to network": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] pods should successfully create sandboxes by binding hostport": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] pods should successfully create sandboxes by getting pod": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] pods should successfully create sandboxes by initializing docker source": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] pods should successfully create sandboxes by not timing out": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] pods should successfully create sandboxes by other": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] pods should successfully create sandboxes by ovn default network ready": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] pods should successfully create sandboxes by pinging container registry": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] pods should successfully create sandboxes by reading container": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] pods should successfully create sandboxes by writing child": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] pods should successfully create sandboxes by writing network status": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for cache-kube-api-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for cache-kube-api-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for cache-oauth-api-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for cache-oauth-api-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for cache-openshift-api-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for cache-openshift-api-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for ingress-to-console-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for ingress-to-console-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for ingress-to-oauth-server-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for ingress-to-oauth-server-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for kube-api-http1-internal-lb-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for kube-api-http1-internal-lb-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for kube-api-http1-service-network-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for kube-api-http1-service-network-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for kube-api-http2-internal-lb-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for kube-api-http2-internal-lb-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for kube-api-http2-service-network-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for kube-api-http2-service-network-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for kube-api-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for kube-api-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for metrics-api-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for metrics-api-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for oauth-api-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for oauth-api-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for openshift-api-http2-internal-lb-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for openshift-api-http2-internal-lb-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for openshift-api-http2-service-network-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for openshift-api-http2-service-network-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for openshift-api-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be nearly zero single second disruptions for openshift-api-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for cache-kube-api-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for cache-kube-api-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for cache-oauth-api-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for cache-oauth-api-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for cache-openshift-api-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for cache-openshift-api-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for ingress-to-console-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for ingress-to-console-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for ingress-to-oauth-server-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for ingress-to-oauth-server-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for kube-api-http1-internal-lb-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for kube-api-http1-internal-lb-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for kube-api-http1-service-network-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for kube-api-http1-service-network-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for kube-api-http2-internal-lb-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for kube-api-http2-internal-lb-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for kube-api-http2-service-network-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for kube-api-http2-service-network-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for kube-api-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for kube-api-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for metrics-api-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for metrics-api-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for oauth-api-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for oauth-api-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for openshift-api-http2-internal-lb-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for openshift-api-http2-internal-lb-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for openshift-api-http2-service-network-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for openshift-api-http2-service-network-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for openshift-api-new-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-network] there should be reasonably few single second disruptions for openshift-api-reused-connections": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-networking] pathological event should not see excessive FailedToUpdateEndpointSlices Error updating Endpoint Slices": { + "average_duration": 0 + }, + "[Monitor:legacy-networking-invariants][sig-trt] no DNS lookup errors should be encountered in disruption samplers": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][Jira:\"Node / Kubelet\"] monitor test legacy-node-invariants cleanup": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][Jira:\"Node / Kubelet\"] monitor test legacy-node-invariants collection": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][Jira:\"Node / Kubelet\"] monitor test legacy-node-invariants interval construction": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][Jira:\"Node / Kubelet\"] monitor test legacy-node-invariants preparation": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][Jira:\"Node / Kubelet\"] monitor test legacy-node-invariants setup": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][Jira:\"Node / Kubelet\"] monitor test legacy-node-invariants test evaluation": { + "average_duration": 4 + }, + "[Monitor:legacy-node-invariants][Jira:\"Node / Kubelet\"] monitor test legacy-node-invariants writing to storage": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-api-machinery] kube-apiserver terminates within graceful termination period": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-arch] openshift-marketplace pods should not get excessive startupProbe failures": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-arch] pathological event should not see excessive pull back-off on registry.redhat.io": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-architecture] platform pods should not be force deleted with gracePeriod 0": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/default": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/kube-system": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-apiserver": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-apiserver-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-authentication": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-authentication-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-cloud-controller-manager": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-cloud-controller-manager-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-cloud-credential-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-cloud-network-config-controller": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-cluster-csi-drivers": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-cluster-machine-approver": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-cluster-node-tuning-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-cluster-samples-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-cluster-storage-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-cluster-version": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-config": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-config-managed": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-config-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-console": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-console-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-controller-manager": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-controller-manager-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-dns": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-dns-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-etcd": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-etcd-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-host-network": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-image-registry": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-ingress": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-ingress-canary": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-ingress-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-insights": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-kni-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-kube-apiserver": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-kube-apiserver-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-kube-controller-manager": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-kube-controller-manager-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-kube-scheduler": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-kube-scheduler-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-kube-storage-version-migrator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-kube-storage-version-migrator-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-machine-api": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-machine-config-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-marketplace": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-monitoring": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-multus": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-network-diagnostics": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-network-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-nutanix-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-oauth-apiserver": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-openstack-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-operator-lifecycle-manager": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-operators": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-ovirt-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-ovn-kubernetes": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-service-ca": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-service-ca-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-user-workload-monitoring": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-vsphere-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers in e2e namespaces": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-coreos] master nodes updated": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] kubelet logs do not contain ErrImagePull unrecognized signature format": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] kubelet logs do not contain http client connection lost errors": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] kubelet logs do not contain late lease update errors": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] kubelet should be able to delete cgroups path": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] kubelet should not use an anonymous user": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] kubelet terminates kube-apiserver gracefully": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] nodes should not go unready after being upgraded and go unready only once": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] overlapping apiserver process detected during kube-apiserver rollout": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] pathological event FailedScheduling condition does not occur too often": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] pathological event NodeHasNoDiskPressure condition does not occur too often": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] pathological event NodeHasSufficeintMemory condition does not occur too often": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] pathological event NodeHasSufficientPID condition does not occur too often": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] pathological event openshift-config-operator readiness probe should not fail due to timeout": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] pathological event openshift-config-operator should not get probe error on liveness probe due to timeout": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] pathological event openshift-config-operator should not get probe error on readiness probe due to connection refused": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] pods should never transition back to pending": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] pods should not fail on systemd timeouts": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] should not encounter ErrImagePull QPS exceeded error in non-openshift namespace pods": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] should not encounter ErrImagePull QPS exceeded error in openshift namespace pods": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] should not encounter ErrImagePull in non-openshift namespace pods": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] should not encounter ErrImagePull in openshift namespace pods": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] should not encounter ErrImagePull manifest unknown error in non-openshift namespace pods": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] should not encounter ErrImagePull manifest unknown error in openshift namespace pods": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] should not encounter ErrImagePull read connection timeout in non-openshift namespace pods": { + "average_duration": 0 + }, + "[Monitor:legacy-node-invariants][sig-node] should not encounter ErrImagePull read connection timeout in openshift namespace pods": { + "average_duration": 0 + }, + "[Monitor:legacy-storage-invariants][Jira:\"Storage\"] monitor test legacy-storage-invariants cleanup": { + "average_duration": 0 + }, + "[Monitor:legacy-storage-invariants][Jira:\"Storage\"] monitor test legacy-storage-invariants collection": { + "average_duration": 0 + }, + "[Monitor:legacy-storage-invariants][Jira:\"Storage\"] monitor test legacy-storage-invariants interval construction": { + "average_duration": 0 + }, + "[Monitor:legacy-storage-invariants][Jira:\"Storage\"] monitor test legacy-storage-invariants preparation": { + "average_duration": 0 + }, + "[Monitor:legacy-storage-invariants][Jira:\"Storage\"] monitor test legacy-storage-invariants setup": { + "average_duration": 0 + }, + "[Monitor:legacy-storage-invariants][Jira:\"Storage\"] monitor test legacy-storage-invariants test evaluation": { + "average_duration": 0 + }, + "[Monitor:legacy-storage-invariants][Jira:\"Storage\"] monitor test legacy-storage-invariants writing to storage": { + "average_duration": 0 + }, + "[Monitor:legacy-storage-invariants][sig-arch] cloud API quota should not be exceeded": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Cloud Compute][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cloud-controller-manager": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Cloud Compute][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cloud-controller-manager-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Cloud Compute][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cluster-machine-approver": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Cloud Compute][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-machine-api": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Cloud Compute][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cloud-controller-manager": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Cloud Compute][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cloud-controller-manager-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Cloud Compute][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cluster-machine-approver": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Cloud Compute][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-machine-api": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Cloud Credential Operator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cloud-credential-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Cloud Credential Operator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cloud-credential-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Cluster Version Operator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cluster-version": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Cluster Version Operator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cluster-version": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][DNS][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-dns": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][DNS][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-dns-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][DNS][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-dns": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][DNS][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-dns-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Etcd][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-etcd": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Etcd][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-etcd-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Etcd][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-etcd": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Etcd][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-etcd-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Image Registry][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-image-registry": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Image Registry][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-image-registry": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants-alerts cleanup": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants-alerts collection": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants-alerts interval construction": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants-alerts preparation": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants-alerts setup": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants-alerts test evaluation": { + "average_duration": 6 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants-alerts writing to storage": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Machine Config Operator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-machine-config-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Machine Config Operator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-machine-config-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Management Console][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-console": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Management Console][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-console-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Management Console][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-console": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Management Console][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-console-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Monitoring][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-monitoring": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Monitoring][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-monitoring": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Networking][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cloud-network-config-controller": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Networking][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-host-network": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Networking][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-multus": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Networking][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-network-diagnostics": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Networking][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-network-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Networking][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-ovn-kubernetes": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Networking][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cloud-network-config-controller": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Networking][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-host-network": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Networking][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-multus": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Networking][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-network-diagnostics": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Networking][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-network-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Networking][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-ovn-kubernetes": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Node Tuning Operator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cluster-node-tuning-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Node Tuning Operator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cluster-node-tuning-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][OLM][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-marketplace": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][OLM][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-operator-lifecycle-manager": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][OLM][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-operators": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][OLM][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-marketplace": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][OLM][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-operator-lifecycle-manager": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][OLM][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-operators": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Routing][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-ingress": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Routing][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-ingress-canary": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Routing][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-ingress-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Routing][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-ingress": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Routing][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-ingress-canary": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Routing][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-ingress-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Samples][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cluster-samples-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Samples][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cluster-samples-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Storage][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cluster-csi-drivers": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Storage][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cluster-storage-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Storage][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cluster-csi-drivers": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Storage][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cluster-storage-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above info in all the other namespaces": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/default": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/kube-system": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-config": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-config-managed": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-insights": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kni-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-nutanix-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-openstack-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-ovirt-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-user-workload-monitoring": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-vsphere-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above pending in all the other namespaces": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/default": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/kube-system": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-config": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-config-managed": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-insights": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kni-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-nutanix-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-openstack-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-ovirt-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-user-workload-monitoring": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-vsphere-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][apiserver-auth][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-authentication": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][apiserver-auth][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-authentication-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][apiserver-auth][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-authentication": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][apiserver-auth][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-authentication-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-Cluster Version Operator][invariant] alert/ClusterOperatorDegraded should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-OLM][invariant] alert/RedhatOperatorsCatalogError should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-OLM][invariant] alert/RedhatOperatorsCatalogError should not be at or above pending": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-apiserver-auth][invariant] alert/PodSecurityViolation should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-etcd][invariant] alert/etcdGRPCRequestsSlow should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-etcd][invariant] alert/etcdGRPCRequestsSlow should not be at or above pending": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-etcd][invariant] alert/etcdHighCommitDurations should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-etcd][invariant] alert/etcdHighCommitDurations should not be at or above pending": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-etcd][invariant] alert/etcdHighFsyncDurations should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-etcd][invariant] alert/etcdHighFsyncDurations should not be at or above pending": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-etcd][invariant] alert/etcdHighNumberOfFailedGRPCRequests should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-etcd][invariant] alert/etcdHighNumberOfFailedGRPCRequests should not be at or above pending": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-etcd][invariant] alert/etcdHighNumberOfLeaderChanges should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-etcd][invariant] alert/etcdHighNumberOfLeaderChanges should not be at or above pending": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-etcd][invariant] alert/etcdInsufficientMembers should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-etcd][invariant] alert/etcdInsufficientMembers should not be at or above pending": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-etcd][invariant] alert/etcdMemberCommunicationSlow should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-etcd][invariant] alert/etcdMemberCommunicationSlow should not be at or above pending": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-etcd][invariant] alert/etcdMembersDown should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-etcd][invariant] alert/etcdMembersDown should not be at or above pending": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-etcd][invariant] alert/etcdNoLeader should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-etcd][invariant] alert/etcdNoLeader should not be at or above pending": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-kube-apiserver][invariant] alert/KubeAPIErrorBudgetBurn should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-kube-apiserver][invariant] alert/KubeAPIErrorBudgetBurn should not be at or above pending": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-kube-apiserver][invariant] alert/KubeClientErrors should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-kube-apiserver][invariant] alert/KubeClientErrors should not be at or above pending": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-machine config operator][invariant] alert/MCDDrainError should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-machine config operator][invariant] alert/MCDDrainError should not be at or above pending": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-machine config operator][invariant] alert/MCDPivotError should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-machine config operator][invariant] alert/MCDPivotError should not be at or above pending": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-monitoring][invariant] alert/PrometheusOperatorWatchErrors should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-monitoring][invariant] alert/PrometheusOperatorWatchErrors should not be at or above pending": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-monitoring][invariant] alert/Watchdog must have no gaps or changes": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-networking][invariant] alert/OVNKubernetesResourceRetryFailure should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-networking][invariant] alert/OVNKubernetesResourceRetryFailure should not be at or above pending": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-samples][invariant] alert/SamplesImagestreamImportFailing should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-samples][invariant] alert/SamplesImagestreamImportFailing should not be at or above pending": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-single-node][invariant] alert/KubeMemoryOvercommit should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-single-node][invariant] alert/KubeMemoryOvercommit should not be at or above pending": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-storage][invariant] alert/KubePersistentVolumeErrors should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-storage][invariant] alert/KubePersistentVolumeErrors should not be at or above pending": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-storage][invariant] alert/VSphereOpenshiftNodeHealthFail should not be at or above info": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][bz-storage][invariant] alert/VSphereOpenshiftNodeHealthFail should not be at or above pending": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][config-operator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-config-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][config-operator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-config-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][kube-apiserver][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-apiserver": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][kube-apiserver][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-apiserver-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][kube-apiserver][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-apiserver": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][kube-apiserver][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-apiserver-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][kube-controller-manager][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-controller-manager": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][kube-controller-manager][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-controller-manager-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][kube-controller-manager][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-controller-manager": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][kube-controller-manager][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-controller-manager-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][kube-scheduler][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-scheduler": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][kube-scheduler][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-scheduler-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][kube-scheduler][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-scheduler": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][kube-scheduler][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-scheduler-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][kube-storage-version-migrator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-storage-version-migrator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][kube-storage-version-migrator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-storage-version-migrator-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][kube-storage-version-migrator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-storage-version-migrator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][kube-storage-version-migrator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-storage-version-migrator-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][oauth-apiserver][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-oauth-apiserver": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][oauth-apiserver][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-oauth-apiserver": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][openshift-apiserver][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-apiserver": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][openshift-apiserver][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-apiserver-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][openshift-apiserver][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-apiserver": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][openshift-apiserver][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-apiserver-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][openshift-controller-manager][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-controller-manager": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][openshift-controller-manager][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-controller-manager-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][openshift-controller-manager][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-controller-manager": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][openshift-controller-manager][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-controller-manager-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][service-ca][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-service-ca": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][service-ca][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-service-ca-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][service-ca][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-service-ca": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][service-ca][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-service-ca-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][sig-node][invariant] alert/TargetDown should not be at or above info in ns/kube-system": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][sig-trt][invariant] No alerts without an explicit test should be firing/pending more than historically": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-alerts][sig-trt][invariant] No new alerts should be firing": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants-pathological cleanup": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants-pathological collection": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants-pathological interval construction": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants-pathological preparation": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants-pathological setup": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants-pathological test evaluation": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][Jira:\"Test Framework\"] monitor test legacy-test-framework-invariants-pathological writing to storage": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/default": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/kube-system": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-apiserver": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-apiserver-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-authentication": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-authentication-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-cloud-controller-manager": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-cloud-controller-manager-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-cloud-credential-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-cloud-network-config-controller": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-cluster-csi-drivers": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-cluster-machine-approver": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-cluster-node-tuning-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-cluster-samples-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-cluster-storage-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-cluster-version": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-config": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-config-managed": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-config-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-console": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-console-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-controller-manager": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-controller-manager-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-dns": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-dns-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-etcd": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-etcd-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-host-network": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-image-registry": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-ingress": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-ingress-canary": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-ingress-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-insights": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-kni-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-kube-apiserver": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-kube-apiserver-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-kube-controller-manager": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-kube-controller-manager-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-kube-scheduler": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-kube-scheduler-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-kube-storage-version-migrator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-kube-storage-version-migrator-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-machine-api": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-machine-config-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-marketplace": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-monitoring": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-multus": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-network-diagnostics": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-network-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-nutanix-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-oauth-apiserver": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-openstack-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-operator-lifecycle-manager": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-operators": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-ovirt-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-ovn-kubernetes": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-service-ca": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-service-ca-operator": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-user-workload-monitoring": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically for ns/openshift-vsphere-infra": { + "average_duration": 0 + }, + "[Monitor:legacy-test-framework-invariants-pathological][sig-arch] events should not repeat pathologically in e2e namespaces": { + "average_duration": 0 + }, + "[Monitor:machine-lifecycle][Jira:\"Cluster-Lifecycle / machine-api\"] monitor test machine-lifecycle cleanup": { + "average_duration": 0 + }, + "[Monitor:machine-lifecycle][Jira:\"Cluster-Lifecycle / machine-api\"] monitor test machine-lifecycle collection": { + "average_duration": 0 + }, + "[Monitor:machine-lifecycle][Jira:\"Cluster-Lifecycle / machine-api\"] monitor test machine-lifecycle interval construction": { + "average_duration": 0 + }, + "[Monitor:machine-lifecycle][Jira:\"Cluster-Lifecycle / machine-api\"] monitor test machine-lifecycle preparation": { + "average_duration": 0 + }, + "[Monitor:machine-lifecycle][Jira:\"Cluster-Lifecycle / machine-api\"] monitor test machine-lifecycle setup": { + "average_duration": 0 + }, + "[Monitor:machine-lifecycle][Jira:\"Cluster-Lifecycle / machine-api\"] monitor test machine-lifecycle test evaluation": { + "average_duration": 0 + }, + "[Monitor:machine-lifecycle][Jira:\"Cluster-Lifecycle / machine-api\"] monitor test machine-lifecycle writing to storage": { + "average_duration": 0 + }, + "[Monitor:metrics-api-availability][Jira:\"Monitoring\"] monitor test metrics-api-availability cleanup": { + "average_duration": 0 + }, + "[Monitor:metrics-api-availability][Jira:\"Monitoring\"] monitor test metrics-api-availability collection": { + "average_duration": 0 + }, + "[Monitor:metrics-api-availability][Jira:\"Monitoring\"] monitor test metrics-api-availability interval construction": { + "average_duration": 0 + }, + "[Monitor:metrics-api-availability][Jira:\"Monitoring\"] monitor test metrics-api-availability preparation": { + "average_duration": 0 + }, + "[Monitor:metrics-api-availability][Jira:\"Monitoring\"] monitor test metrics-api-availability setup": { + "average_duration": 0 + }, + "[Monitor:metrics-api-availability][Jira:\"Monitoring\"] monitor test metrics-api-availability test evaluation": { + "average_duration": 0 + }, + "[Monitor:metrics-api-availability][Jira:\"Monitoring\"] monitor test metrics-api-availability writing to storage": { + "average_duration": 0 + }, + "[Monitor:metrics-api-availability][sig-instrumentation] disruption/metrics-api connection/new should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:metrics-api-availability][sig-instrumentation] disruption/metrics-api connection/reused should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:metrics-endpoints-down][Jira:\"Test Framework\"] monitor test metrics-endpoints-down cleanup": { + "average_duration": 0 + }, + "[Monitor:metrics-endpoints-down][Jira:\"Test Framework\"] monitor test metrics-endpoints-down collection": { + "average_duration": 1 + }, + "[Monitor:metrics-endpoints-down][Jira:\"Test Framework\"] monitor test metrics-endpoints-down interval construction": { + "average_duration": 0 + }, + "[Monitor:metrics-endpoints-down][Jira:\"Test Framework\"] monitor test metrics-endpoints-down preparation": { + "average_duration": 0 + }, + "[Monitor:metrics-endpoints-down][Jira:\"Test Framework\"] monitor test metrics-endpoints-down setup": { + "average_duration": 0 + }, + "[Monitor:metrics-endpoints-down][Jira:\"Test Framework\"] monitor test metrics-endpoints-down test evaluation": { + "average_duration": 0 + }, + "[Monitor:metrics-endpoints-down][Jira:\"Test Framework\"] monitor test metrics-endpoints-down writing to storage": { + "average_duration": 0 + }, + "[Monitor:metrics-endpoints-down][sig-node] kubelet metrics endpoints should always be reachable": { + "average_duration": 0 + }, + "[Monitor:monitoring-statefulsets-recreation][Jira:\"Monitoring\"] monitor test monitoring-statefulsets-recreation cleanup": { + "average_duration": 0 + }, + "[Monitor:monitoring-statefulsets-recreation][Jira:\"Monitoring\"] monitor test monitoring-statefulsets-recreation collection": { + "average_duration": 0 + }, + "[Monitor:monitoring-statefulsets-recreation][Jira:\"Monitoring\"] monitor test monitoring-statefulsets-recreation interval construction": { + "average_duration": 0 + }, + "[Monitor:monitoring-statefulsets-recreation][Jira:\"Monitoring\"] monitor test monitoring-statefulsets-recreation preparation": { + "average_duration": 0 + }, + "[Monitor:monitoring-statefulsets-recreation][Jira:\"Monitoring\"] monitor test monitoring-statefulsets-recreation setup": { + "average_duration": 0 + }, + "[Monitor:monitoring-statefulsets-recreation][Jira:\"Monitoring\"] monitor test monitoring-statefulsets-recreation test evaluation": { + "average_duration": 0 + }, + "[Monitor:monitoring-statefulsets-recreation][Jira:\"Monitoring\"] monitor test monitoring-statefulsets-recreation writing to storage": { + "average_duration": 0 + }, + "[Monitor:monitoring-statefulsets-recreation][sig-instrumentation] Monitoring statefulsets are not recreated after upgrade": { + "average_duration": 0 + }, + "[Monitor:node-lifecycle][Jira:\"Node / Kubelet\"] monitor test node-lifecycle cleanup": { + "average_duration": 0 + }, + "[Monitor:node-lifecycle][Jira:\"Node / Kubelet\"] monitor test node-lifecycle collection": { + "average_duration": 0 + }, + "[Monitor:node-lifecycle][Jira:\"Node / Kubelet\"] monitor test node-lifecycle interval construction": { + "average_duration": 0 + }, + "[Monitor:node-lifecycle][Jira:\"Node / Kubelet\"] monitor test node-lifecycle preparation": { + "average_duration": 0 + }, + "[Monitor:node-lifecycle][Jira:\"Node / Kubelet\"] monitor test node-lifecycle setup": { + "average_duration": 0 + }, + "[Monitor:node-lifecycle][Jira:\"Node / Kubelet\"] monitor test node-lifecycle test evaluation": { + "average_duration": 0 + }, + "[Monitor:node-lifecycle][Jira:\"Node / Kubelet\"] monitor test node-lifecycle writing to storage": { + "average_duration": 0 + }, + "[Monitor:node-lifecycle][Jira:\"Test Framework\"] kubelet should not report DiskPressure": { + "average_duration": 0 + }, + "[Monitor:node-lifecycle][sig-node] node-lifecycle detects unexpected not ready node": { + "average_duration": 0 + }, + "[Monitor:node-lifecycle][sig-node] node-lifecycle detects unreachable state on node": { + "average_duration": 0 + }, + "[Monitor:node-state-analyzer][Jira:\"Node / Kubelet\"] monitor test node-state-analyzer cleanup": { + "average_duration": 0 + }, + "[Monitor:node-state-analyzer][Jira:\"Node / Kubelet\"] monitor test node-state-analyzer collection": { + "average_duration": 0 + }, + "[Monitor:node-state-analyzer][Jira:\"Node / Kubelet\"] monitor test node-state-analyzer interval construction": { + "average_duration": 0 + }, + "[Monitor:node-state-analyzer][Jira:\"Node / Kubelet\"] monitor test node-state-analyzer preparation": { + "average_duration": 0 + }, + "[Monitor:node-state-analyzer][Jira:\"Node / Kubelet\"] monitor test node-state-analyzer setup": { + "average_duration": 0 + }, + "[Monitor:node-state-analyzer][Jira:\"Node / Kubelet\"] monitor test node-state-analyzer test evaluation": { + "average_duration": 0 + }, + "[Monitor:node-state-analyzer][Jira:\"Node / Kubelet\"] monitor test node-state-analyzer writing to storage": { + "average_duration": 0 + }, + "[Monitor:oc-adm-upgrade-status][Jira:\"oc / update\"] monitor test oc-adm-upgrade-status cleanup": { + "average_duration": 0 + }, + "[Monitor:oc-adm-upgrade-status][Jira:\"oc / update\"] monitor test oc-adm-upgrade-status collection": { + "average_duration": 0 + }, + "[Monitor:oc-adm-upgrade-status][Jira:\"oc / update\"] monitor test oc-adm-upgrade-status interval construction": { + "average_duration": 0 + }, + "[Monitor:oc-adm-upgrade-status][Jira:\"oc / update\"] monitor test oc-adm-upgrade-status preparation": { + "average_duration": 0 + }, + "[Monitor:oc-adm-upgrade-status][Jira:\"oc / update\"] monitor test oc-adm-upgrade-status setup": { + "average_duration": 0 + }, + "[Monitor:oc-adm-upgrade-status][Jira:\"oc / update\"] monitor test oc-adm-upgrade-status test evaluation": { + "average_duration": 0 + }, + "[Monitor:oc-adm-upgrade-status][Jira:\"oc / update\"] monitor test oc-adm-upgrade-status writing to storage": { + "average_duration": 0 + }, + "[Monitor:oc-adm-upgrade-status][sig-cli][OCPFeatureGate:UpgradeStatus] oc adm upgrade status control plane section is consistent": { + "average_duration": 0 + }, + "[Monitor:oc-adm-upgrade-status][sig-cli][OCPFeatureGate:UpgradeStatus] oc adm upgrade status health section is consistent": { + "average_duration": 0 + }, + "[Monitor:oc-adm-upgrade-status][sig-cli][OCPFeatureGate:UpgradeStatus] oc adm upgrade status output has expected layout": { + "average_duration": 0 + }, + "[Monitor:oc-adm-upgrade-status][sig-cli][OCPFeatureGate:UpgradeStatus] oc adm upgrade status snapshots reflect the cluster upgrade lifecycle": { + "average_duration": 0 + }, + "[Monitor:oc-adm-upgrade-status][sig-cli][OCPFeatureGate:UpgradeStatus] oc adm upgrade status workers section is consistent": { + "average_duration": 0 + }, + "[Monitor:oc-adm-upgrade-status][sig-cli][OCPFeatureGate:UpgradeStatus] oc amd upgrade status never fails": { + "average_duration": 0 + }, + "[Monitor:on-prem-haproxy][Jira: Networking / On-Prem Host Networking] Haproxy must be able to reach kubeapi server": { + "average_duration": 0 + }, + "[Monitor:on-prem-haproxy][Jira:\"Networking / On-Prem Host Networking\"] monitor test on-prem-haproxy cleanup": { + "average_duration": 0 + }, + "[Monitor:on-prem-haproxy][Jira:\"Networking / On-Prem Host Networking\"] monitor test on-prem-haproxy collection": { + "average_duration": 0 + }, + "[Monitor:on-prem-haproxy][Jira:\"Networking / On-Prem Host Networking\"] monitor test on-prem-haproxy interval construction": { + "average_duration": 0 + }, + "[Monitor:on-prem-haproxy][Jira:\"Networking / On-Prem Host Networking\"] monitor test on-prem-haproxy preparation": { + "average_duration": 0 + }, + "[Monitor:on-prem-haproxy][Jira:\"Networking / On-Prem Host Networking\"] monitor test on-prem-haproxy setup": { + "average_duration": 0 + }, + "[Monitor:on-prem-haproxy][Jira:\"Networking / On-Prem Host Networking\"] monitor test on-prem-haproxy test evaluation": { + "average_duration": 0 + }, + "[Monitor:on-prem-haproxy][Jira:\"Networking / On-Prem Host Networking\"] monitor test on-prem-haproxy writing to storage": { + "average_duration": 0 + }, + "[Monitor:on-prem-keepalived][Jira:\"Networking / On-Prem Load Balancer\"] on-prem loadbalancer must achieve full priority": { + "average_duration": 0 + }, + "[Monitor:on-prem-keepalived][Jira:\"Networking / On-Prem Loadbalancer\"] monitor test on-prem-keepalived cleanup": { + "average_duration": 0 + }, + "[Monitor:on-prem-keepalived][Jira:\"Networking / On-Prem Loadbalancer\"] monitor test on-prem-keepalived collection": { + "average_duration": 0 + }, + "[Monitor:on-prem-keepalived][Jira:\"Networking / On-Prem Loadbalancer\"] monitor test on-prem-keepalived interval construction": { + "average_duration": 0 + }, + "[Monitor:on-prem-keepalived][Jira:\"Networking / On-Prem Loadbalancer\"] monitor test on-prem-keepalived preparation": { + "average_duration": 0 + }, + "[Monitor:on-prem-keepalived][Jira:\"Networking / On-Prem Loadbalancer\"] monitor test on-prem-keepalived setup": { + "average_duration": 0 + }, + "[Monitor:on-prem-keepalived][Jira:\"Networking / On-Prem Loadbalancer\"] monitor test on-prem-keepalived test evaluation": { + "average_duration": 0 + }, + "[Monitor:on-prem-keepalived][Jira:\"Networking / On-Prem Loadbalancer\"] monitor test on-prem-keepalived writing to storage": { + "average_duration": 0 + }, + "[Monitor:operator-state-analyzer][Jira:\"Cluster Version Operator\"] monitor test operator-state-analyzer cleanup": { + "average_duration": 0 + }, + "[Monitor:operator-state-analyzer][Jira:\"Cluster Version Operator\"] monitor test operator-state-analyzer collection": { + "average_duration": 0 + }, + "[Monitor:operator-state-analyzer][Jira:\"Cluster Version Operator\"] monitor test operator-state-analyzer interval construction": { + "average_duration": 0 + }, + "[Monitor:operator-state-analyzer][Jira:\"Cluster Version Operator\"] monitor test operator-state-analyzer preparation": { + "average_duration": 0 + }, + "[Monitor:operator-state-analyzer][Jira:\"Cluster Version Operator\"] monitor test operator-state-analyzer setup": { + "average_duration": 0 + }, + "[Monitor:operator-state-analyzer][Jira:\"Cluster Version Operator\"] monitor test operator-state-analyzer test evaluation": { + "average_duration": 0 + }, + "[Monitor:operator-state-analyzer][Jira:\"Cluster Version Operator\"] monitor test operator-state-analyzer writing to storage": { + "average_duration": 0 + }, + "[Monitor:pathological-event-analyzer][Jira:\"Test Framework\"] monitor test pathological-event-analyzer cleanup": { + "average_duration": 0 + }, + "[Monitor:pathological-event-analyzer][Jira:\"Test Framework\"] monitor test pathological-event-analyzer collection": { + "average_duration": 0 + }, + "[Monitor:pathological-event-analyzer][Jira:\"Test Framework\"] monitor test pathological-event-analyzer interval construction": { + "average_duration": 0 + }, + "[Monitor:pathological-event-analyzer][Jira:\"Test Framework\"] monitor test pathological-event-analyzer preparation": { + "average_duration": 0 + }, + "[Monitor:pathological-event-analyzer][Jira:\"Test Framework\"] monitor test pathological-event-analyzer setup": { + "average_duration": 0 + }, + "[Monitor:pathological-event-analyzer][Jira:\"Test Framework\"] monitor test pathological-event-analyzer test evaluation": { + "average_duration": 0 + }, + "[Monitor:pathological-event-analyzer][Jira:\"Test Framework\"] monitor test pathological-event-analyzer writing to storage": { + "average_duration": 0 + }, + "[Monitor:pod-lifecycle][Jira:\"Node / Kubelet\"] monitor test pod-lifecycle cleanup": { + "average_duration": 0 + }, + "[Monitor:pod-lifecycle][Jira:\"Node / Kubelet\"] monitor test pod-lifecycle collection": { + "average_duration": 0 + }, + "[Monitor:pod-lifecycle][Jira:\"Node / Kubelet\"] monitor test pod-lifecycle interval construction": { + "average_duration": 1 + }, + "[Monitor:pod-lifecycle][Jira:\"Node / Kubelet\"] monitor test pod-lifecycle preparation": { + "average_duration": 0 + }, + "[Monitor:pod-lifecycle][Jira:\"Node / Kubelet\"] monitor test pod-lifecycle setup": { + "average_duration": 0 + }, + "[Monitor:pod-lifecycle][Jira:\"Node / Kubelet\"] monitor test pod-lifecycle test evaluation": { + "average_duration": 0 + }, + "[Monitor:pod-lifecycle][Jira:\"Node / Kubelet\"] monitor test pod-lifecycle writing to storage": { + "average_duration": 0 + }, + "[Monitor:pod-lifecycle][sig-apimachinery] informers must match live results at the same resource version": { + "average_duration": 0 + }, + "[Monitor:pod-network-avalibility][Jira:\"Network / ovn-kubernetes\"] monitor test pod-network-avalibility cleanup": { + "average_duration": 54 + }, + "[Monitor:pod-network-avalibility][Jira:\"Network / ovn-kubernetes\"] monitor test pod-network-avalibility collection": { + "average_duration": 33 + }, + "[Monitor:pod-network-avalibility][Jira:\"Network / ovn-kubernetes\"] monitor test pod-network-avalibility interval construction": { + "average_duration": 0 + }, + "[Monitor:pod-network-avalibility][Jira:\"Network / ovn-kubernetes\"] monitor test pod-network-avalibility preparation": { + "average_duration": 67 + }, + "[Monitor:pod-network-avalibility][Jira:\"Network / ovn-kubernetes\"] monitor test pod-network-avalibility setup": { + "average_duration": 0 + }, + "[Monitor:pod-network-avalibility][Jira:\"Network / ovn-kubernetes\"] monitor test pod-network-avalibility test evaluation": { + "average_duration": 0 + }, + "[Monitor:pod-network-avalibility][Jira:\"Network / ovn-kubernetes\"] monitor test pod-network-avalibility writing to storage": { + "average_duration": 0 + }, + "[Monitor:pod-network-avalibility][sig-network] can collect network.openshift.io/disruption-actor=poller,network.openshift.io/disruption-target=host-to-host poller pod logs": { + "average_duration": 0 + }, + "[Monitor:pod-network-avalibility][sig-network] can collect network.openshift.io/disruption-actor=poller,network.openshift.io/disruption-target=host-to-pod poller pod logs": { + "average_duration": 0 + }, + "[Monitor:pod-network-avalibility][sig-network] can collect network.openshift.io/disruption-actor=poller,network.openshift.io/disruption-target=host-to-service poller pod logs": { + "average_duration": 0 + }, + "[Monitor:pod-network-avalibility][sig-network] can collect network.openshift.io/disruption-actor=poller,network.openshift.io/disruption-target=pod-to-host poller pod logs": { + "average_duration": 0 + }, + "[Monitor:pod-network-avalibility][sig-network] can collect network.openshift.io/disruption-actor=poller,network.openshift.io/disruption-target=pod-to-pod poller pod logs": { + "average_duration": 0 + }, + "[Monitor:pod-network-avalibility][sig-network] can collect network.openshift.io/disruption-actor=poller,network.openshift.io/disruption-target=pod-to-service poller pod logs": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][Jira:\"Cluster Version Operator\"] monitor test required-scc-annotation-checker cleanup": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][Jira:\"Cluster Version Operator\"] monitor test required-scc-annotation-checker collection": { + "average_duration": 12 + }, + "[Monitor:required-scc-annotation-checker][Jira:\"Cluster Version Operator\"] monitor test required-scc-annotation-checker interval construction": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][Jira:\"Cluster Version Operator\"] monitor test required-scc-annotation-checker preparation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][Jira:\"Cluster Version Operator\"] monitor test required-scc-annotation-checker setup": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][Jira:\"Cluster Version Operator\"] monitor test required-scc-annotation-checker test evaluation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][Jira:\"Cluster Version Operator\"] monitor test required-scc-annotation-checker writing to storage": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/default must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/kube-node-lease must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/kube-public must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/kube-system must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-apiserver must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-apiserver-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-authentication must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-authentication-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-catalogd must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-cloud-controller-manager must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-cloud-controller-manager-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-cloud-credential-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-cloud-network-config-controller must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-cloud-platform-infra must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-cluster-api must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-cluster-csi-drivers must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-cluster-machine-approver must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-cluster-node-tuning-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-cluster-olm-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-cluster-samples-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-cluster-storage-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-cluster-version must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-cnv must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-commatrix-test must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-config must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-config-managed must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-config-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-console must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-console-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-console-user-settings must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-controller-manager must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-controller-manager-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-dns must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-dns-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-e2e-loki must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-etcd must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-etcd-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-frr-k8s must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-host-network must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-image-registry must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-infra must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-ingress must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-ingress-canary must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-ingress-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-insights must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-kni-infra must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-kube-apiserver must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-kube-apiserver-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-kube-controller-manager must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-kube-controller-manager-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-kube-proxy must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-kube-scheduler must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-kube-scheduler-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-kube-storage-version-migrator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-kube-storage-version-migrator-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-machine-api must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-machine-config-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-manila-csi-driver must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-metallb-system must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-monitoring must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-multus must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-network-console must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-network-diagnostics must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-network-node-identity must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-network-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-node must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-nutanix-infra must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-oauth-apiserver must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-openstack-infra must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-operator-controller must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-operator-lifecycle-manager must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-operators must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-ovirt-infra must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-ovn-kubernetes must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-route-controller-manager must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-service-ca must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-service-ca-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-sriov-network-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-storage must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-user-workload-monitoring must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-virtualization-os-images must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:required-scc-annotation-checker][sig-auth] all workloads in ns/openshift-vsphere-infra must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[Monitor:service-type-load-balancer-availability][Jira:\"Networking / router\"] monitor test service-type-load-balancer-availability cleanup": { + "average_duration": 107 + }, + "[Monitor:service-type-load-balancer-availability][Jira:\"Networking / router\"] monitor test service-type-load-balancer-availability collection": { + "average_duration": 0 + }, + "[Monitor:service-type-load-balancer-availability][Jira:\"Networking / router\"] monitor test service-type-load-balancer-availability interval construction": { + "average_duration": 0 + }, + "[Monitor:service-type-load-balancer-availability][Jira:\"Networking / router\"] monitor test service-type-load-balancer-availability preparation": { + "average_duration": 85 + }, + "[Monitor:service-type-load-balancer-availability][Jira:\"Networking / router\"] monitor test service-type-load-balancer-availability setup": { + "average_duration": 0 + }, + "[Monitor:service-type-load-balancer-availability][Jira:\"Networking / router\"] monitor test service-type-load-balancer-availability test evaluation": { + "average_duration": 0 + }, + "[Monitor:service-type-load-balancer-availability][Jira:\"Networking / router\"] monitor test service-type-load-balancer-availability writing to storage": { + "average_duration": 0 + }, + "[Monitor:service-type-load-balancer-availability][sig-network-edge] disruption/service-load-balancer-with-pdb connection/new should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:service-type-load-balancer-availability][sig-network-edge] disruption/service-load-balancer-with-pdb connection/reused should be available throughout the test": { + "average_duration": 0 + }, + "[Monitor:staicpod-install-monitor][Jira:\"kube-apiserver\"] monitor test staicpod-install-monitor cleanup": { + "average_duration": 0 + }, + "[Monitor:staicpod-install-monitor][Jira:\"kube-apiserver\"] monitor test staicpod-install-monitor collection": { + "average_duration": 0 + }, + "[Monitor:staicpod-install-monitor][Jira:\"kube-apiserver\"] monitor test staicpod-install-monitor interval construction": { + "average_duration": 0 + }, + "[Monitor:staicpod-install-monitor][Jira:\"kube-apiserver\"] monitor test staicpod-install-monitor preparation": { + "average_duration": 0 + }, + "[Monitor:staicpod-install-monitor][Jira:\"kube-apiserver\"] monitor test staicpod-install-monitor setup": { + "average_duration": 0 + }, + "[Monitor:staicpod-install-monitor][Jira:\"kube-apiserver\"] monitor test staicpod-install-monitor test evaluation": { + "average_duration": 0 + }, + "[Monitor:staicpod-install-monitor][Jira:\"kube-apiserver\"] monitor test staicpod-install-monitor writing to storage": { + "average_duration": 0 + }, + "[Monitor:staicpod-install-monitor][sig-apimachinery] installer pods should not run concurrently on two or more nodes": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][Jira:\"Cluster Version Operator\"] monitor test termination-message-policy cleanup": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][Jira:\"Cluster Version Operator\"] monitor test termination-message-policy collection": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][Jira:\"Cluster Version Operator\"] monitor test termination-message-policy interval construction": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][Jira:\"Cluster Version Operator\"] monitor test termination-message-policy preparation": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][Jira:\"Cluster Version Operator\"] monitor test termination-message-policy setup": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][Jira:\"Cluster Version Operator\"] monitor test termination-message-policy test evaluation": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][Jira:\"Cluster Version Operator\"] monitor test termination-message-policy writing to storage": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/default must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/kube-system must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-addon-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-apiserver must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-apiserver-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-authentication must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-authentication-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-backplane must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-backplane-srep must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-catalogd must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-cloud-controller-manager must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-cloud-controller-manager-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-cloud-credential-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-cloud-ingress-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-cloud-network-config-controller must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-cloud-platform-infra must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-cluster-api must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-cluster-csi-drivers must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-cluster-machine-approver must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-cluster-node-tuning-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-cluster-olm-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-cluster-samples-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-cluster-storage-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-cluster-version must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-cnv must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-config must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-config-managed must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-config-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-console must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-console-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-controller-manager must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-controller-manager-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-custom-domains-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-deployment-validation-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-dns must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-dns-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-e2e-loki must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-etcd must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-etcd-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-frr-k8s must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-host-network must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-image-registry must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-infra must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-ingress must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-ingress-canary must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-ingress-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-insights must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-kni-infra must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-kube-apiserver must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-kube-apiserver-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-kube-controller-manager must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-kube-controller-manager-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-kube-proxy must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-kube-scheduler must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-kube-scheduler-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-kube-storage-version-migrator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-kube-storage-version-migrator-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-machine-api must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-machine-config-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-managed-node-metadata-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-managed-upgrade-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-manila-csi-driver must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-marketplace must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-metallb-system must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-monitoring must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-multus must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-network-console must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-network-diagnostics must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-network-node-identity must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-network-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-nmstate must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-nutanix-infra must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-oauth-apiserver must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-ocm-agent-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-openstack-infra must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-operator-controller must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-operator-lifecycle-manager must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-operators must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-osd-metrics must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-ovirt-infra must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-ovn-kubernetes must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-package-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-rbac-permissions must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-route-controller-manager must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-route-monitor-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-security must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-service-ca must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-service-ca-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-splunk-forwarder-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-sre-pruning must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-sriov-network-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-storage must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-user-workload-monitoring must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-validation-webhook must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-velero must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:termination-message-policy][sig-arch] all containers in ns/openshift-vsphere-infra must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[Monitor:timeline-serializer][Jira:\"Test Framework\"] monitor test timeline-serializer cleanup": { + "average_duration": 0 + }, + "[Monitor:timeline-serializer][Jira:\"Test Framework\"] monitor test timeline-serializer collection": { + "average_duration": 0 + }, + "[Monitor:timeline-serializer][Jira:\"Test Framework\"] monitor test timeline-serializer interval construction": { + "average_duration": 0 + }, + "[Monitor:timeline-serializer][Jira:\"Test Framework\"] monitor test timeline-serializer preparation": { + "average_duration": 0 + }, + "[Monitor:timeline-serializer][Jira:\"Test Framework\"] monitor test timeline-serializer setup": { + "average_duration": 0 + }, + "[Monitor:timeline-serializer][Jira:\"Test Framework\"] monitor test timeline-serializer test evaluation": { + "average_duration": 0 + }, + "[Monitor:timeline-serializer][Jira:\"Test Framework\"] monitor test timeline-serializer writing to storage": { + "average_duration": 2 + }, + "[Monitor:tracked-resources-serializer][Jira:\"Test Framework\"] monitor test tracked-resources-serializer cleanup": { + "average_duration": 0 + }, + "[Monitor:tracked-resources-serializer][Jira:\"Test Framework\"] monitor test tracked-resources-serializer collection": { + "average_duration": 0 + }, + "[Monitor:tracked-resources-serializer][Jira:\"Test Framework\"] monitor test tracked-resources-serializer interval construction": { + "average_duration": 0 + }, + "[Monitor:tracked-resources-serializer][Jira:\"Test Framework\"] monitor test tracked-resources-serializer preparation": { + "average_duration": 0 + }, + "[Monitor:tracked-resources-serializer][Jira:\"Test Framework\"] monitor test tracked-resources-serializer setup": { + "average_duration": 0 + }, + "[Monitor:tracked-resources-serializer][Jira:\"Test Framework\"] monitor test tracked-resources-serializer test evaluation": { + "average_duration": 0 + }, + "[Monitor:tracked-resources-serializer][Jira:\"Test Framework\"] monitor test tracked-resources-serializer writing to storage": { + "average_duration": 3 + }, + "[Monitor:watch-namespaces][Jira:\"Test Framework\"] monitor test watch-namespaces cleanup": { + "average_duration": 0 + }, + "[Monitor:watch-namespaces][Jira:\"Test Framework\"] monitor test watch-namespaces collection": { + "average_duration": 0 + }, + "[Monitor:watch-namespaces][Jira:\"Test Framework\"] monitor test watch-namespaces interval construction": { + "average_duration": 0 + }, + "[Monitor:watch-namespaces][Jira:\"Test Framework\"] monitor test watch-namespaces preparation": { + "average_duration": 0 + }, + "[Monitor:watch-namespaces][Jira:\"Test Framework\"] monitor test watch-namespaces setup": { + "average_duration": 0 + }, + "[Monitor:watch-namespaces][Jira:\"Test Framework\"] monitor test watch-namespaces test evaluation": { + "average_duration": 0 + }, + "[Monitor:watch-namespaces][Jira:\"Test Framework\"] monitor test watch-namespaces writing to storage": { + "average_duration": 0 + }, + "[Monitoring][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-monitoring": { + "average_duration": 0 + }, + "[Monitoring][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-monitoring": { + "average_duration": 0 + }, + "[Networking][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cloud-network-config-controller": { + "average_duration": 0 + }, + "[Networking][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-host-network": { + "average_duration": 0 + }, + "[Networking][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-multus": { + "average_duration": 0 + }, + "[Networking][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-network-diagnostics": { + "average_duration": 0 + }, + "[Networking][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-network-operator": { + "average_duration": 0 + }, + "[Networking][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-ovn-kubernetes": { + "average_duration": 0 + }, + "[Networking][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cloud-network-config-controller": { + "average_duration": 0 + }, + "[Networking][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-host-network": { + "average_duration": 0 + }, + "[Networking][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-multus": { + "average_duration": 0 + }, + "[Networking][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-network-diagnostics": { + "average_duration": 0 + }, + "[Networking][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-network-operator": { + "average_duration": 0 + }, + "[Networking][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-ovn-kubernetes": { + "average_duration": 0 + }, + "[Node Tuning Operator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cluster-node-tuning-operator": { + "average_duration": 0 + }, + "[Node Tuning Operator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cluster-node-tuning-operator": { + "average_duration": 0 + }, + "[OLM][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-marketplace": { + "average_duration": 0 + }, + "[OLM][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-operator-lifecycle-manager": { + "average_duration": 0 + }, + "[OLM][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-operators": { + "average_duration": 0 + }, + "[OLM][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-marketplace": { + "average_duration": 0 + }, + "[OLM][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-operator-lifecycle-manager": { + "average_duration": 0 + }, + "[OLM][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-operators": { + "average_duration": 0 + }, + "[Routing][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-ingress": { + "average_duration": 0 + }, + "[Routing][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-ingress-canary": { + "average_duration": 0 + }, + "[Routing][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-ingress-operator": { + "average_duration": 0 + }, + "[Routing][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-ingress": { + "average_duration": 0 + }, + "[Routing][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-ingress-canary": { + "average_duration": 0 + }, + "[Routing][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-ingress-operator": { + "average_duration": 0 + }, + "[Samples][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cluster-samples-operator": { + "average_duration": 0 + }, + "[Samples][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cluster-samples-operator": { + "average_duration": 0 + }, + "[Serial] [sig-auth][Feature:OAuthServer] [RequestHeaders] [IdP] test RequestHeaders IdP [apigroup:config.openshift.io][apigroup:user.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 183 + }, + "[Serial] [sig-auth][Feature:OAuthServer] [RequestHeaders] [IdP] test RequestHeaders IdP [apigroup:config.openshift.io][apigroup:user.openshift.io][apigroup:apps.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 349 + }, + "[Serial][sig-cli] oc adm upgrade recommend When the update service has conditional recommendations runs successfully when listing all updates [Suite:openshift/conformance/serial]": { + "average_duration": 22 + }, + "[Serial][sig-cli] oc adm upgrade recommend When the update service has conditional recommendations runs successfully with conditional recommendations to the --version target [Suite:openshift/conformance/serial]": { + "average_duration": 22 + }, + "[Serial][sig-cli] oc adm upgrade recommend When the update service has no recommendations runs successfully [Suite:openshift/conformance/serial]": { + "average_duration": 21 + }, + "[Serial][sig-cli] oc adm upgrade recommend runs successfully with an empty channel [Suite:openshift/conformance/serial]": { + "average_duration": 1 + }, + "[Serial][sig-cli] oc adm upgrade recommend runs successfully, even without upstream OpenShift Update Service customization [Suite:openshift/conformance/serial]": { + "average_duration": 1 + }, + "[Storage][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cluster-csi-drivers": { + "average_duration": 0 + }, + "[Storage][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cluster-storage-operator": { + "average_duration": 0 + }, + "[Storage][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cluster-csi-drivers": { + "average_duration": 0 + }, + "[Storage][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cluster-storage-operator": { + "average_duration": 0 + }, + "[Suite:openshift/machine-config-operator/disruptive][Suite:openshift/conformance/serial][sig-mco][OCPFeatureGate:ManagedBootImagesAWS][Serial] Should degrade on a MachineSet with an OwnerReference [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 6 + }, + "[Suite:openshift/machine-config-operator/disruptive][Suite:openshift/conformance/serial][sig-mco][OCPFeatureGate:ManagedBootImagesAWS][Serial] Should not update boot images on any MachineSet when not configured [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 14 + }, + "[Suite:openshift/machine-config-operator/disruptive][Suite:openshift/conformance/serial][sig-mco][OCPFeatureGate:ManagedBootImagesAWS][Serial] Should stamp coreos-bootimages configmap with current MCO hash and release version [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 8 + }, + "[Suite:openshift/machine-config-operator/disruptive][Suite:openshift/conformance/serial][sig-mco][OCPFeatureGate:ManagedBootImagesAWS][Serial] Should update boot images on all MachineSets when configured [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 16 + }, + "[Suite:openshift/machine-config-operator/disruptive][Suite:openshift/conformance/serial][sig-mco][OCPFeatureGate:ManagedBootImagesAWS][Serial] Should update boot images only on MachineSets that are opted in [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 16 + }, + "[Suite:openshift/machine-config-operator/disruptive][Suite:openshift/conformance/serial][sig-mco][OCPFeatureGate:ManagedBootImages][Serial] Should degrade on a MachineSet with an OwnerReference [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 5 + }, + "[Suite:openshift/machine-config-operator/disruptive][Suite:openshift/conformance/serial][sig-mco][OCPFeatureGate:ManagedBootImages][Serial] Should not update boot images on any MachineSet when not configured [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 11 + }, + "[Suite:openshift/machine-config-operator/disruptive][Suite:openshift/conformance/serial][sig-mco][OCPFeatureGate:ManagedBootImages][Serial] Should stamp coreos-bootimages configmap with current MCO hash and release version [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 6 + }, + "[Suite:openshift/machine-config-operator/disruptive][Suite:openshift/conformance/serial][sig-mco][OCPFeatureGate:ManagedBootImages][Serial] Should update boot images on all MachineSets when configured [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 11 + }, + "[Suite:openshift/machine-config-operator/disruptive][Suite:openshift/conformance/serial][sig-mco][OCPFeatureGate:ManagedBootImages][Serial] Should update boot images only on MachineSets that are opted in [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 11 + }, + "[Suite:openshift/machine-config-operator/disruptive][Suite:openshift/conformance/serial][sig-mco][OCPFeatureGate:PinnedImages][OCPFeatureGate:MachineConfigNodes][Serial] All Nodes in a Custom Pool should have the PinnedImages in PIS [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 88 + }, + "[Suite:openshift/machine-config-operator/disruptive][Suite:openshift/conformance/serial][sig-mco][OCPFeatureGate:PinnedImages][OCPFeatureGate:MachineConfigNodes][Serial] All Nodes in a custom Pool should have the PinnedImages even after Garbage Collection [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 434 + }, + "[Suite:openshift/machine-config-operator/disruptive][Suite:openshift/conformance/serial][sig-mco][OCPFeatureGate:PinnedImages][OCPFeatureGate:MachineConfigNodes][Serial] All Nodes in a standard Pool should have the PinnedImages PIS [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 42 + }, + "[Suite:openshift/machine-config-operator/disruptive][Suite:openshift/conformance/serial][sig-mco][OCPFeatureGate:PinnedImages][OCPFeatureGate:MachineConfigNodes][Serial] Invalid PIS leads to degraded MCN in a custom Pool [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 81 + }, + "[Suite:openshift/machine-config-operator/disruptive][Suite:openshift/conformance/serial][sig-mco][OCPFeatureGate:PinnedImages][OCPFeatureGate:MachineConfigNodes][Serial] Invalid PIS leads to degraded MCN in a standard Pool [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 11 + }, + "[Suite:openshift/machine-config-operator/disruptive][sig-mco][OCPFeatureGate:MachineConfigNodes] [Serial][Slow]Should properly create and remove MCN on node creation and deletion [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 184 + }, + "[Suite:openshift/machine-config-operator/disruptive][sig-mco][OCPFeatureGate:MachineConfigNodes] [Serial][Slow]Should properly report MCN conditions on node degrade [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 195 + }, + "[Suite:openshift/machine-config-operator/disruptive][sig-mco][OCPFeatureGate:MachineConfigNodes] [Suite:openshift/conformance/parallel]Should have MCN properties matching associated node properties for nodes in default MCPs [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 1 + }, + "[Suite:openshift/machine-config-operator/disruptive][sig-mco][OCPFeatureGate:MachineConfigNodes] [Suite:openshift/conformance/parallel]Should properly block MCN updates by impersonation of the MCD SA [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 1 + }, + "[Suite:openshift/machine-config-operator/disruptive][sig-mco][OCPFeatureGate:MachineConfigNodes] [Suite:openshift/conformance/parallel]Should properly block MCN updates from a MCD that is not the associated one [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 2 + }, + "[Suite:openshift/machine-config-operator/disruptive][sig-mco][OCPFeatureGate:MachineConfigNodes] [Suite:openshift/conformance/serial][Serial]Should have MCN properties matching associated node properties for nodes in custom MCPs [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 79 + }, + "[Suite:openshift/machine-config-operator/disruptive][sig-mco][OCPFeatureGate:MachineConfigNodes] [Suite:openshift/conformance/serial][Serial]Should properly transition through MCN conditions on rebootless node update [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 97 + }, + "[Suite:openshift/machine-config-operator/disruptive][sig-mco][OCPFeatureGate:MachineConfigNodes] [Suite:openshift/conformance/serial][Serial]Should properly update the MCN from the associated MCD [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 2 + }, + "[Suite:openshift/machine-config-operator/disruptive][sig-mco][OCPFeatureGate:ManagedBootImagesvSphere][Serial] Should degrade on a MachineSet with an OwnerReference [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 4 + }, + "[Suite:openshift/machine-config-operator/disruptive][sig-mco][OCPFeatureGate:ManagedBootImagesvSphere][Serial] Should not update boot images on any MachineSet when not configured [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 6 + }, + "[Suite:openshift/machine-config-operator/disruptive][sig-mco][OCPFeatureGate:ManagedBootImagesvSphere][Serial] Should stamp coreos-bootimages configmap with current MCO hash and release version [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 5 + }, + "[Suite:openshift/machine-config-operator/disruptive][sig-mco][OCPFeatureGate:ManagedBootImagesvSphere][Serial] Should update boot images on all MachineSets when configured [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 8 + }, + "[Suite:openshift/machine-config-operator/disruptive][sig-mco][OCPFeatureGate:ManagedBootImagesvSphere][Serial] Should update boot images only on MachineSets that are opted in [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 7 + }, + "[Suite:openshift/machine-config-operator/disruptive][sig-mco][OCPFeatureGate:ManagedBootImagesvSphere][Serial] Should upload the latest bootimage to the appropriate vCentre [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 58 + }, + "[Suite:openshift/machine-config-operator/disruptive][sig-mco][OCPFeatureGate:PinnedImages][Disruptive] All Nodes in a Custom Pool should have the PinnedImages in PIS [apigroup:machineconfiguration.openshift.io] [Serial]": { + "average_duration": 99 + }, + "[Suite:openshift/machine-config-operator/disruptive][sig-mco][OCPFeatureGate:PinnedImages][Disruptive] All Nodes in a standard Pool should have the PinnedImages PIS [apigroup:machineconfiguration.openshift.io] [Serial]": { + "average_duration": 47 + }, + "[Suite:openshift/machine-config-operator/disruptive][sig-mco][OCPFeatureGate:PinnedImages][Disruptive] Invalid PIS leads to degraded MCN in a custom Pool [apigroup:machineconfiguration.openshift.io] [Serial]": { + "average_duration": 94 + }, + "[Suite:openshift/machine-config-operator/disruptive][sig-mco][OCPFeatureGate:PinnedImages][Disruptive] Invalid PIS leads to degraded MCN in a standard Pool [apigroup:machineconfiguration.openshift.io] [Serial]": { + "average_duration": 11 + }, + "[Suite:openshift/machine-config-operator/disruptive][sig-mco][OCPFeatureGate:PinnedImages][Disruptive] [Slow]All Nodes in a custom Pool should have the PinnedImages even after Garbage Collection [apigroup:machineconfiguration.openshift.io] [Serial]": { + "average_duration": 454 + }, + "[Suite:openshift/usernamespace] [sig-node] [FeatureGate:ProcMountType] [FeatureGate:UserNamespacesSupport] nested container should pass podman localsystem test in baseline mode": { + "average_duration": 803 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above info in all the other namespaces": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/default": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/kube-system": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-config": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-config-managed": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-infra": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-insights": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kni-infra": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-nutanix-infra": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-openstack-infra": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-ovirt-infra": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-user-workload-monitoring": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-vsphere-infra": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above pending in all the other namespaces": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/default": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/kube-system": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-config": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-config-managed": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-infra": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-insights": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kni-infra": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-nutanix-infra": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-openstack-infra": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-ovirt-infra": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-user-workload-monitoring": { + "average_duration": 0 + }, + "[Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-vsphere-infra": { + "average_duration": 0 + }, + "[apiserver-auth][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-authentication": { + "average_duration": 0 + }, + "[apiserver-auth][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-authentication-operator": { + "average_duration": 0 + }, + "[apiserver-auth][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-authentication": { + "average_duration": 0 + }, + "[apiserver-auth][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-authentication-operator": { + "average_duration": 0 + }, + "[bz-Bare Metal Hardware Provisioning] clusteroperator/baremetal should not change condition/Available": { + "average_duration": 5674 + }, + "[bz-Bare Metal Hardware Provisioning] clusteroperator/baremetal should not change condition/Degraded": { + "average_duration": 5674 + }, + "[bz-Cloud Compute] clusteroperator/cloud-controller-manager should not change condition/Available": { + "average_duration": 5655 + }, + "[bz-Cloud Compute] clusteroperator/cloud-controller-manager should not change condition/Degraded": { + "average_duration": 5664 + }, + "[bz-Cloud Compute] clusteroperator/cluster-autoscaler should not change condition/Available": { + "average_duration": 5674 + }, + "[bz-Cloud Compute] clusteroperator/cluster-autoscaler should not change condition/Degraded": { + "average_duration": 5676 + }, + "[bz-Cloud Compute] clusteroperator/control-plane-machine-set should not change condition/Available": { + "average_duration": 5703 + }, + "[bz-Cloud Compute] clusteroperator/control-plane-machine-set should not change condition/Degraded": { + "average_duration": 5705 + }, + "[bz-Cloud Compute] clusteroperator/machine-api should not change condition/Available": { + "average_duration": 5674 + }, + "[bz-Cloud Compute] clusteroperator/machine-api should not change condition/Degraded": { + "average_duration": 5674 + }, + "[bz-Cloud Compute] clusteroperator/machine-approver should not change condition/Available": { + "average_duration": 5674 + }, + "[bz-Cloud Compute] clusteroperator/machine-approver should not change condition/Degraded": { + "average_duration": 5674 + }, + "[bz-Cloud Compute][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cloud-controller-manager": { + "average_duration": 0 + }, + "[bz-Cloud Compute][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cloud-controller-manager-operator": { + "average_duration": 0 + }, + "[bz-Cloud Compute][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cluster-machine-approver": { + "average_duration": 0 + }, + "[bz-Cloud Compute][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-machine-api": { + "average_duration": 0 + }, + "[bz-Cloud Compute][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cloud-controller-manager": { + "average_duration": 0 + }, + "[bz-Cloud Compute][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cloud-controller-manager-operator": { + "average_duration": 0 + }, + "[bz-Cloud Compute][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cluster-machine-approver": { + "average_duration": 0 + }, + "[bz-Cloud Compute][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-machine-api": { + "average_duration": 0 + }, + "[bz-Cloud Credential Operator] clusteroperator/cloud-credential should not change condition/Available": { + "average_duration": 5633 + }, + "[bz-Cloud Credential Operator] clusteroperator/cloud-credential should not change condition/Degraded": { + "average_duration": 5650 + }, + "[bz-Cloud Credential Operator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cloud-credential-operator": { + "average_duration": 0 + }, + "[bz-Cloud Credential Operator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cloud-credential-operator": { + "average_duration": 0 + }, + "[bz-Cluster Version Operator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cluster-version": { + "average_duration": 0 + }, + "[bz-Cluster Version Operator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cluster-version": { + "average_duration": 0 + }, + "[bz-DNS] clusteroperator/dns should not change condition/Available": { + "average_duration": 4284 + }, + "[bz-DNS] clusteroperator/dns should not change condition/Degraded": { + "average_duration": 4746 + }, + "[bz-DNS][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-dns": { + "average_duration": 0 + }, + "[bz-DNS][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-dns-operator": { + "average_duration": 0 + }, + "[bz-DNS][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-dns": { + "average_duration": 0 + }, + "[bz-DNS][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-dns-operator": { + "average_duration": 0 + }, + "[bz-Etcd] clusteroperator/etcd should not change condition/Available": { + "average_duration": 4628 + }, + "[bz-Etcd] clusteroperator/etcd should not change condition/Degraded": { + "average_duration": 4988 + }, + "[bz-Etcd][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-etcd": { + "average_duration": 0 + }, + "[bz-Etcd][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-etcd-operator": { + "average_duration": 0 + }, + "[bz-Etcd][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-etcd": { + "average_duration": 0 + }, + "[bz-Etcd][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-etcd-operator": { + "average_duration": 0 + }, + "[bz-Image Registry] clusteroperator/image-registry should not change condition/Available": { + "average_duration": 4371 + }, + "[bz-Image Registry] clusteroperator/image-registry should not change condition/Degraded": { + "average_duration": 4276 + }, + "[bz-Image Registry][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-image-registry": { + "average_duration": 0 + }, + "[bz-Image Registry][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-image-registry": { + "average_duration": 0 + }, + "[bz-Insights Operator] clusteroperator/insights should not change condition/Available": { + "average_duration": 5497 + }, + "[bz-Insights Operator] clusteroperator/insights should not change condition/Degraded": { + "average_duration": 5496 + }, + "[bz-Machine Config Operator] Nodes should reach OSUpdateStaged in a timely fashion": { + "average_duration": 0 + }, + "[bz-Machine Config Operator] clusteroperator/machine-config should not change condition/Available": { + "average_duration": 5138 + }, + "[bz-Machine Config Operator] clusteroperator/machine-config should not change condition/Degraded": { + "average_duration": 5276 + }, + "[bz-Machine Config Operator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-machine-config-operator": { + "average_duration": 0 + }, + "[bz-Machine Config Operator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-machine-config-operator": { + "average_duration": 0 + }, + "[bz-Management Console] clusteroperator/console should not change condition/Available": { + "average_duration": 5409 + }, + "[bz-Management Console] clusteroperator/console should not change condition/Degraded": { + "average_duration": 5404 + }, + "[bz-Management Console][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-console": { + "average_duration": 0 + }, + "[bz-Management Console][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-console-operator": { + "average_duration": 0 + }, + "[bz-Management Console][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-console": { + "average_duration": 0 + }, + "[bz-Management Console][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-console-operator": { + "average_duration": 0 + }, + "[bz-Monitoring] clusteroperator/monitoring should not change condition/Available": { + "average_duration": 5677 + }, + "[bz-Monitoring] clusteroperator/monitoring should not change condition/Degraded": { + "average_duration": 5672 + }, + "[bz-Monitoring][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-monitoring": { + "average_duration": 0 + }, + "[bz-Monitoring][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-monitoring": { + "average_duration": 0 + }, + "[bz-Networking] clusteroperator/network should not change condition/Available": { + "average_duration": 4167 + }, + "[bz-Networking] clusteroperator/network should not change condition/Degraded": { + "average_duration": 4368 + }, + "[bz-Networking][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cloud-network-config-controller": { + "average_duration": 0 + }, + "[bz-Networking][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-host-network": { + "average_duration": 0 + }, + "[bz-Networking][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-multus": { + "average_duration": 0 + }, + "[bz-Networking][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-network-diagnostics": { + "average_duration": 0 + }, + "[bz-Networking][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-network-operator": { + "average_duration": 0 + }, + "[bz-Networking][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-ovn-kubernetes": { + "average_duration": 0 + }, + "[bz-Networking][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cloud-network-config-controller": { + "average_duration": 0 + }, + "[bz-Networking][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-host-network": { + "average_duration": 0 + }, + "[bz-Networking][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-multus": { + "average_duration": 0 + }, + "[bz-Networking][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-network-diagnostics": { + "average_duration": 0 + }, + "[bz-Networking][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-network-operator": { + "average_duration": 0 + }, + "[bz-Networking][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-ovn-kubernetes": { + "average_duration": 0 + }, + "[bz-Node Tuning Operator] clusteroperator/node-tuning should not change condition/Available": { + "average_duration": 4326 + }, + "[bz-Node Tuning Operator] clusteroperator/node-tuning should not change condition/Degraded": { + "average_duration": 4310 + }, + "[bz-Node Tuning Operator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cluster-node-tuning-operator": { + "average_duration": 0 + }, + "[bz-Node Tuning Operator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cluster-node-tuning-operator": { + "average_duration": 0 + }, + "[bz-OLM] clusteroperator/marketplace should not change condition/Available": { + "average_duration": 5675 + }, + "[bz-OLM] clusteroperator/marketplace should not change condition/Degraded": { + "average_duration": 5675 + }, + "[bz-OLM] clusteroperator/operator-lifecycle-manager should not change condition/Available": { + "average_duration": 5675 + }, + "[bz-OLM] clusteroperator/operator-lifecycle-manager should not change condition/Degraded": { + "average_duration": 5675 + }, + "[bz-OLM] clusteroperator/operator-lifecycle-manager-catalog should not change condition/Available": { + "average_duration": 5675 + }, + "[bz-OLM] clusteroperator/operator-lifecycle-manager-catalog should not change condition/Degraded": { + "average_duration": 5675 + }, + "[bz-OLM] clusteroperator/operator-lifecycle-manager-packageserver should not change condition/Available": { + "average_duration": 5709 + }, + "[bz-OLM] clusteroperator/operator-lifecycle-manager-packageserver should not change condition/Degraded": { + "average_duration": 5673 + }, + "[bz-OLM][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-marketplace": { + "average_duration": 0 + }, + "[bz-OLM][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-operator-lifecycle-manager": { + "average_duration": 0 + }, + "[bz-OLM][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-operators": { + "average_duration": 0 + }, + "[bz-OLM][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-marketplace": { + "average_duration": 0 + }, + "[bz-OLM][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-operator-lifecycle-manager": { + "average_duration": 0 + }, + "[bz-OLM][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-operators": { + "average_duration": 0 + }, + "[bz-OLM][invariant] alert/RedhatOperatorsCatalogError should not be at or above info": { + "average_duration": 0 + }, + "[bz-OLM][invariant] alert/RedhatOperatorsCatalogError should not be at or above pending": { + "average_duration": 0 + }, + "[bz-Routing] clusteroperator/ingress should not change condition/Available": { + "average_duration": 2471 + }, + "[bz-Routing] clusteroperator/ingress should not change condition/Degraded": { + "average_duration": 2451 + }, + "[bz-Routing][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-ingress": { + "average_duration": 0 + }, + "[bz-Routing][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-ingress-canary": { + "average_duration": 0 + }, + "[bz-Routing][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-ingress-operator": { + "average_duration": 0 + }, + "[bz-Routing][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-ingress": { + "average_duration": 0 + }, + "[bz-Routing][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-ingress-canary": { + "average_duration": 0 + }, + "[bz-Routing][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-ingress-operator": { + "average_duration": 0 + }, + "[bz-Samples] clusteroperator/openshift-samples should not change condition/Available": { + "average_duration": 5677 + }, + "[bz-Samples] clusteroperator/openshift-samples should not change condition/Degraded": { + "average_duration": 5677 + }, + "[bz-Samples][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cluster-samples-operator": { + "average_duration": 0 + }, + "[bz-Samples][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cluster-samples-operator": { + "average_duration": 0 + }, + "[bz-Storage] clusteroperator/csi-snapshot-controller should not change condition/Available": { + "average_duration": 5573 + }, + "[bz-Storage] clusteroperator/csi-snapshot-controller should not change condition/Degraded": { + "average_duration": 5566 + }, + "[bz-Storage] clusteroperator/storage should not change condition/Available": { + "average_duration": 4536 + }, + "[bz-Storage] clusteroperator/storage should not change condition/Degraded": { + "average_duration": 4527 + }, + "[bz-Storage][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cluster-csi-drivers": { + "average_duration": 0 + }, + "[bz-Storage][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-cluster-storage-operator": { + "average_duration": 0 + }, + "[bz-Storage][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cluster-csi-drivers": { + "average_duration": 0 + }, + "[bz-Storage][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-cluster-storage-operator": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above info in all the other namespaces": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/default": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/kube-system": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-config": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-config-managed": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-insights": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kni-infra": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-nutanix-infra": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-openstack-infra": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-ovirt-infra": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-user-workload-monitoring": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-vsphere-infra": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above pending in all the other namespaces": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/default": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/kube-system": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-config": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-config-managed": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-insights": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kni-infra": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-nutanix-infra": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-openstack-infra": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-ovirt-infra": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-user-workload-monitoring": { + "average_duration": 0 + }, + "[bz-Unknown][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-vsphere-infra": { + "average_duration": 0 + }, + "[bz-apiserver-auth] clusteroperator/authentication should not change condition/Available": { + "average_duration": 4580 + }, + "[bz-apiserver-auth] clusteroperator/authentication should not change condition/Degraded": { + "average_duration": 4477 + }, + "[bz-apiserver-auth] openshift-oauth-apiserver should not get probe error on liveiness probe due to timeout": { + "average_duration": 0 + }, + "[bz-apiserver-auth] openshift-oauth-apiserver should not get probe error on liveness probe due to timeout": { + "average_duration": 0 + }, + "[bz-apiserver-auth] openshift-oauth-apiserver should not get probe error on readiiness probe due to connection refused": { + "average_duration": 0 + }, + "[bz-apiserver-auth] openshift-oauth-apiserver should not get probe error on readiiness probe due to timeout": { + "average_duration": 0 + }, + "[bz-apiserver-auth] openshift-oauth-apiserver should not get probe error on readiness probe due to connection refused": { + "average_duration": 0 + }, + "[bz-apiserver-auth] openshift-oauth-apiserver should not get probe error on readiness probe due to timeout": { + "average_duration": 0 + }, + "[bz-apiserver-auth][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-authentication": { + "average_duration": 0 + }, + "[bz-apiserver-auth][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-authentication-operator": { + "average_duration": 0 + }, + "[bz-apiserver-auth][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-authentication": { + "average_duration": 0 + }, + "[bz-apiserver-auth][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-authentication-operator": { + "average_duration": 0 + }, + "[bz-apiserver-auth][invariant] alert/PodSecurityViolation should not be at or above info": { + "average_duration": 0 + }, + "[bz-cluster-api] clusteroperator/cluster-api should not change condition/Available": { + "average_duration": 0 + }, + "[bz-cluster-api] clusteroperator/cluster-api should not change condition/Degraded": { + "average_duration": 2554 + }, + "[bz-config-operator] clusteroperator/config-operator should not change condition/Available": { + "average_duration": 5664 + }, + "[bz-config-operator] clusteroperator/config-operator should not change condition/Degraded": { + "average_duration": 5664 + }, + "[bz-config-operator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-config-operator": { + "average_duration": 0 + }, + "[bz-config-operator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-config-operator": { + "average_duration": 0 + }, + "[bz-control-plane-machine-set] clusteroperator/control-plane-machine-set should not change condition/Available": { + "average_duration": 1655 + }, + "[bz-control-plane-machine-set] clusteroperator/control-plane-machine-set should not change condition/Degraded": { + "average_duration": 1613 + }, + "[bz-etcd] pathological event should not see excessive RequiredInstallerResourcesMissing secrets": { + "average_duration": 0 + }, + "[bz-etcd] should not see excessive RequiredInstallerResourcesMissing secrets": { + "average_duration": 0 + }, + "[bz-etcd][invariant] alert/etcdGRPCRequestsSlow should not be at or above info": { + "average_duration": 0 + }, + "[bz-etcd][invariant] alert/etcdGRPCRequestsSlow should not be at or above pending": { + "average_duration": 0 + }, + "[bz-etcd][invariant] alert/etcdHighCommitDurations should not be at or above info": { + "average_duration": 0 + }, + "[bz-etcd][invariant] alert/etcdHighCommitDurations should not be at or above pending": { + "average_duration": 0 + }, + "[bz-etcd][invariant] alert/etcdHighFsyncDurations should not be at or above info": { + "average_duration": 0 + }, + "[bz-etcd][invariant] alert/etcdHighFsyncDurations should not be at or above pending": { + "average_duration": 0 + }, + "[bz-etcd][invariant] alert/etcdHighNumberOfFailedGRPCRequests should not be at or above info": { + "average_duration": 0 + }, + "[bz-etcd][invariant] alert/etcdHighNumberOfFailedGRPCRequests should not be at or above pending": { + "average_duration": 0 + }, + "[bz-etcd][invariant] alert/etcdHighNumberOfLeaderChanges should not be at or above info": { + "average_duration": 0 + }, + "[bz-etcd][invariant] alert/etcdHighNumberOfLeaderChanges should not be at or above pending": { + "average_duration": 0 + }, + "[bz-etcd][invariant] alert/etcdInsufficientMembers should not be at or above info": { + "average_duration": 0 + }, + "[bz-etcd][invariant] alert/etcdInsufficientMembers should not be at or above pending": { + "average_duration": 0 + }, + "[bz-etcd][invariant] alert/etcdMemberCommunicationSlow should not be at or above info": { + "average_duration": 0 + }, + "[bz-etcd][invariant] alert/etcdMemberCommunicationSlow should not be at or above pending": { + "average_duration": 0 + }, + "[bz-etcd][invariant] alert/etcdMembersDown should not be at or above info": { + "average_duration": 0 + }, + "[bz-etcd][invariant] alert/etcdMembersDown should not be at or above pending": { + "average_duration": 0 + }, + "[bz-etcd][invariant] alert/etcdNoLeader should not be at or above info": { + "average_duration": 0 + }, + "[bz-etcd][invariant] alert/etcdNoLeader should not be at or above pending": { + "average_duration": 0 + }, + "[bz-kube-apiserver] clusteroperator/kube-apiserver should not change condition/Available": { + "average_duration": 2044 + }, + "[bz-kube-apiserver] clusteroperator/kube-apiserver should not change condition/Degraded": { + "average_duration": 2480 + }, + "[bz-kube-apiserver] kube-apiserver should be accessible by clients using internal load balancer without iptables issues": { + "average_duration": 0 + }, + "[bz-kube-apiserver][invariant] alert/KubeAPIErrorBudgetBurn should not be at or above info": { + "average_duration": 0 + }, + "[bz-kube-apiserver][invariant] alert/KubeAPIErrorBudgetBurn should not be at or above pending": { + "average_duration": 0 + }, + "[bz-kube-apiserver][invariant] alert/KubeClientErrors should not be at or above info": { + "average_duration": 0 + }, + "[bz-kube-apiserver][invariant] alert/KubeClientErrors should not be at or above pending": { + "average_duration": 0 + }, + "[bz-kube-apiserver][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-apiserver": { + "average_duration": 0 + }, + "[bz-kube-apiserver][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-apiserver-operator": { + "average_duration": 0 + }, + "[bz-kube-apiserver][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-apiserver": { + "average_duration": 0 + }, + "[bz-kube-apiserver][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-apiserver-operator": { + "average_duration": 0 + }, + "[bz-kube-controller-manager] clusteroperator/kube-controller-manager should not change condition/Available": { + "average_duration": 5660 + }, + "[bz-kube-controller-manager] clusteroperator/kube-controller-manager should not change condition/Degraded": { + "average_duration": 5753 + }, + "[bz-kube-controller-manager][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-controller-manager": { + "average_duration": 0 + }, + "[bz-kube-controller-manager][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-controller-manager-operator": { + "average_duration": 0 + }, + "[bz-kube-controller-manager][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-controller-manager": { + "average_duration": 0 + }, + "[bz-kube-controller-manager][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-controller-manager-operator": { + "average_duration": 0 + }, + "[bz-kube-scheduler] clusteroperator/kube-scheduler should not change condition/Available": { + "average_duration": 5663 + }, + "[bz-kube-scheduler] clusteroperator/kube-scheduler should not change condition/Degraded": { + "average_duration": 5757 + }, + "[bz-kube-scheduler][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-scheduler": { + "average_duration": 0 + }, + "[bz-kube-scheduler][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-scheduler-operator": { + "average_duration": 0 + }, + "[bz-kube-scheduler][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-scheduler": { + "average_duration": 0 + }, + "[bz-kube-scheduler][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-scheduler-operator": { + "average_duration": 0 + }, + "[bz-kube-storage-version-migrator] clusteroperator/kube-storage-version-migrator should not change condition/Available": { + "average_duration": 5840 + }, + "[bz-kube-storage-version-migrator] clusteroperator/kube-storage-version-migrator should not change condition/Degraded": { + "average_duration": 5656 + }, + "[bz-kube-storage-version-migrator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-storage-version-migrator": { + "average_duration": 0 + }, + "[bz-kube-storage-version-migrator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-storage-version-migrator-operator": { + "average_duration": 0 + }, + "[bz-kube-storage-version-migrator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-storage-version-migrator": { + "average_duration": 0 + }, + "[bz-kube-storage-version-migrator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-storage-version-migrator-operator": { + "average_duration": 0 + }, + "[bz-machine config operator][invariant] alert/MCDDrainError should not be at or above info": { + "average_duration": 0 + }, + "[bz-machine config operator][invariant] alert/MCDDrainError should not be at or above pending": { + "average_duration": 0 + }, + "[bz-machine config operator][invariant] alert/MCDPivotError should not be at or above info": { + "average_duration": 0 + }, + "[bz-machine config operator][invariant] alert/MCDPivotError should not be at or above pending": { + "average_duration": 0 + }, + "[bz-monitoring][invariant] alert/PrometheusOperatorWatchErrors should not be at or above info": { + "average_duration": 0 + }, + "[bz-monitoring][invariant] alert/PrometheusOperatorWatchErrors should not be at or above pending": { + "average_duration": 0 + }, + "[bz-monitoring][invariant] alert/Watchdog must have no gaps or changes": { + "average_duration": 0 + }, + "[bz-networking] ovnkube-node readiness probe should not fail repeatedly": { + "average_duration": 0 + }, + "[bz-networking] pod IPs should not be used by two pods at the same time": { + "average_duration": 0 + }, + "[bz-networking][invariant] alert/OVNKubernetesResourceRetryFailure should not be at or above info": { + "average_duration": 0 + }, + "[bz-networking][invariant] alert/OVNKubernetesResourceRetryFailure should not be at or above pending": { + "average_duration": 0 + }, + "[bz-oauth-apiserver][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-oauth-apiserver": { + "average_duration": 0 + }, + "[bz-oauth-apiserver][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-oauth-apiserver": { + "average_duration": 0 + }, + "[bz-openshift-apiserver] clusteroperator/openshift-apiserver should not change condition/Available": { + "average_duration": 5363 + }, + "[bz-openshift-apiserver] clusteroperator/openshift-apiserver should not change condition/Degraded": { + "average_duration": 5333 + }, + "[bz-openshift-apiserver][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-apiserver": { + "average_duration": 0 + }, + "[bz-openshift-apiserver][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-apiserver-operator": { + "average_duration": 0 + }, + "[bz-openshift-apiserver][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-apiserver": { + "average_duration": 0 + }, + "[bz-openshift-apiserver][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-apiserver-operator": { + "average_duration": 0 + }, + "[bz-openshift-controller-manager] clusteroperator/openshift-controller-manager should not change condition/Available": { + "average_duration": 5558 + }, + "[bz-openshift-controller-manager] clusteroperator/openshift-controller-manager should not change condition/Degraded": { + "average_duration": 5548 + }, + "[bz-openshift-controller-manager][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-controller-manager": { + "average_duration": 0 + }, + "[bz-openshift-controller-manager][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-controller-manager-operator": { + "average_duration": 0 + }, + "[bz-openshift-controller-manager][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-controller-manager": { + "average_duration": 0 + }, + "[bz-openshift-controller-manager][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-controller-manager-operator": { + "average_duration": 0 + }, + "[bz-samples][invariant] alert/SamplesImagestreamImportFailing should not be at or above info": { + "average_duration": 0 + }, + "[bz-samples][invariant] alert/SamplesImagestreamImportFailing should not be at or above pending": { + "average_duration": 0 + }, + "[bz-service-ca] clusteroperator/service-ca should not change condition/Available": { + "average_duration": 5660 + }, + "[bz-service-ca] clusteroperator/service-ca should not change condition/Degraded": { + "average_duration": 5660 + }, + "[bz-service-ca][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-service-ca": { + "average_duration": 0 + }, + "[bz-service-ca][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-service-ca-operator": { + "average_duration": 0 + }, + "[bz-service-ca][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-service-ca": { + "average_duration": 0 + }, + "[bz-service-ca][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-service-ca-operator": { + "average_duration": 0 + }, + "[bz-single-node][invariant] alert/KubeMemoryOvercommit should not be at or above info": { + "average_duration": 0 + }, + "[bz-single-node][invariant] alert/KubeMemoryOvercommit should not be at or above pending": { + "average_duration": 0 + }, + "[bz-storage][invariant] alert/KubePersistentVolumeErrors should not be at or above info": { + "average_duration": 0 + }, + "[bz-storage][invariant] alert/KubePersistentVolumeErrors should not be at or above pending": { + "average_duration": 0 + }, + "[bz-storage][invariant] alert/VSphereOpenshiftNodeHealthFail should not be at or above info": { + "average_duration": 0 + }, + "[bz-storage][invariant] alert/VSphereOpenshiftNodeHealthFail should not be at or above pending": { + "average_duration": 0 + }, + "[cloud-provider-aws-e2e] loadbalancer CLB internal should be reachable with hairpinning traffic [Suite:openshift/conformance/parallel]": { + "average_duration": 157 + }, + "[cloud-provider-aws-e2e] loadbalancer CLB should be reachable with default configurations [Suite:openshift/conformance/parallel]": { + "average_duration": 76 + }, + "[cloud-provider-aws-e2e] loadbalancer NLB internal should be reachable with hairpinning traffic [Suite:openshift/conformance/parallel]": { + "average_duration": 209 + }, + "[cloud-provider-aws-e2e] loadbalancer NLB should be reachable with default configurations [Suite:openshift/conformance/parallel]": { + "average_duration": 316 + }, + "[cloud-provider-aws-e2e] loadbalancer NLB should be reachable with target-node-labels [Suite:openshift/conformance/parallel]": { + "average_duration": 179 + }, + "[cloud-provider-aws-e2e] nodes should label nodes with topology network info if instance is supported [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[cloud-provider-aws-e2e] nodes should set zone-id topology label [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[config-operator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-config-operator": { + "average_duration": 0 + }, + "[config-operator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-config-operator": { + "average_duration": 0 + }, + "[kube-apiserver][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-apiserver": { + "average_duration": 0 + }, + "[kube-apiserver][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-apiserver-operator": { + "average_duration": 0 + }, + "[kube-apiserver][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-apiserver": { + "average_duration": 0 + }, + "[kube-apiserver][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-apiserver-operator": { + "average_duration": 0 + }, + "[kube-controller-manager][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-controller-manager": { + "average_duration": 0 + }, + "[kube-controller-manager][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-controller-manager-operator": { + "average_duration": 0 + }, + "[kube-controller-manager][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-controller-manager": { + "average_duration": 0 + }, + "[kube-controller-manager][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-controller-manager-operator": { + "average_duration": 0 + }, + "[kube-scheduler][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-scheduler": { + "average_duration": 0 + }, + "[kube-scheduler][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-scheduler-operator": { + "average_duration": 0 + }, + "[kube-scheduler][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-scheduler": { + "average_duration": 0 + }, + "[kube-scheduler][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-scheduler-operator": { + "average_duration": 0 + }, + "[kube-storage-version-migrator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-storage-version-migrator": { + "average_duration": 0 + }, + "[kube-storage-version-migrator][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-kube-storage-version-migrator-operator": { + "average_duration": 0 + }, + "[kube-storage-version-migrator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-storage-version-migrator": { + "average_duration": 0 + }, + "[kube-storage-version-migrator][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-kube-storage-version-migrator-operator": { + "average_duration": 0 + }, + "[oauth-apiserver][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-oauth-apiserver": { + "average_duration": 0 + }, + "[oauth-apiserver][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-oauth-apiserver": { + "average_duration": 0 + }, + "[openshift-apiserver][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-apiserver": { + "average_duration": 0 + }, + "[openshift-apiserver][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-apiserver-operator": { + "average_duration": 0 + }, + "[openshift-apiserver][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-apiserver": { + "average_duration": 0 + }, + "[openshift-apiserver][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-apiserver-operator": { + "average_duration": 0 + }, + "[openshift-controller-manager][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-controller-manager": { + "average_duration": 0 + }, + "[openshift-controller-manager][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-controller-manager-operator": { + "average_duration": 0 + }, + "[openshift-controller-manager][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-controller-manager": { + "average_duration": 0 + }, + "[openshift-controller-manager][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-controller-manager-operator": { + "average_duration": 0 + }, + "[service-ca][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-service-ca": { + "average_duration": 0 + }, + "[service-ca][invariant] alert/KubePodNotReady should not be at or above info in ns/openshift-service-ca-operator": { + "average_duration": 0 + }, + "[service-ca][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-service-ca": { + "average_duration": 0 + }, + "[service-ca][invariant] alert/KubePodNotReady should not be at or above pending in ns/openshift-service-ca-operator": { + "average_duration": 0 + }, + "[sig-api-machinery] API Streaming (aka. WatchList) [FeatureGate:WatchList] [Beta] [Serial] reflector doesn't support receiving resources as Tables": { + "average_duration": 11 + }, + "[sig-api-machinery] API Streaming (aka. WatchList) [FeatureGate:WatchList] [Beta] [Serial] reflector doesn't support receiving resources as Tables [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-api-machinery] API Streaming (aka. WatchList) [FeatureGate:WatchList] [Beta] [Serial] server supports sending resources in Table format": { + "average_duration": 1 + }, + "[sig-api-machinery] API Streaming (aka. WatchList) [FeatureGate:WatchList] [Beta] [Serial] server supports sending resources in Table format [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] API Streaming (aka. WatchList) [FeatureGate:WatchList] [Beta] [Serial] should NOT be requested by client-go's List method when WatchListClient is enabled": { + "average_duration": 1 + }, + "[sig-api-machinery] API Streaming (aka. WatchList) [FeatureGate:WatchList] [Beta] [Serial] should NOT be requested by client-go's List method when WatchListClient is enabled [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] API Streaming (aka. WatchList) [FeatureGate:WatchList] [Beta] [Serial] should NOT be requested by dynamic client's List method when WatchListClient is enabled": { + "average_duration": 1 + }, + "[sig-api-machinery] API Streaming (aka. WatchList) [FeatureGate:WatchList] [Beta] [Serial] should NOT be requested by dynamic client's List method when WatchListClient is enabled [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] API Streaming (aka. WatchList) [FeatureGate:WatchList] [Beta] [Serial] should NOT be requested by metadata client's List method when WatchListClient is enabled": { + "average_duration": 1 + }, + "[sig-api-machinery] API Streaming (aka. WatchList) [FeatureGate:WatchList] [Beta] [Serial] should NOT be requested by metadata client's List method when WatchListClient is enabled [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] API Streaming (aka. WatchList) [FeatureGate:WatchList] [Beta] [Serial] should be requested by informers when WatchListClient is enabled": { + "average_duration": 1 + }, + "[sig-api-machinery] API Streaming (aka. WatchList) [FeatureGate:WatchList] [Beta] [Serial] should be requested by informers when WatchListClient is enabled [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] API Streaming (aka. WatchList) [FeatureGate:WatchList] [Beta] [Serial] should be requested by metadatainformer when WatchListClient is enabled": { + "average_duration": 1 + }, + "[sig-api-machinery] API Streaming (aka. WatchList) [FeatureGate:WatchList] [Beta] [Serial] should be requested by metadatainformer when WatchListClient is enabled [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] API Streaming (aka. WatchList) [Serial] doesn't support receiving resources as Tables [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] API Streaming (aka. WatchList) [Serial] falls backs to supported content type when when receiving resources as Tables was requested [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] API Streaming (aka. WatchList) [Serial] should be requested by client-go's List method when WatchListClient is enabled [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] API Streaming (aka. WatchList) [Serial] should be requested by dynamic client's List method when WatchListClient is enabled [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] API Streaming (aka. WatchList) [Serial] should be requested by informers when WatchListClient is enabled [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] API Streaming (aka. WatchList) [Serial] should be requested by metadata client's List method when WatchListClient is enabled [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] API data in etcd should be stored at the correct location and version for all resources [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 20 + }, + "[sig-api-machinery] API data in etcd should be stored at the correct location and version for all resources [Serial][apigroup:config.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 21 + }, + "[sig-api-machinery] API health endpoints should contain the required checks for the oauth-apiserver APIs [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-api-machinery] API health endpoints should contain the required checks for the openshift-apiserver APIs [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-api-machinery] API priority and fairness should ensure that requests can be classified by adding FlowSchema and PriorityLevelConfiguration": { + "average_duration": 3 + }, + "[sig-api-machinery] API priority and fairness should ensure that requests can be classified by adding FlowSchema and PriorityLevelConfiguration [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-api-machinery] API priority and fairness should ensure that requests can't be drowned out (fairness)": { + "average_duration": 1 + }, + "[sig-api-machinery] API priority and fairness should ensure that requests can't be drowned out (fairness) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] API priority and fairness should ensure that requests can't be drowned out (priority)": { + "average_duration": 1 + }, + "[sig-api-machinery] API priority and fairness should ensure that requests can't be drowned out (priority) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] API priority and fairness should support FlowSchema API operations [Conformance]": { + "average_duration": 2 + }, + "[sig-api-machinery] API priority and fairness should support FlowSchema API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] API priority and fairness should support PriorityLevelConfiguration API operations [Conformance]": { + "average_duration": 2 + }, + "[sig-api-machinery] API priority and fairness should support PriorityLevelConfiguration API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] APIServer CR fields validation additionalCORSAllowedOrigins [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-api-machinery] API_Server on Microshift Author:dpunia-MicroShiftBoth-ConnectedOnly-ROSA-ARO-OSD_CCS-Medium-10969-Create clusterip service [Serial]": { + "average_duration": 38 + }, + "[sig-api-machinery] API_Server on Microshift Author:rgangwar-MicroShiftBoth-ConnectedOnly-Medium-55394-[Apiserver] MicroShift enable SCC admission for pods": { + "average_duration": 179 + }, + "[sig-api-machinery] API_Server on Microshift Author:rgangwar-MicroShiftBoth-Medium-55677-[Apiserver] MicroShift enable CRDs validation": { + "average_duration": 27 + }, + "[sig-api-machinery] API_Server on Microshift Author:rgangwar-MicroShiftOnly-ConnectedOnly-High-56229-[Apiserver] Complete Route API compatibility": { + "average_duration": 24 + }, + "[sig-api-machinery] API_Server on Microshift Author:rgangwar-MicroShiftOnly-Low-53693-[Apiserver] Identity and disable APIs not required for MVP": { + "average_duration": 16 + }, + "[sig-api-machinery] API_Server on Microshift Author:rgangwar-MicroShiftOnly-Medium-53972-[Apiserver] Cluster Policy Controller integration": { + "average_duration": 40 + }, + "[sig-api-machinery] API_Server on Microshift Author:rgangwar-MicroShiftOnly-Medium-54786-[logging] component name presents in klog headers": { + "average_duration": 34 + }, + "[sig-api-machinery] API_Server on Microshift Author:rgangwar-MicroShiftOnly-Medium-54816-[Apiserver] Remove RoleBindingRestrictions API": { + "average_duration": 10 + }, + "[sig-api-machinery] API_Server on Microshift Author:rgangwar-NonHyperShiftHOST-MicroShiftBoth-Medium-55480-[Apiserver] Audit logs must be stored and persisted": { + "average_duration": 16 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing mutating webhooks should work [Conformance]": { + "average_duration": 8 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing mutating webhooks should work [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing validating webhooks should work [Conformance]": { + "average_duration": 8 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing validating webhooks should work [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a mutating webhook should work [Conformance]": { + "average_duration": 7 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a mutating webhook should work [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a validating webhook should work [Conformance]": { + "average_duration": 7 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a validating webhook should work [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to create and update mutating webhook configurations with match conditions [Conformance]": { + "average_duration": 7 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to create and update mutating webhook configurations with match conditions [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to create and update mutating webhook configurations with match conditions [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to create and update validating webhook configurations with match conditions [Conformance]": { + "average_duration": 8 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to create and update validating webhook configurations with match conditions [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to create and update validating webhook configurations with match conditions [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny attaching pod [Conformance]": { + "average_duration": 10 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny attaching pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny custom resource creation, update and deletion [Conformance]": { + "average_duration": 11 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny custom resource creation, update and deletion [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny pod and configmap creation [Conformance]": { + "average_duration": 17 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny pod and configmap creation [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should deny crd creation [Conformance]": { + "average_duration": 7 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should deny crd creation [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should honor timeout [Conformance]": { + "average_duration": 19 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should honor timeout [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should include webhook resources in discovery documents [Conformance]": { + "average_duration": 7 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should include webhook resources in discovery documents [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate configmap [Conformance]": { + "average_duration": 7 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate configmap [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource [Conformance]": { + "average_duration": 10 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with different stored version [Conformance]": { + "average_duration": 10 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with different stored version [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with pruning [Conformance]": { + "average_duration": 10 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with pruning [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate everything except 'skip-me' configmaps [Conformance]": { + "average_duration": 7 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate everything except 'skip-me' configmaps [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate everything except 'skip-me' configmaps [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate pod and apply defaults after mutation [Conformance]": { + "average_duration": 7 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate pod and apply defaults after mutation [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should not be able to mutate or prevent deletion of webhook configuration objects [Conformance]": { + "average_duration": 7 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should not be able to mutate or prevent deletion of webhook configuration objects [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should reject mutating webhook configurations with invalid match conditions [Conformance]": { + "average_duration": 7 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should reject mutating webhook configurations with invalid match conditions [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should reject mutating webhook configurations with invalid match conditions [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should reject validating webhook configurations with invalid match conditions [Conformance]": { + "average_duration": 7 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should reject validating webhook configurations with invalid match conditions [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should reject validating webhook configurations with invalid match conditions [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should unconditionally reject operations on fail closed webhook [Conformance]": { + "average_duration": 8 + }, + "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should unconditionally reject operations on fail closed webhook [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-api-machinery] AggregatedDiscovery should support aggregated discovery interface [Conformance]": { + "average_duration": 1 + }, + "[sig-api-machinery] AggregatedDiscovery should support aggregated discovery interface [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] AggregatedDiscovery should support aggregated discovery interface for CRDs [Conformance]": { + "average_duration": 4 + }, + "[sig-api-machinery] AggregatedDiscovery should support aggregated discovery interface for CRDs [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-api-machinery] AggregatedDiscovery should support raw aggregated discovery endpoint Accept headers [Conformance]": { + "average_duration": 1 + }, + "[sig-api-machinery] AggregatedDiscovery should support raw aggregated discovery endpoint Accept headers [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] AggregatedDiscovery should support raw aggregated discovery request for CRDs [Conformance]": { + "average_duration": 4 + }, + "[sig-api-machinery] AggregatedDiscovery should support raw aggregated discovery request for CRDs [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-api-machinery] Aggregator Should be able to support the 1.17 Sample API Server using the current Aggregator [Conformance]": { + "average_duration": 30 + }, + "[sig-api-machinery] Aggregator Should be able to support the 1.17 Sample API Server using the current Aggregator [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 35 + }, + "[sig-api-machinery] CBOR [Feature:CBOR] clients remain compatible with the 1.17 sample-apiserver [Serial]": { + "average_duration": 26 + }, + "[sig-api-machinery] CBOR [Feature:CBOR] clients remain compatible with the 1.17 sample-apiserver [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] MUST NOT fail to update a resource due to CRD Validation Rule errors on unchanged correlatable fields": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] MUST NOT fail to update a resource due to CRD Validation Rule errors on unchanged correlatable fields [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] MUST NOT fail to update a resource due to JSONSchema errors on unchanged correlatable fields": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] MUST NOT fail to update a resource due to JSONSchema errors on unchanged correlatable fields [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] MUST NOT ratchet errors raised by transition rules": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] MUST NOT ratchet errors raised by transition rules [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] MUST evaluate a CRD Validation Rule with oldSelf = nil for new values when optionalOldSelf is true": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] MUST evaluate a CRD Validation Rule with oldSelf = nil for new values when optionalOldSelf is true [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] MUST fail to update a resource due to CRD Validation Rule errors on changed fields": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] MUST fail to update a resource due to CRD Validation Rule errors on changed fields [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] MUST fail to update a resource due to CRD Validation Rule errors on unchanged uncorrelatable fields": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] MUST fail to update a resource due to CRD Validation Rule errors on unchanged uncorrelatable fields [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] MUST fail to update a resource due to JSONSchema errors on changed fields": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] MUST fail to update a resource due to JSONSchema errors on changed fields [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] MUST fail to update a resource due to JSONSchema errors on unchanged uncorrelatable fields": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] MUST fail to update a resource due to JSONSchema errors on unchanged uncorrelatable fields [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] [Beta] MUST NOT fail to update a resource due to CRD Validation Rule errors on unchanged correlatable fields [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] [Beta] MUST NOT fail to update a resource due to JSONSchema errors on unchanged correlatable fields [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] [Beta] MUST NOT ratchet errors raised by transition rules [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] [Beta] MUST evaluate a CRD Validation Rule with oldSelf = nil for new values when optionalOldSelf is true [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] [Beta] MUST fail to update a resource due to CRD Validation Rule errors on changed fields [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] [Beta] MUST fail to update a resource due to CRD Validation Rule errors on unchanged uncorrelatable fields [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] [Beta] MUST fail to update a resource due to JSONSchema errors on changed fields [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] CRDValidationRatcheting [Privileged:ClusterAdmin] [FeatureGate:CRDValidationRatcheting] [Beta] MUST fail to update a resource due to JSONSchema errors on unchanged uncorrelatable fields [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert a non homogeneous list of CRs [Conformance]": { + "average_duration": 10 + }, + "[sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert a non homogeneous list of CRs [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert from CR v1 to CR v2 [Conformance]": { + "average_duration": 9 + }, + "[sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert from CR v1 to CR v2 [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-api-machinery] CustomResourceDefinition Watch [Privileged:ClusterAdmin] CustomResourceDefinition Watch watch on custom resource definition objects [Conformance]": { + "average_duration": 60 + }, + "[sig-api-machinery] CustomResourceDefinition Watch [Privileged:ClusterAdmin] CustomResourceDefinition Watch watch on custom resource definition objects [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 64 + }, + "[sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition creating/deleting custom resource definition objects works [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition creating/deleting custom resource definition objects works [Conformance]": { + "average_duration": 2 + }, + "[sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition creating/deleting custom resource definition objects works [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition getting/updating/patching custom resource definition status sub-resource works [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition getting/updating/patching custom resource definition status sub-resource works [Conformance]": { + "average_duration": 1 + }, + "[sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition getting/updating/patching custom resource definition status sub-resource works [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition listing custom resource definition objects works [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition listing custom resource definition objects works [Conformance]": { + "average_duration": 6 + }, + "[sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition listing custom resource definition objects works [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] custom resource defaulting for requests and from storage works [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] custom resource defaulting for requests and from storage works [Conformance]": { + "average_duration": 4 + }, + "[sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] custom resource defaulting for requests and from storage works [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] should include custom resource definition resources in discovery documents [Conformance]": { + "average_duration": 1 + }, + "[sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] should include custom resource definition resources in discovery documents [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] CustomResourceFieldSelectors [Privileged:ClusterAdmin] CustomResourceFieldSelectors MUST list and watch custom resources matching the field selector [Conformance]": { + "average_duration": 10 + }, + "[sig-api-machinery] CustomResourceFieldSelectors [Privileged:ClusterAdmin] CustomResourceFieldSelectors MUST list and watch custom resources matching the field selector [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-api-machinery] CustomResourceFieldSelectors [Privileged:ClusterAdmin] [FeatureGate:CustomResourceFieldSelectors] [Beta] CustomResourceFieldSelectors MUST list and watch custom resources matching the field selector [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] removes definition from spec when one version gets changed to not be served [Conformance]": { + "average_duration": 75 + }, + "[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] removes definition from spec when one version gets changed to not be served [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] updates the published spec when one version gets renamed [Conformance]": { + "average_duration": 72 + }, + "[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] updates the published spec when one version gets renamed [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 44 + }, + "[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD preserving unknown fields at the schema root [Conformance]": { + "average_duration": 29 + }, + "[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD preserving unknown fields at the schema root [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD preserving unknown fields in an embedded object [Conformance]": { + "average_duration": 28 + }, + "[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD preserving unknown fields in an embedded object [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD with validation schema [Conformance]": { + "average_duration": 23 + }, + "[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD with validation schema [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD without validation schema [Conformance]": { + "average_duration": 31 + }, + "[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD without validation schema [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of different groups [Conformance]": { + "average_duration": 61 + }, + "[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of different groups [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 36 + }, + "[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group and version but different kinds [Conformance]": { + "average_duration": 62 + }, + "[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group and version but different kinds [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 36 + }, + "[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group but different versions [Conformance]": { + "average_duration": 88 + }, + "[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group but different versions [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 63 + }, + "[sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST NOT fail validation for create of a custom resource that satisfies the x-kubernetes-validations rules": { + "average_duration": 4 + }, + "[sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST NOT fail validation for create of a custom resource that satisfies the x-kubernetes-validations rules [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail create of a custom resource definition that contains a x-kubernetes-validations rule that refers to a property that do not exist": { + "average_duration": 1 + }, + "[sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail create of a custom resource definition that contains a x-kubernetes-validations rule that refers to a property that do not exist [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail create of a custom resource definition that contains an x-kubernetes-validations rule that contains a syntax error": { + "average_duration": 1 + }, + "[sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail create of a custom resource definition that contains an x-kubernetes-validations rule that contains a syntax error [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail create of a custom resource definition that contains an x-kubernetes-validations rule that exceeds the estimated cost limit": { + "average_duration": 1 + }, + "[sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail create of a custom resource definition that contains an x-kubernetes-validations rule that exceeds the estimated cost limit [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail create of a custom resource that exceeds the runtime cost limit for x-kubernetes-validations rule execution": { + "average_duration": 5 + }, + "[sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail create of a custom resource that exceeds the runtime cost limit for x-kubernetes-validations rule execution [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail update of a custom resource that does not satisfy a x-kubernetes-validations transition rule": { + "average_duration": 4 + }, + "[sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail update of a custom resource that does not satisfy a x-kubernetes-validations transition rule [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail validation for create of a custom resource that does not satisfy the x-kubernetes-validations rules": { + "average_duration": 4 + }, + "[sig-api-machinery] CustomResourceValidationRules [Privileged:ClusterAdmin] MUST fail validation for create of a custom resource that does not satisfy the x-kubernetes-validations rules [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-api-machinery] Discovery Custom resource should have storage version hash": { + "average_duration": 2 + }, + "[sig-api-machinery] Discovery Custom resource should have storage version hash [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] Discovery should accurately determine present and missing resources": { + "average_duration": 1 + }, + "[sig-api-machinery] Discovery should accurately determine present and missing resources [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] Discovery should locate the groupVersion and a resource within each APIGroup [Conformance]": { + "average_duration": 2 + }, + "[sig-api-machinery] Discovery should locate the groupVersion and a resource within each APIGroup [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] Discovery should validate PreferredVersion for each APIGroup [Conformance]": { + "average_duration": 3 + }, + "[sig-api-machinery] Discovery should validate PreferredVersion for each APIGroup [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-api-machinery] FieldValidation should create/apply a CR with unknown fields for CRD with no validation schema [Conformance]": { + "average_duration": 4 + }, + "[sig-api-machinery] FieldValidation should create/apply a CR with unknown fields for CRD with no validation schema [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-api-machinery] FieldValidation should create/apply a valid CR for CRD with validation schema [Conformance]": { + "average_duration": 4 + }, + "[sig-api-machinery] FieldValidation should create/apply a valid CR for CRD with validation schema [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-api-machinery] FieldValidation should create/apply an invalid CR with extra properties for CRD with validation schema [Conformance]": { + "average_duration": 4 + }, + "[sig-api-machinery] FieldValidation should create/apply an invalid CR with extra properties for CRD with validation schema [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-api-machinery] FieldValidation should detect duplicates in a CR when preserving unknown fields [Conformance]": { + "average_duration": 4 + }, + "[sig-api-machinery] FieldValidation should detect duplicates in a CR when preserving unknown fields [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-api-machinery] FieldValidation should detect unknown and duplicate fields of a typed object [Conformance]": { + "average_duration": 1 + }, + "[sig-api-machinery] FieldValidation should detect unknown and duplicate fields of a typed object [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] FieldValidation should detect unknown metadata fields in both the root and embedded object of a CR [Conformance]": { + "average_duration": 4 + }, + "[sig-api-machinery] FieldValidation should detect unknown metadata fields in both the root and embedded object of a CR [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-api-machinery] FieldValidation should detect unknown metadata fields of a typed object [Conformance]": { + "average_duration": 1 + }, + "[sig-api-machinery] FieldValidation should detect unknown metadata fields of a typed object [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] Garbage collector should delete RS created by deployment when not orphaning [Conformance]": { + "average_duration": 2 + }, + "[sig-api-machinery] Garbage collector should delete RS created by deployment when not orphaning [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] Garbage collector should delete jobs and pods created by cronjob": { + "average_duration": 30 + }, + "[sig-api-machinery] Garbage collector should delete jobs and pods created by cronjob [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-api-machinery] Garbage collector should delete pods created by rc when not orphaning [Conformance]": { + "average_duration": 11 + }, + "[sig-api-machinery] Garbage collector should delete pods created by rc when not orphaning [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-api-machinery] Garbage collector should keep the rc around until all its pods are deleted if the deleteOptions says so [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-api-machinery] Garbage collector should keep the rc around until all its pods are deleted if the deleteOptions says so [Serial] [Conformance]": { + "average_duration": 4 + }, + "[sig-api-machinery] Garbage collector should keep the rc around until all its pods are deleted if the deleteOptions says so [Serial] [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-api-machinery] Garbage collector should not be blocked by dependency circle [Conformance]": { + "average_duration": 6 + }, + "[sig-api-machinery] Garbage collector should not be blocked by dependency circle [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-api-machinery] Garbage collector should not delete dependents that have both valid owner and owner that's waiting for dependents to be deleted [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-api-machinery] Garbage collector should not delete dependents that have both valid owner and owner that's waiting for dependents to be deleted [Serial] [Conformance]": { + "average_duration": 12 + }, + "[sig-api-machinery] Garbage collector should not delete dependents that have both valid owner and owner that's waiting for dependents to be deleted [Serial] [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-api-machinery] Garbage collector should orphan RS created by deployment when deleteOptions.PropagationPolicy is Orphan [Conformance]": { + "average_duration": 2 + }, + "[sig-api-machinery] Garbage collector should orphan RS created by deployment when deleteOptions.PropagationPolicy is Orphan [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] Garbage collector should orphan pods created by rc if delete options say so [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 44 + }, + "[sig-api-machinery] Garbage collector should orphan pods created by rc if delete options say so [Serial] [Conformance]": { + "average_duration": 43 + }, + "[sig-api-machinery] Garbage collector should orphan pods created by rc if delete options say so [Serial] [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 43 + }, + "[sig-api-machinery] Garbage collector should orphan pods created by rc if deleteOptions.OrphanDependents is nil": { + "average_duration": 31 + }, + "[sig-api-machinery] Garbage collector should orphan pods created by rc if deleteOptions.OrphanDependents is nil [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-api-machinery] Garbage collector should support cascading deletion of custom resources": { + "average_duration": 26 + }, + "[sig-api-machinery] Garbage collector should support cascading deletion of custom resources [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-api-machinery] Garbage collector should support orphan deletion of custom resources": { + "average_duration": 105 + }, + "[sig-api-machinery] Garbage collector should support orphan deletion of custom resources [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 107 + }, + "[sig-api-machinery] Generated clientset should create pods, set the deletionTimestamp and deletionGracePeriodSeconds of the pod": { + "average_duration": 4 + }, + "[sig-api-machinery] Generated clientset should create pods, set the deletionTimestamp and deletionGracePeriodSeconds of the pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-api-machinery] Generated clientset should create v1 cronJobs, delete cronJobs, watch cronJobs": { + "average_duration": 1 + }, + "[sig-api-machinery] Generated clientset should create v1 cronJobs, delete cronJobs, watch cronJobs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] JSON Patch [apigroup:operator.openshift.io] should delete an entry from an array with a test precondition provided [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-api-machinery] JSON Patch [apigroup:operator.openshift.io] should delete an entry from an array with multiple field owners [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-api-machinery] JSON Patch [apigroup:operator.openshift.io] should delete multiple entries from an array when multiple test precondition provided [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-api-machinery] JSON Patch [apigroup:operator.openshift.io] should error when the test precondition provided doesn't match [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-api-machinery] MutatingAdmissionPolicy [Privileged:ClusterAdmin] [Feature:MutatingAdmissionPolicy] [FeatureGate:MutatingAdmissionPolicy] [Alpha] [Feature:OffByDefault] should mutate a Deployment [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-api-machinery] MutatingAdmissionPolicy [Privileged:ClusterAdmin] [Feature:MutatingAdmissionPolicy] [FeatureGate:MutatingAdmissionPolicy] [Alpha] [Feature:OffByDefault] should support MutatingAdmissionPolicy API operations [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] MutatingAdmissionPolicy [Privileged:ClusterAdmin] [Feature:MutatingAdmissionPolicy] [FeatureGate:MutatingAdmissionPolicy] [Alpha] [Feature:OffByDefault] should support MutatingAdmissionPolicyBinding API operations [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] MutatingAdmissionPolicy [Privileged:ClusterAdmin] [Feature:MutatingAdmissionPolicy] [FeatureGate:MutatingAdmissionPolicy] [Beta] [Feature:OffByDefault] should mutate a Deployment": { + "average_duration": 31 + }, + "[sig-api-machinery] MutatingAdmissionPolicy [Privileged:ClusterAdmin] [Feature:MutatingAdmissionPolicy] [FeatureGate:MutatingAdmissionPolicy] [Beta] [Feature:OffByDefault] should mutate a Deployment [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-api-machinery] MutatingAdmissionPolicy [Privileged:ClusterAdmin] [Feature:MutatingAdmissionPolicy] [FeatureGate:MutatingAdmissionPolicy] [Beta] [Feature:OffByDefault] should support MutatingAdmissionPolicy API operations": { + "average_duration": 2 + }, + "[sig-api-machinery] MutatingAdmissionPolicy [Privileged:ClusterAdmin] [Feature:MutatingAdmissionPolicy] [FeatureGate:MutatingAdmissionPolicy] [Beta] [Feature:OffByDefault] should support MutatingAdmissionPolicy API operations [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] MutatingAdmissionPolicy [Privileged:ClusterAdmin] [Feature:MutatingAdmissionPolicy] [FeatureGate:MutatingAdmissionPolicy] [Beta] [Feature:OffByDefault] should support MutatingAdmissionPolicyBinding API operations": { + "average_duration": 2 + }, + "[sig-api-machinery] MutatingAdmissionPolicy [Privileged:ClusterAdmin] [Feature:MutatingAdmissionPolicy] [FeatureGate:MutatingAdmissionPolicy] [Beta] [Feature:OffByDefault] should support MutatingAdmissionPolicyBinding API operations [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] Namespaces [Serial] should always delete fast (ALL of 100 namespaces in 150 seconds) [Feature:ComprehensiveNamespaceDraining]": { + "average_duration": 77 + }, + "[sig-api-machinery] Namespaces [Serial] should always delete fast (ALL of 100 namespaces in 150 seconds) [Feature:ComprehensiveNamespaceDraining] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-api-machinery] Namespaces [Serial] should apply a finalizer to a Namespace [Conformance]": { + "average_duration": 1 + }, + "[sig-api-machinery] Namespaces [Serial] should apply a finalizer to a Namespace [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] Namespaces [Serial] should apply an update to a Namespace [Conformance]": { + "average_duration": 1 + }, + "[sig-api-machinery] Namespaces [Serial] should apply an update to a Namespace [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] Namespaces [Serial] should apply changes to a namespace status [Conformance]": { + "average_duration": 1 + }, + "[sig-api-machinery] Namespaces [Serial] should apply changes to a namespace status [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] Namespaces [Serial] should delete fast enough (90 percent of 100 namespaces in 150 seconds)": { + "average_duration": 75 + }, + "[sig-api-machinery] Namespaces [Serial] should delete fast enough (90 percent of 100 namespaces in 150 seconds) [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 70 + }, + "[sig-api-machinery] Namespaces [Serial] should ensure that all pods are removed when a namespace is deleted [Conformance]": { + "average_duration": 16 + }, + "[sig-api-machinery] Namespaces [Serial] should ensure that all pods are removed when a namespace is deleted [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-api-machinery] Namespaces [Serial] should ensure that all services are removed when a namespace is deleted [Conformance]": { + "average_duration": 9 + }, + "[sig-api-machinery] Namespaces [Serial] should ensure that all services are removed when a namespace is deleted [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-api-machinery] Namespaces [Serial] should patch a Namespace [Conformance]": { + "average_duration": 1 + }, + "[sig-api-machinery] Namespaces [Serial] should patch a Namespace [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] OpenAPIV3 should contain OpenAPI V3 for Aggregated APIServer [Serial]": { + "average_duration": 27 + }, + "[sig-api-machinery] OpenAPIV3 should contain OpenAPI V3 for Aggregated APIServer [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-api-machinery] OpenAPIV3 should contain OpenAPI V3 for Aggregated APIServer [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 34 + }, + "[sig-api-machinery] OpenAPIV3 should publish OpenAPI V3 for CustomResourceDefinition": { + "average_duration": 6 + }, + "[sig-api-machinery] OpenAPIV3 should publish OpenAPI V3 for CustomResourceDefinition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-api-machinery] OpenAPIV3 should round trip OpenAPI V3 for all built-in group versions": { + "average_duration": 3 + }, + "[sig-api-machinery] OpenAPIV3 should round trip OpenAPI V3 for all built-in group versions [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-api-machinery] OrderedNamespaceDeletion namespace deletion should delete pod first [Conformance]": { + "average_duration": 105 + }, + "[sig-api-machinery] OrderedNamespaceDeletion namespace deletion should delete pod first [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 88 + }, + "[sig-api-machinery] OrderedNamespaceDeletion namespace deletion should delete pod first [Feature:OrderedNamespaceDeletion] [FeatureGate:OrderedNamespaceDeletion] [Beta] [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's multiple priority class scope (quota set to pod count: 2) against 2 pods with same priority classes.": { + "average_duration": 4 + }, + "[sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's multiple priority class scope (quota set to pod count: 2) against 2 pods with same priority classes. [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (cpu, memory quota set) against a pod with same priority class.": { + "average_duration": 3 + }, + "[sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (cpu, memory quota set) against a pod with same priority class. [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against 2 pods with different priority class.": { + "average_duration": 3 + }, + "[sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against 2 pods with different priority class. [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against 2 pods with same priority class.": { + "average_duration": 4 + }, + "[sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against 2 pods with same priority class. [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with different priority class (ScopeSelectorOpExists).": { + "average_duration": 4 + }, + "[sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with different priority class (ScopeSelectorOpExists). [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with different priority class (ScopeSelectorOpNotIn).": { + "average_duration": 2 + }, + "[sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with different priority class (ScopeSelectorOpNotIn). [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with same priority class.": { + "average_duration": 3 + }, + "[sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with same priority class. [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-api-machinery] ResourceQuota [Feature:ScopeSelectors] should verify ResourceQuota with best effort scope using scope-selectors. [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-api-machinery] ResourceQuota [Feature:ScopeSelectors] should verify ResourceQuota with terminating scopes through scope selectors. [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-api-machinery] ResourceQuota [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should verify ResourceQuota's volume attributes class scope (quota set to pvc count: 1) against 2 pvcs with same volume attributes class. [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-api-machinery] ResourceQuota [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should verify ResourceQuota's volume attributes class scope (quota set to pvc count: 1) against a pvc with different volume attributes class. [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-api-machinery] ResourceQuota [FeatureGate:VolumeAttributesClass] should verify ResourceQuota's volume attributes class scope (quota set to pvc count: 1) against 2 pvcs with same volume attributes class.": { + "average_duration": 5 + }, + "[sig-api-machinery] ResourceQuota [FeatureGate:VolumeAttributesClass] should verify ResourceQuota's volume attributes class scope (quota set to pvc count: 1) against 2 pvcs with same volume attributes class. [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-api-machinery] ResourceQuota [FeatureGate:VolumeAttributesClass] should verify ResourceQuota's volume attributes class scope (quota set to pvc count: 1) against a pvc with different volume attributes class.": { + "average_duration": 20 + }, + "[sig-api-machinery] ResourceQuota [FeatureGate:VolumeAttributesClass] should verify ResourceQuota's volume attributes class scope (quota set to pvc count: 1) against a pvc with different volume attributes class. [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-api-machinery] ResourceQuota should apply changes to a resourcequota status [Conformance]": { + "average_duration": 122 + }, + "[sig-api-machinery] ResourceQuota should apply changes to a resourcequota status [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 145 + }, + "[sig-api-machinery] ResourceQuota should be able to update and delete ResourceQuota. [Conformance]": { + "average_duration": 1 + }, + "[sig-api-machinery] ResourceQuota should be able to update and delete ResourceQuota. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a ResourceClaim [FeatureGate:DynamicResourceAllocation] [DRA]": { + "average_duration": 10 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a ResourceClaim [FeatureGate:DynamicResourceAllocation] [DRA] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a configMap. [Conformance]": { + "average_duration": 25 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a configMap. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 29 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a custom resource.": { + "average_duration": 28 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a custom resource. [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a persistent volume claim": { + "average_duration": 9 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a persistent volume claim [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a persistent volume claim with a storage class": { + "average_duration": 10 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a persistent volume claim with a storage class [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a pod. [Conformance]": { + "average_duration": 8 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a pod. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a replica set. [Conformance]": { + "average_duration": 9 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a replica set. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a replication controller. [Conformance]": { + "average_duration": 9 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a replication controller. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a secret. [Conformance]": { + "average_duration": 14 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a secret. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a service. [Conformance]": { + "average_duration": 8 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a service. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and ensure its status is promptly calculated. [Conformance]": { + "average_duration": 7 + }, + "[sig-api-machinery] ResourceQuota should create a ResourceQuota and ensure its status is promptly calculated. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-api-machinery] ResourceQuota should manage the lifecycle of a ResourceQuota [Conformance]": { + "average_duration": 1 + }, + "[sig-api-machinery] ResourceQuota should manage the lifecycle of a ResourceQuota [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] ResourceQuota should verify ResourceQuota with best effort scope using scope-selectors.": { + "average_duration": 5 + }, + "[sig-api-machinery] ResourceQuota should verify ResourceQuota with best effort scope using scope-selectors. [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-api-machinery] ResourceQuota should verify ResourceQuota with best effort scope. [Conformance]": { + "average_duration": 5 + }, + "[sig-api-machinery] ResourceQuota should verify ResourceQuota with best effort scope. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-api-machinery] ResourceQuota should verify ResourceQuota with cross namespace pod affinity scope using scope-selectors.": { + "average_duration": 3 + }, + "[sig-api-machinery] ResourceQuota should verify ResourceQuota with cross namespace pod affinity scope using scope-selectors. [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-api-machinery] ResourceQuota should verify ResourceQuota with terminating scopes through scope selectors.": { + "average_duration": 15 + }, + "[sig-api-machinery] ResourceQuota should verify ResourceQuota with terminating scopes through scope selectors. [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-api-machinery] ResourceQuota should verify ResourceQuota with terminating scopes. [Conformance]": { + "average_duration": 24 + }, + "[sig-api-machinery] ResourceQuota should verify ResourceQuota with terminating scopes. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-api-machinery] Server request timeout default timeout should be used if the specified timeout in the request URL is 0s": { + "average_duration": 1 + }, + "[sig-api-machinery] Server request timeout default timeout should be used if the specified timeout in the request URL is 0s [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] Server request timeout should return HTTP status code 400 if the user specifies an invalid timeout in the request URL": { + "average_duration": 1 + }, + "[sig-api-machinery] Server request timeout should return HTTP status code 400 if the user specifies an invalid timeout in the request URL [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] Server request timeout the request should be served with a default timeout if the specified timeout in the request URL exceeds maximum allowed": { + "average_duration": 1 + }, + "[sig-api-machinery] Server request timeout the request should be served with a default timeout if the specified timeout in the request URL exceeds maximum allowed [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] ServerSideApply should create an applied object if it does not already exist": { + "average_duration": 1 + }, + "[sig-api-machinery] ServerSideApply should create an applied object if it does not already exist [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] ServerSideApply should give up ownership of a field if forced applied by a controller": { + "average_duration": 3 + }, + "[sig-api-machinery] ServerSideApply should give up ownership of a field if forced applied by a controller [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-api-machinery] ServerSideApply should ignore conflict errors if force apply is used": { + "average_duration": 2 + }, + "[sig-api-machinery] ServerSideApply should ignore conflict errors if force apply is used [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] ServerSideApply should not remove a field if an owner unsets the field but other managers still have ownership of the field": { + "average_duration": 2 + }, + "[sig-api-machinery] ServerSideApply should not remove a field if an owner unsets the field but other managers still have ownership of the field [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] ServerSideApply should remove a field if it is owned but removed in the apply request": { + "average_duration": 1 + }, + "[sig-api-machinery] ServerSideApply should remove a field if it is owned but removed in the apply request [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] ServerSideApply should work for CRDs": { + "average_duration": 8 + }, + "[sig-api-machinery] ServerSideApply should work for CRDs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-api-machinery] ServerSideApply should work for subresources": { + "average_duration": 1 + }, + "[sig-api-machinery] ServerSideApply should work for subresources [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] Servers with support for API chunking should return chunks of results for list calls [Conformance]": { + "average_duration": 21 + }, + "[sig-api-machinery] Servers with support for API chunking should return chunks of results for list calls [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-api-machinery] Servers with support for API chunking should return chunks of results for list calls [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-api-machinery] Servers with support for Table transformation should return a 406 for a backend which does not implement metadata [Conformance]": { + "average_duration": 1 + }, + "[sig-api-machinery] Servers with support for Table transformation should return a 406 for a backend which does not implement metadata [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] Servers with support for Table transformation should return chunks of table results for list calls": { + "average_duration": 1 + }, + "[sig-api-machinery] Servers with support for Table transformation should return chunks of table results for list calls [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] Servers with support for Table transformation should return generic metadata details across all namespaces for nodes": { + "average_duration": 1 + }, + "[sig-api-machinery] Servers with support for Table transformation should return generic metadata details across all namespaces for nodes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] Servers with support for Table transformation should return pod details": { + "average_duration": 1 + }, + "[sig-api-machinery] Servers with support for Table transformation should return pod details [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] [FeatureGate:ValidatingAdmissionPolicy] [Beta] should allow expressions to refer variables. [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] [FeatureGate:ValidatingAdmissionPolicy] [Beta] should type check a CRD [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] [FeatureGate:ValidatingAdmissionPolicy] [Beta] should type check validation expressions [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] [FeatureGate:ValidatingAdmissionPolicy] [Beta] should validate against a Deployment [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should allow expressions to refer variables. [Conformance]": { + "average_duration": 2 + }, + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should allow expressions to refer variables. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should support ValidatingAdmissionPolicy API operations [Conformance]": { + "average_duration": 2 + }, + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should support ValidatingAdmissionPolicy API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should support ValidatingAdmissionPolicyBinding API operations [Conformance]": { + "average_duration": 2 + }, + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should support ValidatingAdmissionPolicyBinding API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should type check a CRD": { + "average_duration": 2 + }, + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should type check a CRD [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should type check validation expressions": { + "average_duration": 1 + }, + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should type check validation expressions [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should validate against a Deployment [Conformance]": { + "average_duration": 2 + }, + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should validate against a Deployment [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin][Alpha][Feature:ValidatingAdmissionPolicy] should allow expressions to refer variables. [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin][Alpha][Feature:ValidatingAdmissionPolicy] should type check validation expressions [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin][Alpha][Feature:ValidatingAdmissionPolicy] should validate against a Deployment [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-api-machinery] Watchers should be able to restart watching from the last resource version observed by the previous watch [Conformance]": { + "average_duration": 1 + }, + "[sig-api-machinery] Watchers should be able to restart watching from the last resource version observed by the previous watch [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] Watchers should be able to start watching from a specific resource version [Conformance]": { + "average_duration": 1 + }, + "[sig-api-machinery] Watchers should be able to start watching from a specific resource version [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] Watchers should observe add, update, and delete watch notifications on configmaps [Conformance]": { + "average_duration": 20 + }, + "[sig-api-machinery] Watchers should observe add, update, and delete watch notifications on configmaps [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-api-machinery] Watchers should observe an object deletion if it stops meeting the requirements of the selector [Conformance]": { + "average_duration": 11 + }, + "[sig-api-machinery] Watchers should observe an object deletion if it stops meeting the requirements of the selector [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-api-machinery] Watchers should receive events on concurrent watches in same order [Conformance]": { + "average_duration": 6 + }, + "[sig-api-machinery] Watchers should receive events on concurrent watches in same order [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-api-machinery] client-go should negotiate watch and report errors with accept \"application/json\"": { + "average_duration": 1 + }, + "[sig-api-machinery] client-go should negotiate watch and report errors with accept \"application/json\" [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] client-go should negotiate watch and report errors with accept \"application/json,application/vnd.kubernetes.protobuf\"": { + "average_duration": 1 + }, + "[sig-api-machinery] client-go should negotiate watch and report errors with accept \"application/json,application/vnd.kubernetes.protobuf\" [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] client-go should negotiate watch and report errors with accept \"application/vnd.kubernetes.protobuf\"": { + "average_duration": 1 + }, + "[sig-api-machinery] client-go should negotiate watch and report errors with accept \"application/vnd.kubernetes.protobuf\" [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] client-go should negotiate watch and report errors with accept \"application/vnd.kubernetes.protobuf,application/json\"": { + "average_duration": 1 + }, + "[sig-api-machinery] client-go should negotiate watch and report errors with accept \"application/vnd.kubernetes.protobuf,application/json\" [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] disruption/cache-kube-api apiserver/kube-apiserver connection/new should be available throughout the test": { + "average_duration": 0 + }, + "[sig-api-machinery] disruption/cache-kube-api apiserver/kube-apiserver connection/reused should be available throughout the test": { + "average_duration": 0 + }, + "[sig-api-machinery] disruption/cache-kube-api connection/new should be available throughout the test": { + "average_duration": 477 + }, + "[sig-api-machinery] disruption/cache-kube-api connection/reused should be available throughout the test": { + "average_duration": 477 + }, + "[sig-api-machinery] disruption/cache-kube-api should be available throughout the test": { + "average_duration": 0 + }, + "[sig-api-machinery] disruption/cache-oauth-api apiserver/oauth-apiserver connection/new should be available throughout the test": { + "average_duration": 0 + }, + "[sig-api-machinery] disruption/cache-oauth-api apiserver/oauth-apiserver connection/reused should be available throughout the test": { + "average_duration": 0 + }, + "[sig-api-machinery] disruption/cache-oauth-api connection/new should be available throughout the test": { + "average_duration": 477 + }, + "[sig-api-machinery] disruption/cache-oauth-api connection/reused should be available throughout the test": { + "average_duration": 477 + }, + "[sig-api-machinery] disruption/cache-oauth-api should be available throughout the test": { + "average_duration": 0 + }, + "[sig-api-machinery] disruption/cache-openshift-api apiserver/openshift-apiserver connection/new should be available throughout the test": { + "average_duration": 0 + }, + "[sig-api-machinery] disruption/cache-openshift-api apiserver/openshift-apiserver connection/reused should be available throughout the test": { + "average_duration": 0 + }, + "[sig-api-machinery] disruption/cache-openshift-api connection/new should be available throughout the test": { + "average_duration": 477 + }, + "[sig-api-machinery] disruption/cache-openshift-api connection/reused should be available throughout the test": { + "average_duration": 477 + }, + "[sig-api-machinery] disruption/cache-openshift-api should be available throughout the test": { + "average_duration": 0 + }, + "[sig-api-machinery] disruption/kube-api apiserver/kube-apiserver connection/new should be available throughout the test": { + "average_duration": 0 + }, + "[sig-api-machinery] disruption/kube-api apiserver/kube-apiserver connection/reused should be available throughout the test": { + "average_duration": 0 + }, + "[sig-api-machinery] disruption/kube-api connection/new should be available throughout the test": { + "average_duration": 477 + }, + "[sig-api-machinery] disruption/kube-api connection/reused should be available throughout the test": { + "average_duration": 477 + }, + "[sig-api-machinery] disruption/kube-api should be available throughout the test": { + "average_duration": 0 + }, + "[sig-api-machinery] disruption/oauth-api apiserver/oauth-apiserver connection/new should be available throughout the test": { + "average_duration": 0 + }, + "[sig-api-machinery] disruption/oauth-api apiserver/oauth-apiserver connection/reused should be available throughout the test": { + "average_duration": 0 + }, + "[sig-api-machinery] disruption/oauth-api connection/new should be available throughout the test": { + "average_duration": 477 + }, + "[sig-api-machinery] disruption/oauth-api connection/reused should be available throughout the test": { + "average_duration": 477 + }, + "[sig-api-machinery] disruption/oauth-api should be available throughout the test": { + "average_duration": 0 + }, + "[sig-api-machinery] disruption/openshift-api apiserver/openshift-apiserver connection/new should be available throughout the test": { + "average_duration": 0 + }, + "[sig-api-machinery] disruption/openshift-api apiserver/openshift-apiserver connection/reused should be available throughout the test": { + "average_duration": 0 + }, + "[sig-api-machinery] disruption/openshift-api connection/new should be available throughout the test": { + "average_duration": 477 + }, + "[sig-api-machinery] disruption/openshift-api connection/reused should be available throughout the test": { + "average_duration": 477 + }, + "[sig-api-machinery] disruption/openshift-api should be available throughout the test": { + "average_duration": 0 + }, + "[sig-api-machinery] health handlers should contain necessary checks": { + "average_duration": 1 + }, + "[sig-api-machinery] health handlers should contain necessary checks [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] kube-apiserver terminates within graceful termination period": { + "average_duration": 0 + }, + "[sig-api-machinery] server version should find the server version [Conformance]": { + "average_duration": 1 + }, + "[sig-api-machinery] server version should find the server version [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-api-machinery] the pod.spec.nodeName field is immutable, once set cannot be changed": { + "average_duration": 0 + }, + "[sig-api-machinery][Feature:APIServer] API LBs follow /readyz of kube-apiserver and stop sending requests before server shutdowns for external clients": { + "average_duration": 0 + }, + "[sig-api-machinery][Feature:APIServer] TestTLSDefaults [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-api-machinery][Feature:APIServer] anonymous browsers should get a 403 from / [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-api-machinery][Feature:APIServer] authenticated browser should get a 200 from / [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-api-machinery][Feature:APIServer] should serve openapi v3 [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-api-machinery][Feature:APIServer] should serve openapi v3 discovery [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-api-machinery][Feature:APIServer][Late] API LBs follow /readyz of kube-apiserver and don't send request early [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-api-machinery][Feature:APIServer][Late] API LBs follow /readyz of kube-apiserver and stop sending requests [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-api-machinery][Feature:APIServer][Late] API LBs follow /readyz of kube-apiserver and stop sending requests before server shutdowns for external clients [Suite:openshift/conformance/parallel]": { + "average_duration": 33 + }, + "[sig-api-machinery][Feature:APIServer][Late] API LBs follow /readyz of kube-apiserver and stop sending requests before server shutdowns for external clients [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 29 + }, + "[sig-api-machinery][Feature:APIServer][Late] kube-apiserver terminates within graceful termination period [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-api-machinery][Feature:APIServer][Late] kubelet terminates kube-apiserver gracefully [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-api-machinery][Feature:APIServer][Late] kubelet terminates kube-apiserver gracefully extended [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-api-machinery][Feature:ClusterResourceQuota] Cluster resource quota should control resource limits across namespaces [apigroup:quota.openshift.io][apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 20 + }, + "[sig-api-machinery][Feature:ClusterResourceQuota] Cluster resource quota should control resource limits across namespaces [apigroup:quota.openshift.io][apigroup:image.openshift.io][apigroup:monitoring.coreos.com][apigroup:template.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 26 + }, + "[sig-api-machinery][Feature:ReadOnlyRootFilesystem] Explicitly set readOnlyRootFilesystem to true - openshift-cloud-credential-operator [OCP-83088][Skipped:Disconnected][Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 4 + }, + "[sig-api-machinery][Feature:ReadOnlyRootFilesystem] Explicitly set readOnlyRootFilesystem to true - openshift-cluster-version [OCP-83088][Skipped:Disconnected][Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 4 + }, + "[sig-api-machinery][Feature:ReadOnlyRootFilesystem] Explicitly set readOnlyRootFilesystem to true - openshift-console [OCP-83088][Skipped:Disconnected][Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 4 + }, + "[sig-api-machinery][Feature:ReadOnlyRootFilesystem] Explicitly set readOnlyRootFilesystem to true - openshift-console-operator [OCP-83088][Skipped:Disconnected][Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 4 + }, + "[sig-api-machinery][Feature:ReadOnlyRootFilesystem] Explicitly set readOnlyRootFilesystem to true - openshift-controller-manager-operator [OCP-83088][Skipped:Disconnected][Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 4 + }, + "[sig-api-machinery][Feature:ReadOnlyRootFilesystem] Explicitly set readOnlyRootFilesystem to true - openshift-dns [OCP-83088][Skipped:Disconnected][Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 4 + }, + "[sig-api-machinery][Feature:ReadOnlyRootFilesystem] Explicitly set readOnlyRootFilesystem to true - openshift-etcd [OCP-83088][Skipped:Disconnected][Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 4 + }, + "[sig-api-machinery][Feature:ReadOnlyRootFilesystem] Explicitly set readOnlyRootFilesystem to true - openshift-etcd-operator [OCP-83088][Skipped:Disconnected][Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 4 + }, + "[sig-api-machinery][Feature:ReadOnlyRootFilesystem] Explicitly set readOnlyRootFilesystem to true - openshift-image-registry [OCP-83088][Skipped:Disconnected][Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 4 + }, + "[sig-api-machinery][Feature:ReadOnlyRootFilesystem] Explicitly set readOnlyRootFilesystem to true - openshift-insights [OCP-83088][Skipped:Disconnected][Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 4 + }, + "[sig-api-machinery][Feature:ReadOnlyRootFilesystem] Explicitly set readOnlyRootFilesystem to true - openshift-kube-apiserver [OCP-83088][Skipped:Disconnected][Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 4 + }, + "[sig-api-machinery][Feature:ReadOnlyRootFilesystem] Explicitly set readOnlyRootFilesystem to true - openshift-kube-apiserver-operator [OCP-83088][Skipped:Disconnected][Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 4 + }, + "[sig-api-machinery][Feature:ReadOnlyRootFilesystem] Explicitly set readOnlyRootFilesystem to true - openshift-kube-scheduler [OCP-83088][Skipped:Disconnected][Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 6 + }, + "[sig-api-machinery][Feature:ReadOnlyRootFilesystem] Explicitly set readOnlyRootFilesystem to true - openshift-kube-scheduler-operator [OCP-83088][Skipped:Disconnected][Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 4 + }, + "[sig-api-machinery][Feature:ReadOnlyRootFilesystem] Explicitly set readOnlyRootFilesystem to true - openshift-marketplace [OCP-83088][Skipped:Disconnected][Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 11 + }, + "[sig-api-machinery][Feature:ReadOnlyRootFilesystem] Explicitly set readOnlyRootFilesystem to true - openshift-operator-lifecycle-manager [OCP-83088][Skipped:Disconnected][Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 4 + }, + "[sig-api-machinery][Feature:ResourceQuota] Object count check the quota after import-image with --all option [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-api-machinery][Feature:ResourceQuota] Object count should properly count the number of imagestreams resources [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-api-machinery][Feature:ResourceQuota] Object count should properly count the number of persistentvolumeclaims resources [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 5 + }, + "[sig-api-machinery][Feature:ResourceQuota] Object count when exceed openshift.io/image-tags will ban to create new image references in the project [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-api-machinery][Feature:ServerSideApply] Server-Side Apply should work for apps.openshift.io/v1, Resource=deploymentconfigs [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-api-machinery][Feature:ServerSideApply] Server-Side Apply should work for build.openshift.io/v1, Resource=buildconfigs [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-api-machinery][Feature:ServerSideApply] Server-Side Apply should work for build.openshift.io/v1, Resource=builds [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-api-machinery][Feature:ServerSideApply] Server-Side Apply should work for image.openshift.io/v1, Resource=images [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-api-machinery][Feature:ServerSideApply] Server-Side Apply should work for image.openshift.io/v1, Resource=imagestreams [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-api-machinery][Feature:ServerSideApply] Server-Side Apply should work for oauth.openshift.io/v1, Resource=oauthaccesstokens [apigroup:oauth.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-api-machinery][Feature:ServerSideApply] Server-Side Apply should work for oauth.openshift.io/v1, Resource=oauthauthorizetokens [apigroup:oauth.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-api-machinery][Feature:ServerSideApply] Server-Side Apply should work for oauth.openshift.io/v1, Resource=oauthclientauthorizations [apigroup:oauth.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-api-machinery][Feature:ServerSideApply] Server-Side Apply should work for oauth.openshift.io/v1, Resource=oauthclients [apigroup:oauth.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-api-machinery][Feature:ServerSideApply] Server-Side Apply should work for route.openshift.io/v1, Resource=routes [apigroup:route.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-api-machinery][Feature:ServerSideApply] Server-Side Apply should work for security.openshift.io/v1, Resource=rangeallocations [apigroup:security.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-api-machinery][Feature:ServerSideApply] Server-Side Apply should work for template.openshift.io/v1, Resource=brokertemplateinstances [apigroup:template.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-api-machinery][Feature:ServerSideApply] Server-Side Apply should work for template.openshift.io/v1, Resource=templateinstances [apigroup:template.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-api-machinery][Feature:ServerSideApply] Server-Side Apply should work for template.openshift.io/v1, Resource=templates [apigroup:template.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-api-machinery][Feature:ServerSideApply] Server-Side Apply should work for user.openshift.io/v1, Resource=groups [apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-api-machinery][Feature:ServerSideApply] Server-Side Apply should work for user.openshift.io/v1, Resource=identities [apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-api-machinery][Feature:ServerSideApply] Server-Side Apply should work for user.openshift.io/v1, Resource=users [apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-apimachinery] informers must match live results at the same resource version": { + "average_duration": 0 + }, + "[sig-apimachinery] installer pods should not run concurrently on two or more nodes": { + "average_duration": 0 + }, + "[sig-apimachinery] new and reused connections to kube-apiserver should be handled gracefully during the graceful termination process": { + "average_duration": 0 + }, + "[sig-apimachinery] server-side-apply should function properly should clear fields when they are no longer being applied in FeatureGates [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-apimachinery] server-side-apply should function properly should clear fields when they are no longer being applied in FeatureGates [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-apimachinery] server-side-apply should function properly should clear fields when they are no longer being applied in built-in APIs [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-apimachinery] server-side-apply should function properly should clear fields when they are no longer being applied on CRDs [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-apps] ControllerRevision [Serial] should manage the lifecycle of a ControllerRevision [Conformance]": { + "average_duration": 7 + }, + "[sig-apps] ControllerRevision [Serial] should manage the lifecycle of a ControllerRevision [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-apps] CronJob should be able to schedule after more than 100 missed schedule": { + "average_duration": 30 + }, + "[sig-apps] CronJob should be able to schedule after more than 100 missed schedule [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-apps] CronJob should delete failed finished jobs with limit of one job": { + "average_duration": 93 + }, + "[sig-apps] CronJob should delete failed finished jobs with limit of one job [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 101 + }, + "[sig-apps] CronJob should delete successful finished jobs with limit of one successful job": { + "average_duration": 92 + }, + "[sig-apps] CronJob should delete successful finished jobs with limit of one successful job [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 99 + }, + "[sig-apps] CronJob should not emit unexpected warnings": { + "average_duration": 88 + }, + "[sig-apps] CronJob should not emit unexpected warnings [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 98 + }, + "[sig-apps] CronJob should remove from active list jobs that have been deleted": { + "average_duration": 62 + }, + "[sig-apps] CronJob should remove from active list jobs that have been deleted [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 68 + }, + "[sig-apps] CronJob should replace jobs when ReplaceConcurrent [Conformance]": { + "average_duration": 86 + }, + "[sig-apps] CronJob should replace jobs when ReplaceConcurrent [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 92 + }, + "[sig-apps] CronJob should schedule multiple jobs concurrently [Conformance]": { + "average_duration": 86 + }, + "[sig-apps] CronJob should schedule multiple jobs concurrently [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 92 + }, + "[sig-apps] CronJob should set the cronjob-scheduled-timestamp annotation on a job": { + "average_duration": 30 + }, + "[sig-apps] CronJob should set the cronjob-scheduled-timestamp annotation on a job [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-apps] CronJob should support CronJob API operations [Conformance]": { + "average_duration": 1 + }, + "[sig-apps] CronJob should support CronJob API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-apps] CronJob should support timezone": { + "average_duration": 1 + }, + "[sig-apps] CronJob should support timezone [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-apps] Daemon set [Serial] should list and delete a collection of DaemonSets [Conformance]": { + "average_duration": 4 + }, + "[sig-apps] Daemon set [Serial] should list and delete a collection of DaemonSets [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-apps] Daemon set [Serial] should not update pod when spec was updated and update strategy is OnDelete": { + "average_duration": 7 + }, + "[sig-apps] Daemon set [Serial] should not update pod when spec was updated and update strategy is OnDelete [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-apps] Daemon set [Serial] should retry creating failed daemon pods [Conformance]": { + "average_duration": 9 + }, + "[sig-apps] Daemon set [Serial] should retry creating failed daemon pods [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-apps] Daemon set [Serial] should rollback without unnecessary restarts [Conformance]": { + "average_duration": 12 + }, + "[sig-apps] Daemon set [Serial] should rollback without unnecessary restarts [Conformance] [Skipped:SingleReplicaTopology] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-apps] Daemon set [Serial] should rollback without unnecessary restarts [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-apps] Daemon set [Serial] should run and stop complex daemon [Conformance]": { + "average_duration": 10 + }, + "[sig-apps] Daemon set [Serial] should run and stop complex daemon [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-apps] Daemon set [Serial] should run and stop complex daemon with node affinity": { + "average_duration": 6 + }, + "[sig-apps] Daemon set [Serial] should run and stop complex daemon with node affinity [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-apps] Daemon set [Serial] should run and stop simple daemon [Conformance]": { + "average_duration": 10 + }, + "[sig-apps] Daemon set [Serial] should run and stop simple daemon [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-apps] Daemon set [Serial] should surge pods onto nodes when spec was updated and update strategy is RollingUpdate": { + "average_duration": 96 + }, + "[sig-apps] Daemon set [Serial] should surge pods onto nodes when spec was updated and update strategy is RollingUpdate [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 97 + }, + "[sig-apps] Daemon set [Serial] should update pod when spec was updated and update strategy is RollingUpdate [Conformance]": { + "average_duration": 14 + }, + "[sig-apps] Daemon set [Serial] should update pod when spec was updated and update strategy is RollingUpdate [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-apps] Daemon set [Serial] should verify changes to a daemon set status [Conformance]": { + "average_duration": 7 + }, + "[sig-apps] Daemon set [Serial] should verify changes to a daemon set status [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-apps] Deployment Deployment should have a working scale subresource [Conformance]": { + "average_duration": 4 + }, + "[sig-apps] Deployment Deployment should have a working scale subresource [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-apps] Deployment RecreateDeployment should delete old pods and create new ones [Conformance]": { + "average_duration": 3 + }, + "[sig-apps] Deployment RecreateDeployment should delete old pods and create new ones [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-apps] Deployment RollingUpdateDeployment should delete old pods and create new ones [Conformance]": { + "average_duration": 8 + }, + "[sig-apps] Deployment RollingUpdateDeployment should delete old pods and create new ones [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-apps] Deployment deployment reaping should cascade to its replica sets and pods": { + "average_duration": 4 + }, + "[sig-apps] Deployment deployment reaping should cascade to its replica sets and pods [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-apps] Deployment deployment should delete old replica sets [Conformance]": { + "average_duration": 7 + }, + "[sig-apps] Deployment deployment should delete old replica sets [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-apps] Deployment deployment should support proportional scaling [Conformance]": { + "average_duration": 9 + }, + "[sig-apps] Deployment deployment should support proportional scaling [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-apps] Deployment deployment should support rollover [Conformance]": { + "average_duration": 20 + }, + "[sig-apps] Deployment deployment should support rollover [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-apps] Deployment iterative rollouts should eventually progress": { + "average_duration": 46 + }, + "[sig-apps] Deployment iterative rollouts should eventually progress [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 52 + }, + "[sig-apps] Deployment should not disrupt a cloud load-balancer's connectivity during rollout": { + "average_duration": 102 + }, + "[sig-apps] Deployment should not disrupt a cloud load-balancer's connectivity during rollout [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 96 + }, + "[sig-apps] Deployment should run the lifecycle of a Deployment [Conformance]": { + "average_duration": 9 + }, + "[sig-apps] Deployment should run the lifecycle of a Deployment [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-apps] Deployment should validate Deployment Status endpoints [Conformance]": { + "average_duration": 4 + }, + "[sig-apps] Deployment should validate Deployment Status endpoints [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-apps] Deployment test Deployment ReplicaSet orphaning and adoption regarding controllerRef": { + "average_duration": 7 + }, + "[sig-apps] Deployment test Deployment ReplicaSet orphaning and adoption regarding controllerRef [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-apps] DisruptionController Listing PodDisruptionBudgets for all namespaces should list and delete a collection of PodDisruptionBudgets [Conformance]": { + "average_duration": 3 + }, + "[sig-apps] DisruptionController Listing PodDisruptionBudgets for all namespaces should list and delete a collection of PodDisruptionBudgets [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-apps] DisruptionController evictions: enough pods, absolute =\u003e should allow an eviction": { + "average_duration": 4 + }, + "[sig-apps] DisruptionController evictions: enough pods, absolute =\u003e should allow an eviction [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-apps] DisruptionController evictions: enough pods, replicaSet, percentage =\u003e should allow an eviction": { + "average_duration": 5 + }, + "[sig-apps] DisruptionController evictions: enough pods, replicaSet, percentage =\u003e should allow an eviction [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-apps] DisruptionController evictions: maxUnavailable allow single eviction, percentage =\u003e should allow an eviction": { + "average_duration": 5 + }, + "[sig-apps] DisruptionController evictions: maxUnavailable allow single eviction, percentage =\u003e should allow an eviction [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-apps] DisruptionController evictions: maxUnavailable deny evictions, integer =\u003e should not allow an eviction [Serial]": { + "average_duration": 3 + }, + "[sig-apps] DisruptionController evictions: maxUnavailable deny evictions, integer =\u003e should not allow an eviction [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-apps] DisruptionController evictions: no PDB =\u003e should allow an eviction": { + "average_duration": 3 + }, + "[sig-apps] DisruptionController evictions: no PDB =\u003e should allow an eviction [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-apps] DisruptionController evictions: too few pods, absolute =\u003e should not allow an eviction": { + "average_duration": 3 + }, + "[sig-apps] DisruptionController evictions: too few pods, absolute =\u003e should not allow an eviction [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-apps] DisruptionController evictions: too few pods, replicaSet, percentage =\u003e should not allow an eviction [Serial]": { + "average_duration": 3 + }, + "[sig-apps] DisruptionController evictions: too few pods, replicaSet, percentage =\u003e should not allow an eviction [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-apps] DisruptionController should block an eviction until the PDB is updated to allow it [Conformance]": { + "average_duration": 7 + }, + "[sig-apps] DisruptionController should block an eviction until the PDB is updated to allow it [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-apps] DisruptionController should create a PodDisruptionBudget [Conformance]": { + "average_duration": 2 + }, + "[sig-apps] DisruptionController should create a PodDisruptionBudget [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-apps] DisruptionController should evict ready pods with AlwaysAllow UnhealthyPodEvictionPolicy": { + "average_duration": 25 + }, + "[sig-apps] DisruptionController should evict ready pods with AlwaysAllow UnhealthyPodEvictionPolicy [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 29 + }, + "[sig-apps] DisruptionController should evict ready pods with Default UnhealthyPodEvictionPolicy": { + "average_duration": 25 + }, + "[sig-apps] DisruptionController should evict ready pods with Default UnhealthyPodEvictionPolicy [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 29 + }, + "[sig-apps] DisruptionController should evict ready pods with IfHealthyBudget UnhealthyPodEvictionPolicy": { + "average_duration": 25 + }, + "[sig-apps] DisruptionController should evict ready pods with IfHealthyBudget UnhealthyPodEvictionPolicy [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 29 + }, + "[sig-apps] DisruptionController should evict unready pods with AlwaysAllow UnhealthyPodEvictionPolicy": { + "average_duration": 6 + }, + "[sig-apps] DisruptionController should evict unready pods with AlwaysAllow UnhealthyPodEvictionPolicy [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-apps] DisruptionController should not evict unready pods with Default UnhealthyPodEvictionPolicy": { + "average_duration": 6 + }, + "[sig-apps] DisruptionController should not evict unready pods with Default UnhealthyPodEvictionPolicy [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-apps] DisruptionController should not evict unready pods with IfHealthyBudget UnhealthyPodEvictionPolicy": { + "average_duration": 6 + }, + "[sig-apps] DisruptionController should not evict unready pods with IfHealthyBudget UnhealthyPodEvictionPolicy [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-apps] DisruptionController should observe PodDisruptionBudget status updated [Conformance]": { + "average_duration": 4 + }, + "[sig-apps] DisruptionController should observe PodDisruptionBudget status updated [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-apps] DisruptionController should observe that the PodDisruptionBudget status is not updated for unmanaged pods": { + "average_duration": 60 + }, + "[sig-apps] DisruptionController should observe that the PodDisruptionBudget status is not updated for unmanaged pods [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 66 + }, + "[sig-apps] DisruptionController should update/patch PodDisruptionBudget status [Conformance]": { + "average_duration": 4 + }, + "[sig-apps] DisruptionController should update/patch PodDisruptionBudget status [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-apps] Job Using a pod failure policy to not count some failures towards the backoffLimit Ignore DisruptionTarget condition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 51 + }, + "[sig-apps] Job Using a pod failure policy to not count some failures towards the backoffLimit Ignore exit code 137 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 51 + }, + "[sig-apps] Job should adopt matching orphans and release non-matching pods [Conformance]": { + "average_duration": 8 + }, + "[sig-apps] Job should adopt matching orphans and release non-matching pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-apps] Job should allow to delegate reconciliation to external controller": { + "average_duration": 3 + }, + "[sig-apps] Job should allow to delegate reconciliation to external controller [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-apps] Job should allow to use a pod failure policy to ignore failure for an evicted pod; matching on the DisruptionTarget condition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 46 + }, + "[sig-apps] Job should allow to use a pod failure policy to ignore failure for an evicted pod; matching on the exit code [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 46 + }, + "[sig-apps] Job should allow to use a pod failure policy to ignore failure matching on DisruptionTarget condition [Conformance]": { + "average_duration": 49 + }, + "[sig-apps] Job should allow to use a pod failure policy to ignore failure matching on DisruptionTarget condition [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 56 + }, + "[sig-apps] Job should allow to use a pod failure policy to ignore failure matching on exit code": { + "average_duration": 38 + }, + "[sig-apps] Job should allow to use a pod failure policy to ignore failure matching on exit code [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-apps] Job should allow to use the pod failure policy on exit code to fail the job early [Conformance]": { + "average_duration": 6 + }, + "[sig-apps] Job should allow to use the pod failure policy on exit code to fail the job early [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-apps] Job should allow to use the pod failure policy on exit code to fail the job early [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-apps] Job should allow to use the pod failure policy to not count the failure towards the backoffLimit [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-apps] Job should apply changes to a job status [Conformance]": { + "average_duration": 4 + }, + "[sig-apps] Job should apply changes to a job status [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-apps] Job should create pods for an Indexed job with completion indexes and specified hostname [Conformance]": { + "average_duration": 10 + }, + "[sig-apps] Job should create pods for an Indexed job with completion indexes and specified hostname [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-apps] Job should create pods with completion indexes for an Indexed Job": { + "average_duration": 10 + }, + "[sig-apps] Job should create pods with completion indexes for an Indexed Job [Feature:PodIndexLabel] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-apps] Job should create pods with completion indexes for an Indexed Job [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-apps] Job should delete a job [Conformance]": { + "average_duration": 6 + }, + "[sig-apps] Job should delete a job [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-apps] Job should delete pods when suspended": { + "average_duration": 7 + }, + "[sig-apps] Job should delete pods when suspended [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-apps] Job should execute all indexes despite some failing when using backoffLimitPerIndex [Conformance]": { + "average_duration": 23 + }, + "[sig-apps] Job should execute all indexes despite some failing when using backoffLimitPerIndex [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-apps] Job should execute all indexes despite some failing when using backoffLimitPerIndex [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-apps] Job should fail to exceed backoffLimit": { + "average_duration": 16 + }, + "[sig-apps] Job should fail to exceed backoffLimit [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-apps] Job should fail when exceeds active deadline": { + "average_duration": 5 + }, + "[sig-apps] Job should fail when exceeds active deadline [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-apps] Job should manage the lifecycle of a job [Conformance]": { + "average_duration": 10 + }, + "[sig-apps] Job should manage the lifecycle of a job [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-apps] Job should mark indexes as failed when the FailIndex action is matched in podFailurePolicy [Conformance]": { + "average_duration": 6 + }, + "[sig-apps] Job should mark indexes as failed when the FailIndex action is matched in podFailurePolicy [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-apps] Job should mark indexes as failed when the FailIndex action is matched in podFailurePolicy [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-apps] Job should not create pods when created in suspend state": { + "average_duration": 10 + }, + "[sig-apps] Job should not create pods when created in suspend state [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-apps] Job should record the failure-count in the Pod annotation when using backoffLimitPerIndex": { + "average_duration": 16 + }, + "[sig-apps] Job should record the failure-count in the Pod annotation when using backoffLimitPerIndex [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-apps] Job should recreate pods only after they have failed if pod replacement policy is set to Failed": { + "average_duration": 20 + }, + "[sig-apps] Job should recreate pods only after they have failed if pod replacement policy is set to Failed [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-apps] Job should remove pods when job is deleted": { + "average_duration": 6 + }, + "[sig-apps] Job should remove pods when job is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-apps] Job should run a job to completion when tasks sometimes fail and are locally restarted [Conformance]": { + "average_duration": 11 + }, + "[sig-apps] Job should run a job to completion when tasks sometimes fail and are locally restarted [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-apps] Job should run a job to completion when tasks succeed": { + "average_duration": 10 + }, + "[sig-apps] Job should run a job to completion when tasks succeed [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-apps] Job should run a job to completion with CPU requests [Serial]": { + "average_duration": 42 + }, + "[sig-apps] Job should run a job to completion with CPU requests [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 53 + }, + "[sig-apps] Job should terminate job execution when the number of failed indexes exceeds maxFailedIndexes [Conformance]": { + "average_duration": 6 + }, + "[sig-apps] Job should terminate job execution when the number of failed indexes exceeds maxFailedIndexes [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-apps] Job should terminate job execution when the number of failed indexes exceeds maxFailedIndexes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-apps] Job should update the status ready field": { + "average_duration": 7 + }, + "[sig-apps] Job should update the status ready field [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-apps] Job with successPolicy should succeeded when all indexes succeeded [Conformance]": { + "average_duration": 6 + }, + "[sig-apps] Job with successPolicy should succeeded when all indexes succeeded [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-apps] Job with successPolicy should succeeded when all indexes succeeded [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-apps] Job with successPolicy succeededCount rule should succeeded even when some indexes remain pending [Conformance]": { + "average_duration": 6 + }, + "[sig-apps] Job with successPolicy succeededCount rule should succeeded even when some indexes remain pending [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-apps] Job with successPolicy succeededCount rule should succeeded even when some indexes remain pending [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-apps] Job with successPolicy succeededIndexes rule should succeeded even when some indexes remain pending [Conformance]": { + "average_duration": 6 + }, + "[sig-apps] Job with successPolicy succeededIndexes rule should succeeded even when some indexes remain pending [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-apps] Job with successPolicy succeededIndexes rule should succeeded even when some indexes remain pending [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-apps] ReplicaSet Replace and Patch tests [Conformance]": { + "average_duration": 7 + }, + "[sig-apps] ReplicaSet Replace and Patch tests [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-apps] ReplicaSet Replicaset should have a working scale subresource [Conformance]": { + "average_duration": 4 + }, + "[sig-apps] ReplicaSet Replicaset should have a working scale subresource [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-apps] ReplicaSet should adopt matching pods on creation and release no longer matching pods [Conformance]": { + "average_duration": 4 + }, + "[sig-apps] ReplicaSet should adopt matching pods on creation and release no longer matching pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-apps] ReplicaSet should list and delete a collection of ReplicaSets [Conformance]": { + "average_duration": 6 + }, + "[sig-apps] ReplicaSet should list and delete a collection of ReplicaSets [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-apps] ReplicaSet should serve a basic image on each replica with a private image": { + "average_duration": 2 + }, + "[sig-apps] ReplicaSet should serve a basic image on each replica with a private image [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-apps] ReplicaSet should serve a basic image on each replica with a public image [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-apps] ReplicaSet should serve a basic image on each replica with a public image [Conformance]": { + "average_duration": 5 + }, + "[sig-apps] ReplicaSet should serve a basic image on each replica with a public image [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-apps] ReplicaSet should surface a failure condition on a common issue like exceeded quota": { + "average_duration": 2 + }, + "[sig-apps] ReplicaSet should surface a failure condition on a common issue like exceeded quota [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-apps] ReplicaSet should validate Replicaset Status endpoints [Conformance]": { + "average_duration": 4 + }, + "[sig-apps] ReplicaSet should validate Replicaset Status endpoints [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-apps] ReplicationController should adopt matching pods on creation [Conformance]": { + "average_duration": 4 + }, + "[sig-apps] ReplicationController should adopt matching pods on creation [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-apps] ReplicationController should get and update a ReplicationController scale [Conformance]": { + "average_duration": 2 + }, + "[sig-apps] ReplicationController should get and update a ReplicationController scale [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-apps] ReplicationController should release no longer matching pods [Conformance]": { + "average_duration": 4 + }, + "[sig-apps] ReplicationController should release no longer matching pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-apps] ReplicationController should serve a basic image on each replica with a private image": { + "average_duration": 2 + }, + "[sig-apps] ReplicationController should serve a basic image on each replica with a private image [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-apps] ReplicationController should serve a basic image on each replica with a public image [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-apps] ReplicationController should serve a basic image on each replica with a public image [Conformance]": { + "average_duration": 5 + }, + "[sig-apps] ReplicationController should serve a basic image on each replica with a public image [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-apps] ReplicationController should surface a failure condition on a common issue like exceeded quota [Conformance]": { + "average_duration": 2 + }, + "[sig-apps] ReplicationController should surface a failure condition on a common issue like exceeded quota [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-apps] ReplicationController should test the lifecycle of a ReplicationController [Conformance]": { + "average_duration": 5 + }, + "[sig-apps] ReplicationController should test the lifecycle of a ReplicationController [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-apps] StatefulSet AvailableReplicas should get updated accordingly when MinReadySeconds is enabled": { + "average_duration": 120 + }, + "[sig-apps] StatefulSet AvailableReplicas should get updated accordingly when MinReadySeconds is enabled [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 129 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] Should recreate evicted statefulset [Conformance]": { + "average_duration": 18 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] Should recreate evicted statefulset [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should adopt matching orphans and release non-matching pods": { + "average_duration": 43 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should adopt matching orphans and release non-matching pods [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 43 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should have a working scale subresource [Conformance]": { + "average_duration": 20 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should have a working scale subresource [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 24 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should implement legacy replacement when the update strategy is OnDelete": { + "average_duration": 49 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should implement legacy replacement when the update strategy is OnDelete [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 61 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should list, patch and delete a collection of StatefulSets [Conformance]": { + "average_duration": 20 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should list, patch and delete a collection of StatefulSets [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should not deadlock when a pod's predecessor fails": { + "average_duration": 75 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should not deadlock when a pod's predecessor fails [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 75 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should perform canary updates and phased rolling updates of template modifications [Conformance]": { + "average_duration": 65 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should perform canary updates and phased rolling updates of template modifications [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 77 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should perform canary updates and phased rolling updates of template modifications for partiton1 and delete pod-0 with failing container": { + "average_duration": 54 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should perform canary updates and phased rolling updates of template modifications for partiton1 and delete pod-0 with failing container [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 66 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should perform canary updates and phased rolling updates of template modifications for partiton1 and delete pod-0 without failing container": { + "average_duration": 51 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should perform canary updates and phased rolling updates of template modifications for partiton1 and delete pod-0 without failing container [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 64 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should perform rolling updates and roll backs of template modifications [Conformance]": { + "average_duration": 75 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should perform rolling updates and roll backs of template modifications [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 98 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should perform rolling updates and roll backs of template modifications with PVCs": { + "average_duration": 143 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should perform rolling updates and roll backs of template modifications with PVCs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 146 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should provide basic identity": { + "average_duration": 130 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should provide basic identity [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 126 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should validate Statefulset Status endpoints [Conformance]": { + "average_duration": 20 + }, + "[sig-apps] StatefulSet Basic StatefulSet functionality [StatefulSetBasic] should validate Statefulset Status endpoints [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-apps] StatefulSet MinReadySeconds should be honored when enabled": { + "average_duration": 10 + }, + "[sig-apps] StatefulSet MinReadySeconds should be honored when enabled [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-apps] StatefulSet Non-retain StatefulSetPersistentVolumeClaimPolicy should delete PVCs after adopting pod (WhenDeleted)": { + "average_duration": 39 + }, + "[sig-apps] StatefulSet Non-retain StatefulSetPersistentVolumeClaimPolicy should delete PVCs after adopting pod (WhenDeleted) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-apps] StatefulSet Non-retain StatefulSetPersistentVolumeClaimPolicy should delete PVCs after adopting pod (WhenScaled)": { + "average_duration": 59 + }, + "[sig-apps] StatefulSet Non-retain StatefulSetPersistentVolumeClaimPolicy should delete PVCs after adopting pod (WhenScaled) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 47 + }, + "[sig-apps] StatefulSet Non-retain StatefulSetPersistentVolumeClaimPolicy should delete PVCs with a OnScaledown policy": { + "average_duration": 46 + }, + "[sig-apps] StatefulSet Non-retain StatefulSetPersistentVolumeClaimPolicy should delete PVCs with a OnScaledown policy [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 47 + }, + "[sig-apps] StatefulSet Non-retain StatefulSetPersistentVolumeClaimPolicy should delete PVCs with a WhenDeleted policy": { + "average_duration": 39 + }, + "[sig-apps] StatefulSet Non-retain StatefulSetPersistentVolumeClaimPolicy should delete PVCs with a WhenDeleted policy [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-apps] StatefulSet Non-retain StatefulSetPersistentVolumeClaimPolicy should not delete PVC with OnScaledown policy if another controller owns the PVC": { + "average_duration": 72 + }, + "[sig-apps] StatefulSet Non-retain StatefulSetPersistentVolumeClaimPolicy should not delete PVC with OnScaledown policy if another controller owns the PVC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 71 + }, + "[sig-apps] StatefulSet Non-retain StatefulSetPersistentVolumeClaimPolicy should not delete PVCs when there is another controller": { + "average_duration": 65 + }, + "[sig-apps] StatefulSet Non-retain StatefulSetPersistentVolumeClaimPolicy should not delete PVCs when there is another controller [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 64 + }, + "[sig-apps] StatefulSet Scaling StatefulSetStartOrdinal Decreasing .start.ordinal": { + "average_duration": 30 + }, + "[sig-apps] StatefulSet Scaling StatefulSetStartOrdinal Decreasing .start.ordinal [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 35 + }, + "[sig-apps] StatefulSet Scaling StatefulSetStartOrdinal Increasing .start.ordinal": { + "average_duration": 31 + }, + "[sig-apps] StatefulSet Scaling StatefulSetStartOrdinal Increasing .start.ordinal [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-apps] StatefulSet Scaling StatefulSetStartOrdinal Removing .start.ordinal": { + "average_duration": 30 + }, + "[sig-apps] StatefulSet Scaling StatefulSetStartOrdinal Removing .start.ordinal [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-apps] StatefulSet Scaling StatefulSetStartOrdinal Setting .start.ordinal": { + "average_duration": 31 + }, + "[sig-apps] StatefulSet Scaling StatefulSetStartOrdinal Setting .start.ordinal [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-apps] TTLAfterFinished job should be deleted once it finishes after TTL seconds": { + "average_duration": 24 + }, + "[sig-apps] TTLAfterFinished job should be deleted once it finishes after TTL seconds [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 29 + }, + "[sig-apps] poddisruptionbudgets with unhealthyPodEvictionPolicy should evict according to the AlwaysAllow policy [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 339 + }, + "[sig-apps] poddisruptionbudgets with unhealthyPodEvictionPolicy should evict according to the AlwaysAllow policy [Suite:openshift/conformance/parallel]": { + "average_duration": 314 + }, + "[sig-apps] poddisruptionbudgets with unhealthyPodEvictionPolicy should evict according to the IfHealthyBudget policy [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 648 + }, + "[sig-apps] poddisruptionbudgets with unhealthyPodEvictionPolicy should evict according to the IfHealthyBudget policy [Suite:openshift/conformance/parallel]": { + "average_duration": 611 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs adoption will orphan all RCs and adopt them back when recreated [apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 76 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs adoption will orphan all RCs and adopt them back when recreated [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 47 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs generation should deploy based on a status version bump [apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 28 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs generation should deploy based on a status version bump [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 16 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs ignores deployer and lets the config with a NewReplicationControllerCreated reason should let the deployment config with a NewReplicationControllerCreated reason [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs initially should not deploy if pods never transition to ready [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 43 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs keep the deployer pod invariant valid should deal with cancellation after deployer pod succeeded [apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 28 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs keep the deployer pod invariant valid should deal with cancellation after deployer pod succeeded [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 16 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs keep the deployer pod invariant valid should deal with cancellation of running deployment [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 17 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs keep the deployer pod invariant valid should deal with config change in case the deployment is still running [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 17 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs paused should disable actions on deployments [apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 21 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs paused should disable actions on deployments [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 13 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs rolled back should rollback to an older deployment [apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 53 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs rolled back should rollback to an older deployment [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 33 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs should adhere to Three Laws of Controllers [apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 63 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs should adhere to Three Laws of Controllers [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 46 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs should respect image stream tag reference policy resolve the image pull spec [apigroup:apps.openshift.io][apigroup:image.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 7 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs should respect image stream tag reference policy resolve the image pull spec [apigroup:apps.openshift.io][apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs viewing rollout history should print the rollout history [apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 37 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs viewing rollout history should print the rollout history [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 22 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs when changing image change trigger should successfully trigger from an updated image [apigroup:apps.openshift.io][apigroup:image.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 40 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs when changing image change trigger should successfully trigger from an updated image [apigroup:apps.openshift.io][apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 25 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs when run iteratively should immediately start a new deployment [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 10 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs when run iteratively should only deploy the last deployment [apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 47 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs when run iteratively should only deploy the last deployment [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 31 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs when tagging images should successfully tag the deployed image [apigroup:apps.openshift.io][apigroup:authorization.openshift.io][apigroup:image.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 20 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs when tagging images should successfully tag the deployed image [apigroup:apps.openshift.io][apigroup:authorization.openshift.io][apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 12 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs with custom deployments should run the custom deployment steps [apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 46 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs with custom deployments should run the custom deployment steps [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 31 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs with enhanced status should include various info in status [apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 21 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs with enhanced status should include various info in status [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 12 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs with env in params referencing the configmap should expand the config map key to a value [apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 23 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs with env in params referencing the configmap should expand the config map key to a value [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 15 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs with failing hook should get all logs from retried hooks [apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 19 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs with failing hook should get all logs from retried hooks [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 13 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs with minimum ready seconds set should not transition the deployment to Complete before satisfied [apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 101 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs with minimum ready seconds set should not transition the deployment to Complete before satisfied [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 68 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs with multiple image change triggers should run a successful deployment with a trigger used by different containers [apigroup:apps.openshift.io][apigroup:image.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 52 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs with multiple image change triggers should run a successful deployment with a trigger used by different containers [apigroup:apps.openshift.io][apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 29 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs with multiple image change triggers should run a successful deployment with multiple triggers [apigroup:apps.openshift.io][apigroup:image.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 75 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs with multiple image change triggers should run a successful deployment with multiple triggers [apigroup:apps.openshift.io][apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 39 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs with revision history limits should never persist more old deployments than acceptable after being observed by the controller [apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 167 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs with revision history limits should never persist more old deployments than acceptable after being observed by the controller [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 112 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs with test deployments should run a deployment to completion and then scale to zero [apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 156 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs with test deployments should run a deployment to completion and then scale to zero [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 119 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs won't deploy RC with unresolved images when patched with empty image [apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 24 + }, + "[sig-apps][Feature:DeploymentConfig] deploymentconfigs won't deploy RC with unresolved images when patched with empty image [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 16 + }, + "[sig-apps][Feature:Jobs] Users should be able to create and run a job in a user project [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 13 + }, + "[sig-apps][Feature:OpenShiftControllerManager] TestDeployScale [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-apps][Feature:OpenShiftControllerManager] TestDeploymentConfigDefaults [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-apps][Feature:OpenShiftControllerManager] TestTriggers_MultipleICTs [apigroup:apps.openshift.io][apigroup:images.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-apps][Feature:OpenShiftControllerManager] TestTriggers_configChange [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-apps][Feature:OpenShiftControllerManager] TestTriggers_imageChange [apigroup:apps.openshift.io][apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-apps][Feature:OpenShiftControllerManager] TestTriggers_imageChange_nonAutomatic [apigroup:image.openshift.io][apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 42 + }, + "[sig-apps][Feature:OpenShiftControllerManager] TestTriggers_manual [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-apps][apigroup:apps.openshift.io] Deployments on HighlyAvailableArbiterMode topology should be created on arbiter nodes when arbiter node is selected [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-apps][apigroup:apps.openshift.io] Deployments on HighlyAvailableArbiterMode topology should be created on master nodes when no node selected [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-apps][apigroup:apps.openshift.io] Evaluate DaemonSet placement in HighlyAvailableArbiterMode topology should not create a DaemonSet on the Arbiter node [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-apps][apigroup:apps.openshift.io][OCPFeatureGate:HighlyAvailableArbiter] Deployments on HighlyAvailableArbiterMode topology should be created on arbiter nodes when arbiter node is selected [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-apps][apigroup:apps.openshift.io][OCPFeatureGate:HighlyAvailableArbiter] Deployments on HighlyAvailableArbiterMode topology should be created on master nodes when no node selected [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-apps][apigroup:apps.openshift.io][OCPFeatureGate:HighlyAvailableArbiter] Evaluate DaemonSet placement in HighlyAvailableArbiterMode topology should not create a DaemonSet on the Arbiter node [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-arch] Cluster topology single node tests Verify that OpenShift components deploy one replica in SingleReplica topology mode [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-arch] Cluster topology single node tests [apigroup:config.openshift.io] Verify that OpenShift components deploy one replica in SingleReplica topology mode [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-arch] ClusterOperators [apigroup:config.openshift.io] should define at least one namespace in their lists of related objects [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-arch] ClusterOperators [apigroup:config.openshift.io] should define at least one namespace in their lists of related objects [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-arch] ClusterOperators [apigroup:config.openshift.io] should define at least one related object that is not a namespace [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-arch] ClusterOperators [apigroup:config.openshift.io] should define valid related objects [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-arch] External binary usage": { + "average_duration": 0 + }, + "[sig-arch] Managed cluster should [apigroup:apps.openshift.io] should expose cluster services outside the cluster [apigroup:route.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 18 + }, + "[sig-arch] Managed cluster should ensure control plane operators do not make themselves unevictable [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-arch] Managed cluster should ensure control plane pods do not run in best-effort QoS [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-arch] Managed cluster should ensure platform components have system-* priority class associated [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-arch] Managed cluster should ensure pods use downstream images from our release image with proper ImagePullPolicy [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-arch] Managed cluster should expose cluster services outside the cluster [apigroup:route.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 12 + }, + "[sig-arch] Managed cluster should expose cluster services outside the cluster [apigroup:route.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-arch] Managed cluster should have operators on the cluster version [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-arch] Managed cluster should only include cluster daemonsets that have maxUnavailable or maxSurge update of 10 percent or maxUnavailable of 33 percent [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-arch] Managed cluster should only include cluster daemonsets that have maxUnavailable update of 10 or 33 percent [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-arch] Managed cluster should set requests but not limits [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-arch] Monitor cluster while tests execute": { + "average_duration": 3173 + }, + "[sig-arch] Only known images used by tests": { + "average_duration": 0 + }, + "[sig-arch] [Conformance] FIPS TestFIPS [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 11 + }, + "[sig-arch] [Conformance] FIPS TestFIPS [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 19 + }, + "[sig-arch] [Conformance] sysctl pod should not start for sysctl not on whitelist kernel.msgmax [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 5 + }, + "[sig-arch] [Conformance] sysctl pod should not start for sysctl not on whitelist net.ipv4.ip_dynaddr [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 5 + }, + "[sig-arch] [Conformance] sysctl whitelists kernel.shm_rmid_forced [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 21 + }, + "[sig-arch] [Conformance] sysctl whitelists net.ipv4.ip_local_port_range [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 21 + }, + "[sig-arch] [Conformance] sysctl whitelists net.ipv4.ip_unprivileged_port_start [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 21 + }, + "[sig-arch] [Conformance] sysctl whitelists net.ipv4.ping_group_range [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 21 + }, + "[sig-arch] [Conformance] sysctl whitelists net.ipv4.tcp_syncookies [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 21 + }, + "[sig-arch] all containers in ns/default must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/kube-system must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-addon-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-adp must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-apiserver must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-apiserver-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-authentication must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-authentication-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-backplane must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-backplane-managed-scripts must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-backplane-srep must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-catalogd must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-cloud-controller-manager must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-cloud-controller-manager-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-cloud-credential-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-cloud-ingress-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-cloud-network-config-controller must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-cluster-api must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-cluster-csi-drivers must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-cluster-machine-approver must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-cluster-node-tuning-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-cluster-observability-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-cluster-olm-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-cluster-samples-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-cluster-storage-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-cluster-version must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-cnv must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-config must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-config-managed must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-config-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-console must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-console-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-controller-manager must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-controller-manager-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-custom-domains-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-deployment-validation-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-dns must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-dns-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-e2e-loki must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-etcd must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-etcd-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-frr-k8s must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-host-network must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-image-registry must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-infra must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-ingress must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-ingress-canary must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-ingress-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-insights must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-kmm must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-kni-infra must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-kube-apiserver must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-kube-apiserver-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-kube-controller-manager must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-kube-controller-manager-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-kube-descheduler-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-kube-proxy must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-kube-scheduler must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-kube-scheduler-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-kube-storage-version-migrator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-kube-storage-version-migrator-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-local-storage must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-machine-api must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-machine-config-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-managed-node-metadata-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-managed-upgrade-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-manila-csi-driver must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-marketplace must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-metallb-system must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-monitoring must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-mtv must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-multiarch-tuning-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-multus must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-network-console must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-network-diagnostics must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-network-node-identity must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-network-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-nfd must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-nmstate must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-numaresources must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-nutanix-infra must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-oauth-apiserver must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-ocm-agent-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-openstack-infra must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-operator-controller must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-operator-lifecycle-manager must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-operators must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-osd-metrics must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-ovirt-infra must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-ovn-kubernetes must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-package-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-pipelines must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-rbac-permissions must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-route-controller-manager must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-route-monitor-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-rukpak must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-sdn must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-security must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-serverless must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-service-ca must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-service-ca-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-splunk-forwarder-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-sre-pruning must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-sriov-network-operator must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-storage must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-user-workload-monitoring must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-validation-webhook must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-velero must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-vsphere-infra must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-workload-availability must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all containers in ns/openshift-workload-maintenance must have terminationMessagePolicy=FallbackToLogsOnError": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-addon-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-apiserver-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-authentication-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-cloud-controller-manager-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-cloud-credential-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-cluster-api must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-cluster-csi-drivers must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-cluster-node-tuning-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-cluster-olm-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-cluster-storage-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-cluster-version must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-cnv must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-config-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-console-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-controller-manager-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-etcd-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-image-registry must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-kmm must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-kube-apiserver-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-kube-controller-manager-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-kube-descheduler-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-kube-scheduler-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-kube-storage-version-migrator-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-local-storage must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-machine-api must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-machine-config-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-managed-node-metadata-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-managed-upgrade-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-marketplace must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-metallb-system must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-multiarch-tuning-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-network-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-operator-controller must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-operators must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-package-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-pipelines must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-serverless must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-service-ca-operator must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-storage must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] all leases in ns/openshift-workload-maintenance must gracefully release": { + "average_duration": 0 + }, + "[sig-arch] cloud API quota should not be exceeded": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/default": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/kube-system": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-apiserver": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-apiserver-operator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-authentication": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-authentication-operator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-cloud-controller-manager": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-cloud-controller-manager-operator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-cloud-credential-operator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-cloud-network-config-controller": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-cluster-csi-drivers": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-cluster-machine-approver": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-cluster-node-tuning-operator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-cluster-samples-operator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-cluster-storage-operator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-cluster-version": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-config": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-config-managed": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-config-operator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-console": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-console-operator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-controller-manager": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-controller-manager-operator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-dns": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-dns-operator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-etcd": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-etcd-operator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-host-network": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-image-registry": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-infra": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-ingress": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-ingress-canary": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-ingress-operator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-insights": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-kni-infra": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-kube-apiserver": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-kube-apiserver-operator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-kube-controller-manager": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-kube-controller-manager-operator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-kube-scheduler": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-kube-scheduler-operator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-kube-storage-version-migrator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-kube-storage-version-migrator-operator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-machine-api": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-machine-config-operator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-marketplace": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-monitoring": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-multus": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-network-diagnostics": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-network-operator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-nutanix-infra": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-oauth-apiserver": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-openstack-infra": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-operator-lifecycle-manager": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-operators": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-ovirt-infra": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-ovn-kubernetes": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-service-ca": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-service-ca-operator": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-user-workload-monitoring": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically for ns/openshift-vsphere-infra": { + "average_duration": 0 + }, + "[sig-arch] events should not repeat pathologically in e2e namespaces": { + "average_duration": 0 + }, + "[sig-arch] ocp payload should be based on existing source OLM version should contain the source commit id [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-arch] ocp payload should be based on existing source OLM version should contain the source commit id [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-arch] ocp payload should be based on existing source OLM version should contain the source commit id [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-arch] openshift-marketplace pods should not get excessive startupProbe failures": { + "average_duration": 0 + }, + "[sig-arch] pathological event should not see excessive pull back-off on registry.redhat.io": { + "average_duration": 0 + }, + "[sig-arch] should not see excessive pull back-off on registry.redhat.io": { + "average_duration": 0 + }, + "[sig-arch][Early] APIs for openshift.io must have stable versions [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-arch][Early] CRDs for openshift.io should have a status in the CRD schema [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-arch][Early] CRDs for openshift.io should have subresource.status [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-arch][Early] Managed cluster should [apigroup:config.openshift.io] start all core operators [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-arch][Early] Managed cluster should [apigroup:config.openshift.io] start all core operators [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-arch][Early] Operators low level operators should have at least the conditions we had in 4.17 [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-arch][Feature:ClusterUpgrade] All nodes should be in ready state [Early][Suite:upgrade]": { + "average_duration": 1 + }, + "[sig-arch][Feature:ClusterUpgrade] Cluster should be upgradeable after finishing upgrade [Late][Suite:upgrade]": { + "average_duration": 1 + }, + "[sig-arch][Feature:ClusterUpgrade] Cluster should be upgradeable before beginning upgrade [Early][Suite:upgrade]": { + "average_duration": 1 + }, + "[sig-arch][Feature:ClusterUpgrade] Cluster should remain functional during upgrade [Disruptive]": { + "average_duration": 4785 + }, + "[sig-arch][Feature:ClusterUpgrade] Cluster should remain functional during upgrade [Disruptive] [Serial]": { + "average_duration": 3537 + }, + "[sig-arch][Late] all registered tls artifacts must have no metadata violation regressions [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-arch][Late] all tls artifacts must be registered [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-arch][Late] clients should not use APIs that are removed in upcoming releases [apigroup:apiserver.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-arch][Late] clients should not use APIs that are removed in upcoming releases [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-arch][Late] collect certificate data [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-arch][Late] operators should have watch channel requests": { + "average_duration": 0 + }, + "[sig-arch][Late] operators should not create watch channels very often": { + "average_duration": 0 + }, + "[sig-arch][Late] operators should not create watch channels very often [apigroup:apiserver.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-arch][Late] operators should not create watch channels very often [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-arch][Late][Jira:\"kube-apiserver\"] [OCPFeatureGate:ShortCertRotation] all certificates should expire in no more than 8 hours [Suite:openshift/conformance/parallel]": { + "average_duration": 26 + }, + "[sig-arch][Late][Jira:\"kube-apiserver\"] all registered tls artifacts must have no metadata violation regressions [Suite:openshift/conformance/parallel]": { + "average_duration": 21 + }, + "[sig-arch][Late][Jira:\"kube-apiserver\"] all tls artifacts must be registered [Suite:openshift/conformance/parallel]": { + "average_duration": 21 + }, + "[sig-arch][Late][Jira:\"kube-apiserver\"] collect certificate data [Suite:openshift/conformance/parallel]": { + "average_duration": 21 + }, + "[sig-arch][OCPFeatureGate:Example] should only run FeatureGated test when enabled [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-architecture] Conformance Tests should have at least two untainted nodes [Conformance]": { + "average_duration": 1 + }, + "[sig-architecture] Conformance Tests should have at least two untainted nodes [Conformance] [Skipped:SingleReplicaTopology] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-architecture] Conformance Tests should have at least two untainted nodes [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-architecture] platform pods in ns/default should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/default should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/default should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/kube-amd-gpu should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/kube-amd-gpu should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/kube-amd-gpu should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/kube-node-lease should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/kube-node-lease should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/kube-node-lease should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/kube-public should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/kube-public should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/kube-public should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/kube-system should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/kube-system should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/kube-system should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-addon-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-addon-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-addon-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-adp should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-adp should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-adp should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-apiserver should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-apiserver should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-apiserver should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-apiserver-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-apiserver-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-apiserver-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-aqua should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-aqua should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-aqua should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-authentication should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-authentication should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-authentication should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-authentication-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-authentication-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-authentication-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-cee should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-cee should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-cee should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-csa should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-csa should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-csa should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-cse should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-cse should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-cse should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-csm should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-csm should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-csm should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-managed-scripts should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-managed-scripts should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-managed-scripts should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-mcs-tier-two should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-mcs-tier-two should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-mcs-tier-two should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-mobb should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-mobb should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-mobb should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-sdcicd should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-sdcicd should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-sdcicd should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-srep should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-srep should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-srep should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-tam should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-tam should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-backplane-tam should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-catalogd should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-catalogd should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-catalogd should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cloud-controller-manager should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cloud-controller-manager should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cloud-controller-manager should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cloud-controller-manager-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cloud-controller-manager-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cloud-controller-manager-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cloud-credential-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cloud-credential-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cloud-credential-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cloud-ingress-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cloud-ingress-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cloud-ingress-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cloud-network-config-controller should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cloud-network-config-controller should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cloud-network-config-controller should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cloud-platform-infra should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cloud-platform-infra should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cloud-platform-infra should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-api should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-api should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-api should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-csi-drivers should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-csi-drivers should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-csi-drivers should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-machine-approver should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-machine-approver should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-machine-approver should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-node-tuning-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-node-tuning-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-node-tuning-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-observability-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-observability-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-observability-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-olm-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-olm-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-olm-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-samples-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-samples-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-samples-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-storage-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-storage-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-storage-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-version should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-version should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cluster-version should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cnv should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cnv should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-cnv should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-codeready-workspaces should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-codeready-workspaces should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-codeready-workspaces should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-config should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-config should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-config should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-config-managed should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-config-managed should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-config-managed should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-config-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-config-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-config-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-console should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-console should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-console should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-console-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-console-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-console-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-console-user-settings should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-console-user-settings should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-console-user-settings should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-controller-manager should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-controller-manager should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-controller-manager should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-controller-manager-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-controller-manager-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-controller-manager-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-custom-domains-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-custom-domains-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-custom-domains-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-customer-monitoring should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-customer-monitoring should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-customer-monitoring should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-deployment-validation-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-deployment-validation-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-deployment-validation-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-dns should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-dns should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-dns should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-dns-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-dns-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-dns-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-e2e-loki should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-e2e-loki should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-e2e-loki should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-etcd should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-etcd should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-etcd should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-etcd-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-etcd-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-etcd-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-frr-k8s should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-frr-k8s should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-frr-k8s should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-host-network should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-host-network should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-host-network should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-image-registry should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-image-registry should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-image-registry should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-infra should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-infra should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-infra should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-ingress should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-ingress should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-ingress should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-ingress-canary should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-ingress-canary should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-ingress-canary should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-ingress-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-ingress-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-ingress-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-insights should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-insights should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-insights should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kmm should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kmm should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kmm should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kni-infra should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kni-infra should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kni-infra should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-apiserver should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-apiserver should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-apiserver should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-apiserver-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-apiserver-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-apiserver-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-controller-manager should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-controller-manager should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-controller-manager should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-controller-manager-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-controller-manager-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-controller-manager-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-descheduler-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-descheduler-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-descheduler-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-proxy should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-proxy should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-proxy should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-scheduler should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-scheduler should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-scheduler should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-scheduler-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-scheduler-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-scheduler-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-storage-version-migrator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-storage-version-migrator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-storage-version-migrator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-storage-version-migrator-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-storage-version-migrator-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-kube-storage-version-migrator-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-local-storage should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-local-storage should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-local-storage should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-logging should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-logging should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-logging should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-machine-api should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-machine-api should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-machine-api should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-machine-config-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-machine-config-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-machine-config-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-managed-node-metadata-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-managed-node-metadata-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-managed-node-metadata-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-managed-upgrade-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-managed-upgrade-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-managed-upgrade-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-manila-csi-driver should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-manila-csi-driver should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-manila-csi-driver should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-marketplace should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-marketplace should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-marketplace should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-metallb-system should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-metallb-system should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-metallb-system should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-monitoring should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-monitoring should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-monitoring should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-mtv should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-mtv should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-mtv should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-multiarch-tuning-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-multiarch-tuning-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-multiarch-tuning-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-multus should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-multus should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-multus should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-network-console should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-network-console should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-network-console should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-network-diagnostics should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-network-diagnostics should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-network-diagnostics should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-network-node-identity should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-network-node-identity should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-network-node-identity should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-network-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-network-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-network-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-nfd should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-nfd should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-nfd should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-nmstate should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-nmstate should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-nmstate should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-node should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-node should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-node should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-numaresources should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-numaresources should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-numaresources should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-nutanix-infra should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-nutanix-infra should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-nutanix-infra should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-oauth-apiserver should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-oauth-apiserver should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-oauth-apiserver should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-observability-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-observability-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-observability-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-ocm-agent-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-ocm-agent-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-ocm-agent-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-openstack-infra should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-openstack-infra should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-openstack-infra should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-operator-controller should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-operator-controller should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-operator-controller should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-operator-lifecycle-manager should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-operator-lifecycle-manager should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-operator-lifecycle-manager should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-operators should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-operators should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-operators should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-operators-redhat should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-operators-redhat should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-operators-redhat should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-osd-metrics should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-osd-metrics should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-osd-metrics should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-ovirt-infra should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-ovirt-infra should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-ovirt-infra should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-ovn-kubernetes should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-ovn-kubernetes should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-ovn-kubernetes should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-package-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-package-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-package-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-pipelines should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-pipelines should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-pipelines should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-rbac-permissions should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-rbac-permissions should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-rbac-permissions should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-route-controller-manager should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-route-controller-manager should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-route-controller-manager should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-route-monitor-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-route-monitor-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-route-monitor-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-security should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-security should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-security should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-serverless should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-serverless should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-serverless should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-service-ca should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-service-ca should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-service-ca should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-service-ca-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-service-ca-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-service-ca-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-splunk-forwarder-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-splunk-forwarder-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-splunk-forwarder-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-sre-pruning should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-sre-pruning should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-sre-pruning should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-sriov-network-operator should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-sriov-network-operator should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-sriov-network-operator should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-storage should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-storage should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-storage should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-user-workload-monitoring should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-user-workload-monitoring should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-user-workload-monitoring should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-validation-webhook should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-validation-webhook should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-validation-webhook should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-velero should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-velero should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-velero should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-virtualization-os-images should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-virtualization-os-images should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-virtualization-os-images should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-vsphere-infra should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-vsphere-infra should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-vsphere-infra should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-workload-availability should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-workload-availability should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-workload-availability should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-workload-maintenance should not exit a moderate amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-workload-maintenance should not exit an excessive amount of times": { + "average_duration": 0 + }, + "[sig-architecture] platform pods in ns/openshift-workload-maintenance should not fail to start": { + "average_duration": 0 + }, + "[sig-architecture] platform pods should not be force deleted with gracePeriod 0": { + "average_duration": 0 + }, + "[sig-architecture] platform pods should not exit more than once with a non-zero exit code": { + "average_duration": 0 + }, + "[sig-architecture] platform pods should not fail to start": { + "average_duration": 0 + }, + "[sig-auth] Certificates API [Privileged:ClusterAdmin] should support CSR API operations [Conformance]": { + "average_duration": 3 + }, + "[sig-auth] Certificates API [Privileged:ClusterAdmin] should support CSR API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-auth] Certificates API [Privileged:ClusterAdmin] should support building a client with a CSR": { + "average_duration": 11 + }, + "[sig-auth] Certificates API [Privileged:ClusterAdmin] should support building a client with a CSR [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-auth] NodeAuthenticator The kubelet can delegate ServiceAccount tokens to the API server": { + "average_duration": 4 + }, + "[sig-auth] NodeAuthenticator The kubelet can delegate ServiceAccount tokens to the API server [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-auth] NodeAuthenticator The kubelet's main port 10250 should reject requests with no credentials": { + "average_duration": 4 + }, + "[sig-auth] NodeAuthenticator The kubelet's main port 10250 should reject requests with no credentials [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-auth] SelfSubjectReview [Feature:APISelfSubjectReview] should support SelfSubjectReview API operations [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-auth] SelfSubjectReview [Feature:APISelfSubjectReview] testing SSR in different API groups authentication/v1beta1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-auth] SelfSubjectReview should support SelfSubjectReview API operations": { + "average_duration": 1 + }, + "[sig-auth] SelfSubjectReview should support SelfSubjectReview API operations [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-auth] SelfSubjectReview testing SSR in different API groups authentication/v1": { + "average_duration": 1 + }, + "[sig-auth] SelfSubjectReview testing SSR in different API groups authentication/v1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-auth] SelfSubjectReview testing SSR in different API groups authentication/v1beta1": { + "average_duration": 1 + }, + "[sig-auth] SelfSubjectReview testing SSR in different API groups authentication/v1beta1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-auth] ServiceAccounts ServiceAccountIssuerDiscovery should support OIDC discovery of service account issuer [Conformance]": { + "average_duration": 33 + }, + "[sig-auth] ServiceAccounts ServiceAccountIssuerDiscovery should support OIDC discovery of service account issuer [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 37 + }, + "[sig-auth] ServiceAccounts no secret-based service account token should be auto-generated": { + "average_duration": 10 + }, + "[sig-auth] ServiceAccounts no secret-based service account token should be auto-generated [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-auth] ServiceAccounts should allow opting out of API token automount [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-auth] ServiceAccounts should allow opting out of API token automount [Conformance]": { + "average_duration": 1 + }, + "[sig-auth] ServiceAccounts should allow opting out of API token automount [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-auth] ServiceAccounts should create a serviceAccountToken and ensure a successful TokenReview [Conformance]": { + "average_duration": 1 + }, + "[sig-auth] ServiceAccounts should create a serviceAccountToken and ensure a successful TokenReview [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-auth] ServiceAccounts should guarantee kube-root-ca.crt exist in any namespace [Conformance]": { + "average_duration": 2 + }, + "[sig-auth] ServiceAccounts should guarantee kube-root-ca.crt exist in any namespace [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-auth] ServiceAccounts should mount projected service account token [Conformance]": { + "average_duration": 6 + }, + "[sig-auth] ServiceAccounts should mount projected service account token [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-auth] ServiceAccounts should run through the lifecycle of a ServiceAccount [Conformance]": { + "average_duration": 1 + }, + "[sig-auth] ServiceAccounts should run through the lifecycle of a ServiceAccount [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-auth] ServiceAccounts should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly]": { + "average_duration": 20 + }, + "[sig-auth] ServiceAccounts should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 28 + }, + "[sig-auth] ServiceAccounts should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-auth] ServiceAccounts should update a ServiceAccount [Conformance]": { + "average_duration": 1 + }, + "[sig-auth] ServiceAccounts should update a ServiceAccount [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-auth] SubjectReview should support SubjectReview API operations [Conformance]": { + "average_duration": 1 + }, + "[sig-auth] SubjectReview should support SubjectReview API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-auth] ValidatingAdmissionPolicy can restrict access by-node": { + "average_duration": 5 + }, + "[sig-auth] ValidatingAdmissionPolicy can restrict access by-node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-auth] [Feature:NodeAuthenticator] The kubelet can delegate ServiceAccount tokens to the API server [Skipped:ibmroks] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-auth] [Feature:NodeAuthenticator] The kubelet's main port 10250 should reject requests with no credentials [Skipped:ibmroks] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-auth] [Feature:NodeAuthorizer] A node shouldn't be able to create another node": { + "average_duration": 1 + }, + "[sig-auth] [Feature:NodeAuthorizer] A node shouldn't be able to create another node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-auth] [Feature:NodeAuthorizer] A node shouldn't be able to delete another node": { + "average_duration": 1 + }, + "[sig-auth] [Feature:NodeAuthorizer] A node shouldn't be able to delete another node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-auth] [Feature:NodeAuthorizer] Getting a non-existent configmap should exit with the Forbidden error, not a NotFound error": { + "average_duration": 1 + }, + "[sig-auth] [Feature:NodeAuthorizer] Getting a non-existent configmap should exit with the Forbidden error, not a NotFound error [Skipped:ibmroks] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-auth] [Feature:NodeAuthorizer] Getting a non-existent configmap should exit with the Forbidden error, not a NotFound error [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-auth] [Feature:NodeAuthorizer] Getting a non-existent secret should exit with the Forbidden error, not a NotFound error": { + "average_duration": 1 + }, + "[sig-auth] [Feature:NodeAuthorizer] Getting a non-existent secret should exit with the Forbidden error, not a NotFound error [Skipped:ibmroks] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-auth] [Feature:NodeAuthorizer] Getting a non-existent secret should exit with the Forbidden error, not a NotFound error [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-auth] [Feature:NodeAuthorizer] Getting a secret for a workload the node has access to should succeed": { + "average_duration": 3 + }, + "[sig-auth] [Feature:NodeAuthorizer] Getting a secret for a workload the node has access to should succeed [Skipped:ibmroks] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-auth] [Feature:NodeAuthorizer] Getting a secret for a workload the node has access to should succeed [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-auth] [Feature:NodeAuthorizer] Getting an existing configmap should exit with the Forbidden error": { + "average_duration": 1 + }, + "[sig-auth] [Feature:NodeAuthorizer] Getting an existing configmap should exit with the Forbidden error [Skipped:ibmroks] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-auth] [Feature:NodeAuthorizer] Getting an existing configmap should exit with the Forbidden error [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-auth] [Feature:NodeAuthorizer] Getting an existing secret should exit with the Forbidden error": { + "average_duration": 1 + }, + "[sig-auth] [Feature:NodeAuthorizer] Getting an existing secret should exit with the Forbidden error [Skipped:ibmroks] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-auth] [Feature:NodeAuthorizer] Getting an existing secret should exit with the Forbidden error [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-auth] all workloads in ns/default must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/kube-amd-gpu must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/kube-node-lease must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/kube-public must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/kube-system must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-adp must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-apiserver must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-apiserver-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-authentication must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-authentication-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-catalogd must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-cloud-controller-manager must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-cloud-controller-manager-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-cloud-credential-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-cloud-network-config-controller must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-cloud-platform-infra must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-cluster-api must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-cluster-csi-drivers must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-cluster-machine-approver must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-cluster-node-tuning-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-cluster-observability-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-cluster-olm-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-cluster-samples-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-cluster-storage-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-cluster-version must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-cnv must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-config must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-config-managed must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-config-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-console must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-console-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-console-user-settings must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-controller-manager must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-controller-manager-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-dns must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-dns-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-e2e-loki must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-etcd must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-etcd-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-frr-k8s must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-host-network must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-image-registry must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-infra must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-ingress must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-ingress-canary must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-ingress-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-insights must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-kmm must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-kni-infra must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-kube-apiserver must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-kube-apiserver-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-kube-controller-manager must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-kube-controller-manager-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-kube-descheduler-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-kube-proxy must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-kube-scheduler must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-kube-scheduler-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-kube-storage-version-migrator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-kube-storage-version-migrator-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-local-storage must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-machine-api must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-machine-config-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-manila-csi-driver must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-marketplace must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-metallb-system must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-monitoring must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-mtv must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-multiarch-tuning-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-multus must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-network-console must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-network-diagnostics must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-network-node-identity must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-network-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-nfd must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-node must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-numaresources must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-nutanix-infra must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-oauth-apiserver must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-openstack-infra must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-operator-controller must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-operator-lifecycle-manager must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-operators must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-ovirt-infra must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-ovn-kubernetes must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-pipelines must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-route-controller-manager must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-rukpak must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-sdn must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-serverless must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-service-ca must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-service-ca-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-sriov-network-operator must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-storage must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-user-workload-monitoring must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-virtualization-os-images must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-vsphere-infra must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-workload-availability must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth] all workloads in ns/openshift-workload-maintenance must set the 'openshift.io/required-scc' annotation": { + "average_duration": 0 + }, + "[sig-auth][Feature:Authentication] TestFrontProxy should succeed [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-auth][Feature:Authentication] TestFrontProxy should succeed [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-auth][Feature:ControlPlaneSecurity] should have privileged securityContext for control plane init and main containers [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-auth][Feature:HTPasswdAuth] HTPasswd IDP should successfully configure htpasswd and be responsive [apigroup:user.openshift.io][apigroup:route.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 30 + }, + "[sig-auth][Feature:LDAP] LDAP IDP should authenticate against an ldap server [apigroup:user.openshift.io][apigroup:route.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 72 + }, + "[sig-auth][Feature:LDAP] LDAP should start an OpenLDAP test server [apigroup:user.openshift.io][apigroup:security.openshift.io][apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 36 + }, + "[sig-auth][Feature:LDAP][Serial] ldap group sync can sync groups from ldap [apigroup:user.openshift.io][apigroup:authorization.openshift.io][apigroup:security.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 64 + }, + "[sig-auth][Feature:OAuthServer] ClientSecretWithPlus should create oauthclient [apigroup:config.openshift.io][apigroup:oauth.openshift.io][apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-auth][Feature:OAuthServer] ClientSecretWithPlus should create oauthclient [apigroup:oauth.openshift.io][apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-auth][Feature:OAuthServer] OAuth Authenticator accepts sha256 access tokens [apigroup:user.openshift.io][apigroup:oauth.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-auth][Feature:OAuthServer] OAuth server [apigroup:auth.openshift.io] should use http1.1 only to prevent http2 connection reuse [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-auth][Feature:OAuthServer] OAuth server has the correct token and certificate fallback semantics [apigroup:config.openshift.io][apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-auth][Feature:OAuthServer] OAuth server has the correct token and certificate fallback semantics [apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-auth][Feature:OAuthServer] OAuthClientWithRedirectURIs must validate request URIs according to oauth-client definition [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-auth][Feature:OAuthServer] [Headers][apigroup:route.openshift.io][apigroup:config.openshift.io][apigroup:oauth.openshift.io] expected headers returned from the authorize URL [Suite:openshift/conformance/parallel]": { + "average_duration": 28 + }, + "[sig-auth][Feature:OAuthServer] [Headers][apigroup:route.openshift.io][apigroup:config.openshift.io][apigroup:oauth.openshift.io] expected headers returned from the grant URL [Suite:openshift/conformance/parallel]": { + "average_duration": 29 + }, + "[sig-auth][Feature:OAuthServer] [Headers][apigroup:route.openshift.io][apigroup:config.openshift.io][apigroup:oauth.openshift.io] expected headers returned from the login URL for the allow all IDP [Suite:openshift/conformance/parallel]": { + "average_duration": 29 + }, + "[sig-auth][Feature:OAuthServer] [Headers][apigroup:route.openshift.io][apigroup:config.openshift.io][apigroup:oauth.openshift.io] expected headers returned from the login URL for the bootstrap IDP [Suite:openshift/conformance/parallel]": { + "average_duration": 29 + }, + "[sig-auth][Feature:OAuthServer] [Headers][apigroup:route.openshift.io][apigroup:config.openshift.io][apigroup:oauth.openshift.io] expected headers returned from the login URL for when there is only one IDP [Suite:openshift/conformance/parallel]": { + "average_duration": 30 + }, + "[sig-auth][Feature:OAuthServer] [Headers][apigroup:route.openshift.io][apigroup:config.openshift.io][apigroup:oauth.openshift.io] expected headers returned from the logout URL [Suite:openshift/conformance/parallel]": { + "average_duration": 30 + }, + "[sig-auth][Feature:OAuthServer] [Headers][apigroup:route.openshift.io][apigroup:config.openshift.io][apigroup:oauth.openshift.io] expected headers returned from the root URL [Suite:openshift/conformance/parallel]": { + "average_duration": 29 + }, + "[sig-auth][Feature:OAuthServer] [Headers][apigroup:route.openshift.io][apigroup:config.openshift.io][apigroup:oauth.openshift.io] expected headers returned from the token URL [Suite:openshift/conformance/parallel]": { + "average_duration": 30 + }, + "[sig-auth][Feature:OAuthServer] [Headers][apigroup:route.openshift.io][apigroup:config.openshift.io][apigroup:oauth.openshift.io] expected headers returned from the token request URL [Suite:openshift/conformance/parallel]": { + "average_duration": 29 + }, + "[sig-auth][Feature:OAuthServer] [Token Expiration] Using a OAuth client with a non-default token max age [apigroup:oauth.openshift.io] to generate tokens that do not expire works as expected when using a code authorization flow [apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 30 + }, + "[sig-auth][Feature:OAuthServer] [Token Expiration] Using a OAuth client with a non-default token max age [apigroup:oauth.openshift.io] to generate tokens that do not expire works as expected when using a token authorization flow [apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 29 + }, + "[sig-auth][Feature:OAuthServer] [Token Expiration] Using a OAuth client with a non-default token max age [apigroup:oauth.openshift.io] to generate tokens that expire shortly works as expected when using a code authorization flow [apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 30 + }, + "[sig-auth][Feature:OAuthServer] [Token Expiration] Using a OAuth client with a non-default token max age [apigroup:oauth.openshift.io] to generate tokens that expire shortly works as expected when using a token authorization flow [apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 29 + }, + "[sig-auth][Feature:OAuthServer] [apigroup:oauth.openshift.io] OAuthClientWithRedirectURIs must validate request URIs according to oauth-client definition [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-auth][Feature:OAuthServer] well-known endpoint should be reachable [apigroup:config.openshift.io][apigroup:route.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-auth][Feature:OAuthServer] well-known endpoint should be reachable [apigroup:route.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-auth][Feature:OAuthServer] well-known endpoint should be reachable [apigroup:route.openshift.io] [apigroup:oauth.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-auth][Feature:OpenShiftAuthorization] RBAC proxy for openshift authz RunLegacyClusterRoleBindingEndpoint should succeed [apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-auth][Feature:OpenShiftAuthorization] RBAC proxy for openshift authz RunLegacyClusterRoleEndpoint should succeed [apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-auth][Feature:OpenShiftAuthorization] RBAC proxy for openshift authz RunLegacyEndpointConfirmNoEscalation [apigroup:authorization.openshift.io] should succeed [Suite:openshift/conformance/parallel]": { + "average_duration": 21 + }, + "[sig-auth][Feature:OpenShiftAuthorization] RBAC proxy for openshift authz RunLegacyLocalRoleBindingEndpoint should succeed [apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-auth][Feature:OpenShiftAuthorization] RBAC proxy for openshift authz RunLegacyLocalRoleEndpoint should succeed [apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-auth][Feature:OpenShiftAuthorization] The default cluster RBAC policy should have correct RBAC rules [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-auth][Feature:OpenShiftAuthorization] authorization TestAuthorizationSubjectAccessReview should succeed [apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 20 + }, + "[sig-auth][Feature:OpenShiftAuthorization] authorization TestAuthorizationSubjectAccessReviewAPIGroup should succeed [apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 7 + }, + "[sig-auth][Feature:OpenShiftAuthorization] authorization TestBrowserSafeAuthorizer should succeed [apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-auth][Feature:OpenShiftAuthorization] authorization TestClusterReaderCoverage should succeed [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-auth][Feature:OpenShiftAuthorization] scopes TestScopeEscalations should succeed [apigroup:user.openshift.io][apigroup:authorization.openshift.io][apigroup:build.openshift.io][apigroup:oauth.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-auth][Feature:OpenShiftAuthorization] scopes TestScopedImpersonation should succeed [apigroup:user.openshift.io][apigroup:authorization.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-auth][Feature:OpenShiftAuthorization] scopes TestScopedTokens should succeed [apigroup:user.openshift.io][apigroup:authorization.openshift.io][apigroup:oauth.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-auth][Feature:OpenShiftAuthorization] scopes TestTokensWithIllegalScopes should succeed [apigroup:oauth.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-auth][Feature:OpenShiftAuthorization] scopes TestUnknownScopes should succeed [apigroup:user.openshift.io][apigroup:authorization.openshift.io][apigroup:project.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-auth][Feature:OpenShiftAuthorization] self-SAR compatibility TestBootstrapPolicySelfSubjectAccessReviews should succeed [apigroup:user.openshift.io][apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-auth][Feature:OpenShiftAuthorization] self-SAR compatibility TestSelfSubjectAccessReviewsNonExistingNamespace should succeed [apigroup:user.openshift.io][apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-auth][Feature:OpenShiftAuthorization][Serial] authorization TestAuthorizationResourceAccessReview should succeed [apigroup:authorization.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 11 + }, + "[sig-auth][Feature:PodSecurity] restricted-v2 SCC should mutate empty securityContext to match restricted PSa profile [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-auth][Feature:PodSecurity][Feature:SCC] SCC admission fails for incorrect/non-existent required-scc annotation [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-auth][Feature:PodSecurity][Feature:SCC] creating pod controllers [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-auth][Feature:PodSecurity][Feature:SCC] required-scc annotation is being applied to workloads [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-auth][Feature:ProjectAPI] TestInvalidRoleRefs should succeed [apigroup:authorization.openshift.io][apigroup:user.openshift.io][apigroup:project.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 18 + }, + "[sig-auth][Feature:ProjectAPI] TestProjectIsNamespace should succeed [apigroup:project.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-auth][Feature:ProjectAPI] TestProjectWatch should succeed [apigroup:project.openshift.io][apigroup:authorization.openshift.io][apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 93 + }, + "[sig-auth][Feature:ProjectAPI] TestProjectWatchWithSelectionPredicate should succeed [apigroup:project.openshift.io][apigroup:authorization.openshift.io][apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 17 + }, + "[sig-auth][Feature:ProjectAPI] TestScopedProjectAccess should succeed [apigroup:user.openshift.io][apigroup:project.openshift.io][apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 173 + }, + "[sig-auth][Feature:ProjectAPI] TestUnprivilegedNewProject [apigroup:project.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-auth][Feature:ProjectAPI][Serial] TestUnprivilegedNewProjectDenied [apigroup:authorization.openshift.io][apigroup:project.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 4 + }, + "[sig-auth][Feature:RoleBindingRestrictions] RoleBindingRestrictions should be functional Create a RBAC rolebinding when subject is not already bound and is not permitted by any RBR should fail [apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-auth][Feature:RoleBindingRestrictions] RoleBindingRestrictions should be functional Create a rolebinding that also contains system:non-existing users should succeed [apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-auth][Feature:RoleBindingRestrictions] RoleBindingRestrictions should be functional Create a rolebinding when subject is already bound should succeed [apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-auth][Feature:RoleBindingRestrictions] RoleBindingRestrictions should be functional Create a rolebinding when subject is not already bound and is not permitted by any RBR should fail [apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-auth][Feature:RoleBindingRestrictions] RoleBindingRestrictions should be functional Create a rolebinding when subject is permitted by RBR should succeed [apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-auth][Feature:RoleBindingRestrictions] RoleBindingRestrictions should be functional Create a rolebinding when there are no restrictions should succeed [apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-auth][Feature:RoleBindingRestrictions] RoleBindingRestrictions should be functional Rolebinding restrictions tests single project should succeed [apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-auth][Feature:SCC][Early] should not have pod creation failures during install [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-auth][Feature:SecurityContextConstraints] TestAllowedSCCViaRBAC [apigroup:project.openshift.io][apigroup:user.openshift.io][apigroup:authorization.openshift.io][apigroup:security.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 16 + }, + "[sig-auth][Feature:SecurityContextConstraints] TestAllowedSCCViaRBAC with service account [apigroup:security.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 10 + }, + "[sig-auth][Feature:SecurityContextConstraints] TestPodDefaultCapabilities [Suite:openshift/conformance/parallel]": { + "average_duration": 21 + }, + "[sig-auth][Feature:SecurityContextConstraints] TestPodUpdateSCCEnforcement [apigroup:user.openshift.io][apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-auth][Feature:SecurityContextConstraints] TestPodUpdateSCCEnforcement with service account [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-auth][Feature:UserAPI] groups should work [apigroup:user.openshift.io][apigroup:project.openshift.io][apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-auth][Feature:UserAPI] users can manipulate groups [apigroup:user.openshift.io][apigroup:authorization.openshift.io][apigroup:project.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-auth][Suite:openshift/auth/external-oidc][Serial][Slow][Disruptive] [OCPFeatureGate:ExternalOIDCWithUIDAndExtraClaimMappings] external IdP is configured with invalid specified UID or Extra claim mappings should reject admission when Extra claim expression is not compilable CEL": { + "average_duration": 41 + }, + "[sig-auth][Suite:openshift/auth/external-oidc][Serial][Slow][Disruptive] [OCPFeatureGate:ExternalOIDCWithUIDAndExtraClaimMappings] external IdP is configured with invalid specified UID or Extra claim mappings should reject admission when UID claim expression is not compilable CEL": { + "average_duration": 41 + }, + "[sig-auth][Suite:openshift/auth/external-oidc][Serial][Slow][Disruptive] [OCPFeatureGate:ExternalOIDCWithUIDAndExtraClaimMappings] external IdP is configured with valid specified UID or Extra claim mappings checking cluster identity mapping should map Extra correctly": { + "average_duration": 1262 + }, + "[sig-auth][Suite:openshift/auth/external-oidc][Serial][Slow][Disruptive] [OCPFeatureGate:ExternalOIDCWithUIDAndExtraClaimMappings] external IdP is configured with valid specified UID or Extra claim mappings checking cluster identity mapping should map UID correctly": { + "average_duration": 1278 + }, + "[sig-auth][Suite:openshift/auth/external-oidc][Serial][Slow][Disruptive] [OCPFeatureGate:ExternalOIDCWithUIDAndExtraClaimMappings] external IdP is configured without specified UID or Extra claim mappings should default UID to the 'sub' claim in the access token from the IdP": { + "average_duration": 1278 + }, + "[sig-auth][Suite:openshift/auth/external-oidc][Serial][Slow][Disruptive] [OCPFeatureGate:ExternalOIDC] external IdP is configured should accept authentication via a certificate-based kubeconfig (break-glass)": { + "average_duration": 1334 + }, + "[sig-auth][Suite:openshift/auth/external-oidc][Serial][Slow][Disruptive] [OCPFeatureGate:ExternalOIDC] external IdP is configured should configure kube-apiserver": { + "average_duration": 1315 + }, + "[sig-auth][Suite:openshift/auth/external-oidc][Serial][Slow][Disruptive] [OCPFeatureGate:ExternalOIDC] external IdP is configured should map cluster identities correctly": { + "average_duration": 1314 + }, + "[sig-auth][Suite:openshift/auth/external-oidc][Serial][Slow][Disruptive] [OCPFeatureGate:ExternalOIDC] external IdP is configured should not accept tokens provided by the OAuth server": { + "average_duration": 1270 + }, + "[sig-auth][Suite:openshift/auth/external-oidc][Serial][Slow][Disruptive] [OCPFeatureGate:ExternalOIDC] external IdP is configured should remove the OpenShift OAuth stack": { + "average_duration": 1287 + }, + "[sig-auth][Suite:openshift/auth/external-oidc][Serial][Slow][Disruptive] [OCPFeatureGate:ExternalOIDC] reverting to IntegratedOAuth should accept tokens provided by the OpenShift OAuth server": { + "average_duration": 1278 + }, + "[sig-auth][Suite:openshift/auth/external-oidc][Serial][Slow][Disruptive] [OCPFeatureGate:ExternalOIDC] reverting to IntegratedOAuth should not accept tokens provided by an external IdP": { + "average_duration": 1373 + }, + "[sig-auth][Suite:openshift/auth/external-oidc][Serial][Slow][Disruptive] [OCPFeatureGate:ExternalOIDC] reverting to IntegratedOAuth should rollout configuration on the kube-apiserver successfully": { + "average_duration": 1303 + }, + "[sig-auth][Suite:openshift/auth/external-oidc][Serial][Slow][Disruptive] [OCPFeatureGate:ExternalOIDC] reverting to IntegratedOAuth should rollout the OpenShift OAuth stack": { + "average_duration": 1325 + }, + "[sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) CustomResourceDefinition Should scale with a CRD targetRef [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 163 + }, + "[sig-autoscaling] [Feature:HPA] Horizontal pod autoscaling (scale resource: CPU) ReplicationController light Should scale from 1 pod to 2 pods [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 172 + }, + "[sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with Custom Metric of type Object from Stackdriver [Feature:CustomMetricsAutoscaling] [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with Custom Metric of type Pod from Stackdriver [Feature:CustomMetricsAutoscaling] [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with Custom Metric of type Pod from Stackdriver with Prometheus [Feature:CustomMetricsAutoscaling] [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with External Metric with target average value from Stackdriver [Feature:CustomMetricsAutoscaling] [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with External Metric with target value from Stackdriver [Feature:CustomMetricsAutoscaling] [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale up with two External metrics from Stackdriver [Feature:CustomMetricsAutoscaling] [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale up with two metrics of type Pod from Stackdriver [Feature:CustomMetricsAutoscaling] [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with Custom Metric of type Object from Stackdriver should scale down [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with Custom Metric of type Object from Stackdriver should scale down to 0 [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with Custom Metric of type Pod from Stackdriver should scale down [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with Custom Metric of type Pod from Stackdriver should scale down with Prometheus [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with Custom Metric of type Pod from Stackdriver should scale up with two metrics [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with External Metric from Stackdriver should scale down with target average value [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with External Metric from Stackdriver should scale down with target value [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with External Metric from Stackdriver should scale up with two metrics [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with multiple metrics of different types should not scale down when one metric is missing (Container Resource and External Metrics) [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with multiple metrics of different types should not scale down when one metric is missing (Pod and Object Metrics) [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with multiple metrics of different types should scale up when one metric is missing (Pod and External metrics) [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-autoscaling] [HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) with multiple metrics of different types should scale up when one metric is missing (Resource and Object metrics) [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-builds][Feature:Builds] Multi-stage image builds should succeed [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 126 + }, + "[sig-builds][Feature:Builds] Multi-stage image builds should succeed [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 94 + }, + "[sig-builds][Feature:Builds] Optimized image builds should succeed [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 102 + }, + "[sig-builds][Feature:Builds] Optimized image builds should succeed [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 83 + }, + "[sig-builds][Feature:Builds] build can reference a cluster service with a build being created from new-build should be able to run a build that references a cluster service [apigroup:build.openshift.io] [Skipped:Disconnected] [Skipped:Proxy] [Suite:openshift/conformance/parallel]": { + "average_duration": 259 + }, + "[sig-builds][Feature:Builds] build can reference a cluster service with a build being created from new-build should be able to run a build that references a cluster service [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 214 + }, + "[sig-builds][Feature:Builds] build have source revision metadata started build should contain source revision information [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 75 + }, + "[sig-builds][Feature:Builds] build have source revision metadata started build should contain source revision information [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 67 + }, + "[sig-builds][Feature:Builds] build with empty source started build should build even with an empty source in build config [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 76 + }, + "[sig-builds][Feature:Builds] build with empty source started build should build even with an empty source in build config [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 59 + }, + "[sig-builds][Feature:Builds] build without output image building from templates should create an image from a S2i template without an output image reference defined [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 75 + }, + "[sig-builds][Feature:Builds] build without output image building from templates should create an image from a S2i template without an output image reference defined [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 66 + }, + "[sig-builds][Feature:Builds] build without output image building from templates should create an image from a docker template without an output image reference defined [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 95 + }, + "[sig-builds][Feature:Builds] build without output image building from templates should create an image from a docker template without an output image reference defined [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 65 + }, + "[sig-builds][Feature:Builds] buildconfig secret injector should inject secrets to the appropriate buildconfigs [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-builds][Feature:Builds] custom build with buildah being created from new-build should complete build with custom builder image [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 204 + }, + "[sig-builds][Feature:Builds] custom build with buildah being created from new-build should complete build with custom builder image [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 155 + }, + "[sig-builds][Feature:Builds] imagechangetriggers imagechangetriggers should trigger builds of all types [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-builds][Feature:Builds] imagechangetriggers imagechangetriggers should trigger builds of all types [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-builds][Feature:Builds] oc new-app should fail with a --name longer than 58 characters [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-builds][Feature:Builds] oc new-app should fail with a --name longer than 58 characters [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-builds][Feature:Builds] oc new-app should succeed with a --name of 58 characters [apigroup:build.openshift.io] [Skipped:Disconnected] [Skipped:Proxy] [Suite:openshift/conformance/parallel]": { + "average_duration": 198 + }, + "[sig-builds][Feature:Builds] oc new-app should succeed with a --name of 58 characters [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 164 + }, + "[sig-builds][Feature:Builds] oc new-app should succeed with an imagestream [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-builds][Feature:Builds] oc new-app should succeed with an imagestream [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-builds][Feature:Builds] prune builds based on settings in the buildconfig buildconfigs should have a default history limit set when created via the group api [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-builds][Feature:Builds] prune builds based on settings in the buildconfig buildconfigs should have a default history limit set when created via the group api [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-builds][Feature:Builds] prune builds based on settings in the buildconfig should prune builds after a buildConfig change [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 14 + }, + "[sig-builds][Feature:Builds] prune builds based on settings in the buildconfig should prune builds after a buildConfig change [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 18 + }, + "[sig-builds][Feature:Builds] prune builds based on settings in the buildconfig should prune canceled builds based on the failedBuildsHistoryLimit setting [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 17 + }, + "[sig-builds][Feature:Builds] prune builds based on settings in the buildconfig should prune canceled builds based on the failedBuildsHistoryLimit setting [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 18 + }, + "[sig-builds][Feature:Builds] prune builds based on settings in the buildconfig should prune completed builds based on the successfulBuildsHistoryLimit setting [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 286 + }, + "[sig-builds][Feature:Builds] prune builds based on settings in the buildconfig should prune completed builds based on the successfulBuildsHistoryLimit setting [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 220 + }, + "[sig-builds][Feature:Builds] prune builds based on settings in the buildconfig should prune errored builds based on the failedBuildsHistoryLimit setting [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 31 + }, + "[sig-builds][Feature:Builds] prune builds based on settings in the buildconfig should prune errored builds based on the failedBuildsHistoryLimit setting [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 27 + }, + "[sig-builds][Feature:Builds] prune builds based on settings in the buildconfig should prune failed builds based on the failedBuildsHistoryLimit setting [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 42 + }, + "[sig-builds][Feature:Builds] prune builds based on settings in the buildconfig should prune failed builds based on the failedBuildsHistoryLimit setting [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 31 + }, + "[sig-builds][Feature:Builds] remove all builds when build configuration is removed oc delete buildconfig should start builds and delete the buildconfig [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 12 + }, + "[sig-builds][Feature:Builds] result image should have proper labels set Docker build from a template should create a image from \"test-docker-build.json\" template with proper Docker labels [apigroup:build.openshift.io][apigroup:image.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 100 + }, + "[sig-builds][Feature:Builds] result image should have proper labels set Docker build from a template should create a image from \"test-docker-build.json\" template with proper Docker labels [apigroup:build.openshift.io][apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 86 + }, + "[sig-builds][Feature:Builds] result image should have proper labels set S2I build from a template should create a image from \"test-s2i-build.json\" template with proper Docker labels [apigroup:build.openshift.io][apigroup:image.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 82 + }, + "[sig-builds][Feature:Builds] result image should have proper labels set S2I build from a template should create a image from \"test-s2i-build.json\" template with proper Docker labels [apigroup:build.openshift.io][apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 71 + }, + "[sig-builds][Feature:Builds] s2i build with a quota Building from a template should create an s2i build with a quota and run it [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 89 + }, + "[sig-builds][Feature:Builds] s2i build with a quota Building from a template should create an s2i build with a quota and run it [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 87 + }, + "[sig-builds][Feature:Builds] s2i build with a root user image should create a root build and fail without a privileged SCC [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-builds][Feature:Builds] s2i build with a root user image should create a root build and pass with a privileged SCC [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 84 + }, + "[sig-builds][Feature:Builds] s2i build with a root user image should create a root build and pass with a privileged SCC [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 70 + }, + "[sig-builds][Feature:Builds] verify /run filesystem contents are writeable using a simple Docker Strategy Build [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 85 + }, + "[sig-builds][Feature:Builds] verify /run filesystem contents are writeable using a simple Docker Strategy Build [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 63 + }, + "[sig-builds][Feature:Builds] verify /run filesystem contents do not have unexpected content using a simple Docker Strategy Build [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 85 + }, + "[sig-builds][Feature:Builds] verify /run filesystem contents do not have unexpected content using a simple Docker Strategy Build [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 65 + }, + "[sig-builds][Feature:Builds][pullsearch] docker build where the registry is not specified Building from a Dockerfile whose FROM image ref does not specify the image registry should create a docker build that has buildah search from our predefined list of image registries and succeed [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 60 + }, + "[sig-builds][Feature:Builds][pullsearch] docker build where the registry is not specified Building from a Dockerfile whose FROM image ref does not specify the image registry should create a docker build that has buildah search from our predefined list of image registries and succeed [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 49 + }, + "[sig-builds][Feature:Builds][pullsecret] docker build using a pull secret Building from a template should create a docker build that pulls using a secret run it [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 167 + }, + "[sig-builds][Feature:Builds][pullsecret] docker build using a pull secret Building from a template should create a docker build that pulls using a secret run it [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 139 + }, + "[sig-builds][Feature:Builds][subscription-content] builds installing subscription content [apigroup:build.openshift.io] should succeed for RHEL 7 base images [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-builds][Feature:Builds][subscription-content] builds installing subscription content [apigroup:build.openshift.io] should succeed for RHEL 8 base images [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-builds][Feature:Builds][subscription-content] builds installing subscription content [apigroup:build.openshift.io] should succeed for RHEL 9 base images [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-builds][Feature:Builds][timing] capture build stages and durations should record build stages and durations for docker [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 101 + }, + "[sig-builds][Feature:Builds][timing] capture build stages and durations should record build stages and durations for docker [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 88 + }, + "[sig-builds][Feature:Builds][timing] capture build stages and durations should record build stages and durations for s2i [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 83 + }, + "[sig-builds][Feature:Builds][timing] capture build stages and durations should record build stages and durations for s2i [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 67 + }, + "[sig-builds][Feature:Builds][valueFrom] process valueFrom in build strategy environment variables should fail resolving unresolvable valueFrom in docker build environment variable references [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 10 + }, + "[sig-builds][Feature:Builds][valueFrom] process valueFrom in build strategy environment variables should fail resolving unresolvable valueFrom in docker build environment variable references [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 8 + }, + "[sig-builds][Feature:Builds][valueFrom] process valueFrom in build strategy environment variables should fail resolving unresolvable valueFrom in sti build environment variable references [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 10 + }, + "[sig-builds][Feature:Builds][valueFrom] process valueFrom in build strategy environment variables should fail resolving unresolvable valueFrom in sti build environment variable references [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 8 + }, + "[sig-builds][Feature:Builds][valueFrom] process valueFrom in build strategy environment variables should successfully resolve valueFrom in docker build environment variables [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 98 + }, + "[sig-builds][Feature:Builds][valueFrom] process valueFrom in build strategy environment variables should successfully resolve valueFrom in docker build environment variables [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 74 + }, + "[sig-builds][Feature:Builds][valueFrom] process valueFrom in build strategy environment variables should successfully resolve valueFrom in s2i build environment variables [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 84 + }, + "[sig-builds][Feature:Builds][valueFrom] process valueFrom in build strategy environment variables should successfully resolve valueFrom in s2i build environment variables [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 66 + }, + "[sig-builds][Feature:Builds][volumes] build volumes should mount given secrets and configmaps into the build pod for docker strategy builds [apigroup:image.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 91 + }, + "[sig-builds][Feature:Builds][volumes] build volumes should mount given secrets and configmaps into the build pod for docker strategy builds [apigroup:image.openshift.io][apigroup:build.openshift.io][apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 90 + }, + "[sig-builds][Feature:Builds][volumes] build volumes should mount given secrets and configmaps into the build pod for source strategy builds [apigroup:image.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 94 + }, + "[sig-builds][Feature:Builds][volumes] build volumes should mount given secrets and configmaps into the build pod for source strategy builds [apigroup:image.openshift.io][apigroup:build.openshift.io][apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 92 + }, + "[sig-builds][Feature:Builds][volumes] csi build volumes within Tech Preview disabled clusters [apigroup:config.openshift.io] should fail mounting given csi shared resource secret into the build pod for docker strategy builds [apigroup:image.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 563 + }, + "[sig-builds][Feature:Builds][volumes] csi build volumes within Tech Preview disabled clusters [apigroup:config.openshift.io] should fail mounting given csi shared resource secret into the build pod for source strategy builds [apigroup:image.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 562 + }, + "[sig-builds][Feature:Builds][volumes] csi build volumes within Tech Preview enabled cluster [apigroup:config.openshift.io] should mount given csi shared resource secret into the build pod for docker strategy builds [apigroup:image.openshift.io][apigroup:build.openshift.io][apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-builds][Feature:Builds][volumes] csi build volumes within Tech Preview enabled cluster [apigroup:config.openshift.io] should mount given csi shared resource secret into the build pod for source strategy builds [apigroup:image.openshift.io][apigroup:build.openshift.io][apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-builds][Feature:Builds][volumes] csi build volumes within Tech Preview enabled cluster [apigroup:config.openshift.io] should mount given csi shared resource secret without resource refresh into the build pod for docker strategy builds [apigroup:image.openshift.io][apigroup:build.openshift.io][apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 7 + }, + "[sig-builds][Feature:Builds][volumes] csi build volumes within Tech Preview enabled cluster [apigroup:config.openshift.io] should mount given csi shared resource secret without resource refresh into the build pod for source strategy builds [apigroup:image.openshift.io][apigroup:build.openshift.io][apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 7 + }, + "[sig-builds][Feature:Builds][webhook] TestWebhook [apigroup:build.openshift.io][apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-builds][Feature:Builds][webhook] TestWebhookGitHubPing [apigroup:image.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 8 + }, + "[sig-builds][Feature:Builds][webhook] TestWebhookGitHubPushWithImage [apigroup:image.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-builds][Feature:Builds][webhook] TestWebhookGitHubPushWithImageStream [apigroup:image.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-builds][Feature:JenkinsRHELImagesOnly][Feature:Jenkins][Feature:Builds][sig-devex][Slow] openshift pipeline build jenkins pipeline build config strategy using a jenkins instance launched with the ephemeral template [apigroup:build.openshift.io]": { + "average_duration": 149 + }, + "[sig-builds][sig-node][Feature:Builds][apigroup:build.openshift.io] zstd:chunked Image should successfully run date command [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 243 + }, + "[sig-builds][sig-node][Feature:Builds][apigroup:build.openshift.io] zstd:chunked Image should successfully run date command [Suite:openshift/conformance/parallel]": { + "average_duration": 196 + }, + "[sig-ci] [Early] prow job name should match cluster version [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-ci] [Early] prow job name should match feature set [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-ci] [Early] prow job name should match network type [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-ci] [Early] prow job name should match network type [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-ci] [Early] prow job name should match platform type [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-ci] [Early] prow job name should match platform type [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-ci] [Early] prow job name should match security mode [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] Kubectl Port forwarding Shutdown client connection while the remote stream is writing data to the port-forward connection port-forward should keep working after detect broken connection": { + "average_duration": 16 + }, + "[sig-cli] Kubectl Port forwarding Shutdown client connection while the remote stream is writing data to the port-forward connection port-forward should keep working after detect broken connection [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 should support forwarding over websockets": { + "average_duration": 8 + }, + "[sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 should support forwarding over websockets [Skipped:Proxy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 should support forwarding over websockets [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects NO client request should support a client that connects, sends DATA, and disconnects": { + "average_duration": 11 + }, + "[sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects NO client request should support a client that connects, sends DATA, and disconnects [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects a client request should support a client that connects, sends DATA, and disconnects": { + "average_duration": 11 + }, + "[sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects a client request should support a client that connects, sends DATA, and disconnects [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects a client request should support a client that connects, sends NO DATA, and disconnects": { + "average_duration": 10 + }, + "[sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects a client request should support a client that connects, sends NO DATA, and disconnects [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-cli] Kubectl Port forwarding With a server listening on localhost should support forwarding over websockets": { + "average_duration": 8 + }, + "[sig-cli] Kubectl Port forwarding With a server listening on localhost should support forwarding over websockets [Skipped:Proxy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-cli] Kubectl Port forwarding With a server listening on localhost should support forwarding over websockets [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-cli] Kubectl Port forwarding With a server listening on localhost that expects NO client request should support a client that connects, sends DATA, and disconnects": { + "average_duration": 11 + }, + "[sig-cli] Kubectl Port forwarding With a server listening on localhost that expects NO client request should support a client that connects, sends DATA, and disconnects [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-cli] Kubectl Port forwarding With a server listening on localhost that expects a client request should support a client that connects, sends DATA, and disconnects": { + "average_duration": 11 + }, + "[sig-cli] Kubectl Port forwarding With a server listening on localhost that expects a client request should support a client that connects, sends DATA, and disconnects [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-cli] Kubectl Port forwarding With a server listening on localhost that expects a client request should support a client that connects, sends NO DATA, and disconnects": { + "average_duration": 10 + }, + "[sig-cli] Kubectl Port forwarding With a server listening on localhost that expects a client request should support a client that connects, sends NO DATA, and disconnects [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-cli] Kubectl Port forwarding with a pod being removed should stop port-forwarding": { + "average_duration": 12 + }, + "[sig-cli] Kubectl Port forwarding with a pod being removed should stop port-forwarding [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-cli] Kubectl client Kubectl api-versions should check if v1 is in available api versions [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-cli] Kubectl client Kubectl api-versions should check if v1 is in available api versions [Conformance]": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client Kubectl api-versions should check if v1 is in available api versions [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client Kubectl apply apply set/view last-applied": { + "average_duration": 2 + }, + "[sig-cli] Kubectl client Kubectl apply apply set/view last-applied [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-cli] Kubectl client Kubectl apply should apply a new configuration to an existing RC": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client Kubectl apply should apply a new configuration to an existing RC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-cli] Kubectl client Kubectl apply should reuse port when apply to an existing SVC": { + "average_duration": 2 + }, + "[sig-cli] Kubectl client Kubectl apply should reuse port when apply to an existing SVC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-cli] Kubectl client Kubectl cluster-info dump should check if cluster-info dump succeeds": { + "average_duration": 2 + }, + "[sig-cli] Kubectl client Kubectl cluster-info dump should check if cluster-info dump succeeds [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-cli] Kubectl client Kubectl cluster-info should check if Kubernetes control plane services is included in cluster-info [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-cli] Kubectl client Kubectl cluster-info should check if Kubernetes control plane services is included in cluster-info [Conformance]": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client Kubectl cluster-info should check if Kubernetes control plane services is included in cluster-info [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client Kubectl copy should copy a file from a running Pod": { + "average_duration": 5 + }, + "[sig-cli] Kubectl client Kubectl copy should copy a file from a running Pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-cli] Kubectl client Kubectl create quota should create a quota with scopes": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client Kubectl create quota should create a quota with scopes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client Kubectl create quota should create a quota without scopes": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client Kubectl create quota should create a quota without scopes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client Kubectl create quota should reject quota with invalid scopes": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client Kubectl create quota should reject quota with invalid scopes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client Kubectl describe should check if kubectl describe prints relevant information for cronjob": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client Kubectl describe should check if kubectl describe prints relevant information for cronjob [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-cli] Kubectl client Kubectl describe should check if kubectl describe prints relevant information for rc and pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-cli] Kubectl client Kubectl describe should check if kubectl describe prints relevant information for rc and pods [Conformance]": { + "average_duration": 6 + }, + "[sig-cli] Kubectl client Kubectl describe should check if kubectl describe prints relevant information for rc and pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-cli] Kubectl client Kubectl diff should check if kubectl diff finds a difference for Deployments [Conformance]": { + "average_duration": 2 + }, + "[sig-cli] Kubectl client Kubectl diff should check if kubectl diff finds a difference for Deployments [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-cli] Kubectl client Kubectl events should show event when pod is created": { + "average_duration": 7 + }, + "[sig-cli] Kubectl client Kubectl events should show event when pod is created [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-cli] Kubectl client Kubectl expose should create services for rc [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-cli] Kubectl client Kubectl expose should create services for rc [Conformance]": { + "average_duration": 8 + }, + "[sig-cli] Kubectl client Kubectl expose should create services for rc [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-cli] Kubectl client Kubectl get componentstatuses should get componentstatuses": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client Kubectl get componentstatuses should get componentstatuses [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-cli] Kubectl client Kubectl label should update the label on a resource [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-cli] Kubectl client Kubectl label should update the label on a resource [Conformance]": { + "average_duration": 5 + }, + "[sig-cli] Kubectl client Kubectl label should update the label on a resource [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-cli] Kubectl client Kubectl logs should be able to retrieve and filter logs [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-cli] Kubectl client Kubectl patch should add annotations for pods in rc [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-cli] Kubectl client Kubectl patch should add annotations for pods in rc [Conformance]": { + "average_duration": 4 + }, + "[sig-cli] Kubectl client Kubectl patch should add annotations for pods in rc [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-cli] Kubectl client Kubectl replace should update a single-container pod's image [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-cli] Kubectl client Kubectl replace should update a single-container pod's image [Conformance]": { + "average_duration": 9 + }, + "[sig-cli] Kubectl client Kubectl replace should update a single-container pod's image [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-cli] Kubectl client Kubectl run pod should create a pod from an image when restart is Never [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-cli] Kubectl client Kubectl run pod should create a pod from an image when restart is Never [Conformance]": { + "average_duration": 3 + }, + "[sig-cli] Kubectl client Kubectl run pod should create a pod from an image when restart is Never [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-cli] Kubectl client Kubectl server-side dry-run should check if kubectl can dry-run update Pods [Conformance]": { + "average_duration": 5 + }, + "[sig-cli] Kubectl client Kubectl server-side dry-run should check if kubectl can dry-run update Pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-cli] Kubectl client Kubectl taint [Serial] should remove all the taints with the same key off a node": { + "average_duration": 8 + }, + "[sig-cli] Kubectl client Kubectl taint [Serial] should remove all the taints with the same key off a node [Skipped:SingleReplicaTopology] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-cli] Kubectl client Kubectl taint [Serial] should remove all the taints with the same key off a node [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-cli] Kubectl client Kubectl taint [Serial] should update the taint on a node": { + "average_duration": 5 + }, + "[sig-cli] Kubectl client Kubectl taint [Serial] should update the taint on a node [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-cli] Kubectl client Kubectl validation should create/apply a CR with unknown fields for CRD with no validation schema": { + "average_duration": 12 + }, + "[sig-cli] Kubectl client Kubectl validation should create/apply a CR with unknown fields for CRD with no validation schema [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-cli] Kubectl client Kubectl validation should create/apply a valid CR for CRD with validation schema": { + "average_duration": 12 + }, + "[sig-cli] Kubectl client Kubectl validation should create/apply a valid CR for CRD with validation schema [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-cli] Kubectl client Kubectl validation should create/apply an invalid/valid CR with arbitrary-extra properties for CRD with partially-specified validation schema": { + "average_duration": 15 + }, + "[sig-cli] Kubectl client Kubectl validation should create/apply an invalid/valid CR with arbitrary-extra properties for CRD with partially-specified validation schema [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-cli] Kubectl client Kubectl validation should detect unknown metadata fields in both the root and embedded object of a CR": { + "average_duration": 14 + }, + "[sig-cli] Kubectl client Kubectl validation should detect unknown metadata fields in both the root and embedded object of a CR [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-cli] Kubectl client Kubectl validation should detect unknown metadata fields of a typed object": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client Kubectl validation should detect unknown metadata fields of a typed object [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-cli] Kubectl client Kubectl version should check is all data is printed [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-cli] Kubectl client Kubectl version should check is all data is printed [Conformance]": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client Kubectl version should check is all data is printed [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client Proxy server should support --unix-socket=/path [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-cli] Kubectl client Proxy server should support --unix-socket=/path [Conformance]": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client Proxy server should support --unix-socket=/path [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client Proxy server should support proxy with --port 0 [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-cli] Kubectl client Proxy server should support proxy with --port 0 [Conformance]": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client Proxy server should support proxy with --port 0 [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client Simple pod Kubectl run running a failing command": { + "average_duration": 19 + }, + "[sig-cli] Kubectl client Simple pod Kubectl run running a failing command [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-cli] Kubectl client Simple pod Kubectl run running a successful command": { + "average_duration": 20 + }, + "[sig-cli] Kubectl client Simple pod Kubectl run running a successful command [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-cli] Kubectl client Simple pod should contain last line of the log": { + "average_duration": 27 + }, + "[sig-cli] Kubectl client Simple pod should contain last line of the log [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-cli] Kubectl client Simple pod should return command exit codes execing into a container with a failing command": { + "average_duration": 18 + }, + "[sig-cli] Kubectl client Simple pod should return command exit codes execing into a container with a failing command [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-cli] Kubectl client Simple pod should return command exit codes execing into a container with a successful command": { + "average_duration": 16 + }, + "[sig-cli] Kubectl client Simple pod should return command exit codes execing into a container with a successful command [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-cli] Kubectl client Simple pod should return command exit codes running a failing command [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 24 + }, + "[sig-cli] Kubectl client Simple pod should return command exit codes running a successful command [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-cli] Kubectl client Simple pod should return command exit codes should support port-forward": { + "average_duration": 16 + }, + "[sig-cli] Kubectl client Simple pod should return command exit codes should support port-forward [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-cli] Kubectl client Simple pod should support exec": { + "average_duration": 18 + }, + "[sig-cli] Kubectl client Simple pod should support exec [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-cli] Kubectl client Simple pod should support exec through an HTTP proxy": { + "average_duration": 19 + }, + "[sig-cli] Kubectl client Simple pod should support exec through an HTTP proxy [Skipped:Proxy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-cli] Kubectl client Simple pod should support exec through an HTTP proxy [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-cli] Kubectl client Simple pod should support exec through kubectl proxy": { + "average_duration": 17 + }, + "[sig-cli] Kubectl client Simple pod should support exec through kubectl proxy [Skipped:Proxy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-cli] Kubectl client Simple pod should support exec through kubectl proxy [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-cli] Kubectl client Simple pod should support exec using resource/name": { + "average_duration": 17 + }, + "[sig-cli] Kubectl client Simple pod should support exec using resource/name [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-cli] Kubectl client Simple pod should support inline execution and attach": { + "average_duration": 55 + }, + "[sig-cli] Kubectl client Simple pod should support inline execution and attach [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 62 + }, + "[sig-cli] Kubectl client Simple pod should support inline execution and attach with websockets or fallback to spdy": { + "average_duration": 53 + }, + "[sig-cli] Kubectl client Simple pod should support inline execution and attach with websockets or fallback to spdy [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 62 + }, + "[sig-cli] Kubectl client Simple pod should support port-forward [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-cli] Kubectl client Update Demo should create and stop a replication controller [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-cli] Kubectl client Update Demo should create and stop a replication controller [Conformance]": { + "average_duration": 12 + }, + "[sig-cli] Kubectl client Update Demo should create and stop a replication controller [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-cli] Kubectl client Update Demo should scale a replication controller [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-cli] Kubectl client Update Demo should scale a replication controller [Conformance]": { + "average_duration": 21 + }, + "[sig-cli] Kubectl client Update Demo should scale a replication controller [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 28 + }, + "[sig-cli] Kubectl client kubectl subresource flag GET on status subresource of built-in type (node) returns identical info as GET on the built-in type": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client kubectl subresource flag GET on status subresource of built-in type (node) returns identical info as GET on the built-in type [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-cli] Kubectl client kubectl subresource flag should not be used in a bulk GET": { + "average_duration": 1 + }, + "[sig-cli] Kubectl client kubectl subresource flag should not be used in a bulk GET [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-cli] Kubectl delete interactive based on user confirmation input": { + "average_duration": 10 + }, + "[sig-cli] Kubectl delete interactive based on user confirmation input [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-cli] Kubectl exec should be able to execute 1000 times in a container": { + "average_duration": 36 + }, + "[sig-cli] Kubectl exec should be able to execute 1000 times in a container [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 50 + }, + "[sig-cli] Kubectl logs all pod logs the Deployment has 2 replicas and each pod has 2 containers should get logs from all pods based on default container": { + "average_duration": 6 + }, + "[sig-cli] Kubectl logs all pod logs the Deployment has 2 replicas and each pod has 2 containers should get logs from all pods based on default container [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-cli] Kubectl logs all pod logs the Deployment has 2 replicas and each pod has 2 containers should get logs from each pod and each container in Deployment": { + "average_duration": 5 + }, + "[sig-cli] Kubectl logs all pod logs the Deployment has 2 replicas and each pod has 2 containers should get logs from each pod and each container in Deployment [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-cli] Kubectl logs default container logs the second container is the default-container by annotation should log default container if not specified": { + "average_duration": 11 + }, + "[sig-cli] Kubectl logs default container logs the second container is the default-container by annotation should log default container if not specified [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-cli] Kubectl logs logs should be able to retrieve and filter logs [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-cli] Kubectl logs logs should be able to retrieve and filter logs [Conformance]": { + "average_duration": 10 + }, + "[sig-cli] Kubectl logs logs should be able to retrieve and filter logs [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-cli] Kubectl rollout undo undo should rollback and update deployment env": { + "average_duration": 10 + }, + "[sig-cli] Kubectl rollout undo undo should rollback and update deployment env [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-cli] Workloads sos reports on Microshift MicroShiftBoth-Author:knarra-Medium-28018-Workloads Custom label for pvc in statefulsets": { + "average_duration": 31 + }, + "[sig-cli] Workloads sos reports on Microshift MicroShiftBoth-ROSA-OSD_CCS-ARO-Author:knarra-Critical-63850-Critical-64919-Verify oc image extract and oc adm release info -h contains --idms-file": { + "average_duration": 4 + }, + "[sig-cli] Workloads sos reports on Microshift MicroShiftBoth-ROSA-OSD_CCS-ARO-Author:knarra-High-63855-Medium-64944-Verify oc image extract and oc adm release info throws error when both --icsp-file and -idms-file flag is used": { + "average_duration": 4 + }, + "[sig-cli] Workloads sos reports on Microshift MicroShiftBoth-ROSA-OSD_CCS-ARO-Author:yinzhou-High-43030-oc get events always show the timestamp as LAST SEEN": { + "average_duration": 11 + }, + "[sig-cli] Workloads sos reports on Microshift MicroShiftBoth-ROSA-OSD_CCS-ARO-Author:yinzhou-Medium-28007-Checking oc version show clean as gitTreeState value": { + "average_duration": 4 + }, + "[sig-cli] Workloads sos reports on Microshift MicroShiftBoth-ROSA-OSD_CCS-ARO-Author:yinzhou-Medium-34155-oc get events sorted by lastTimestamp": { + "average_duration": 4 + }, + "[sig-cli] Workloads sos reports on Microshift MicroShiftBoth-ROSA-OSD_CCS-ARO-Author:yinzhou-Medium-47555-Should not update data when use oc set data with dry-run as server": { + "average_duration": 14 + }, + "[sig-cli] Workloads sos reports on Microshift MicroShiftBoth-ROSA-OSD_CCS-ARO-Author:yinzhou-Medium-49116-oc debug should remove startupProbe when create debug pod": { + "average_duration": 20 + }, + "[sig-cli] Workloads sos reports on Microshift MicroShiftBoth-ROSA-OSD_CCS-ARO-Author:yinzhou-Medium-66724-oc explain should be work for all the clusterresource [Serial]": { + "average_duration": 15 + }, + "[sig-cli] Workloads sos reports on Microshift MicroShiftBoth-VMonly-ROSA-OSD_CCS-ARO-Author:yinzhou-Medium-42983-always delete the debug pod when the oc debug node command exist [Flaky]": { + "average_duration": 21 + }, + "[sig-cli] Workloads sos reports on Microshift MicroShiftOnly-Author:knarra-Critical-60924-Critical-60929-High-68257-Verify sos report -l lists enabled microshift plugins and Verify running sos report -p microshift collects microshift and microshift config related information [Serial]": { + "average_duration": 131 + }, + "[sig-cli] Workloads sos reports on Microshift MicroShiftOnly-Author:knarra-High-60930-Verify running sos report collect microshift related information [Serial]": { + "average_duration": 129 + }, + "[sig-cli] Workloads sos reports on Microshift MicroShiftOnly-Author:knarra-High-68256-Verify greenboot logs reside in a separate directory and easy to access [Serial]": { + "average_duration": 168 + }, + "[sig-cli] kubectl debug custom profile should be applied on static profiles on ephemeral container": { + "average_duration": 7 + }, + "[sig-cli] kubectl debug custom profile should be applied on static profiles on ephemeral container [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-cli] kubectl debug custom profile should be applied on static profiles while copying from pod": { + "average_duration": 9 + }, + "[sig-cli] kubectl debug custom profile should be applied on static profiles while copying from pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-cli] kubectl kuberc given preferences should be applied": { + "average_duration": 1 + }, + "[sig-cli] kubectl kuberc given preferences should be applied [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-cli] kubectl kuberc given preferences should be ignored when flags are explicitly passed": { + "average_duration": 4 + }, + "[sig-cli] kubectl kuberc given preferences should be ignored when flags are explicitly passed [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-cli] oc --request-timeout works as expected [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-cli] oc --request-timeout works as expected for deployment [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-cli] oc adm build-chain [apigroup:build.openshift.io][apigroup:image.openshift.io][apigroup:project.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-cli] oc adm build-chain [apigroup:build.openshift.io][apigroup:image.openshift.io][apigroup:project.openshift.io][apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-cli] oc adm cluster-role-reapers [Serial][apigroup:authorization.openshift.io][apigroup:user.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 15 + }, + "[sig-cli] oc adm groups [apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 7 + }, + "[sig-cli] oc adm images [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-cli] oc adm must-gather runs successfully [Suite:openshift/conformance/parallel]": { + "average_duration": 123 + }, + "[sig-cli] oc adm must-gather runs successfully [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 153 + }, + "[sig-cli] oc adm must-gather runs successfully for audit logs [apigroup:config.openshift.io][apigroup:oauth.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 79 + }, + "[sig-cli] oc adm must-gather runs successfully with options [Suite:openshift/conformance/parallel]": { + "average_duration": 18 + }, + "[sig-cli] oc adm must-gather runs successfully with options [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 13 + }, + "[sig-cli] oc adm must-gather when looking at the audit logs [apigroup:config.openshift.io] [sig-node] kubelet runs apiserver processes strictly sequentially in order to not risk audit log corruption [Suite:openshift/conformance/parallel]": { + "average_duration": 66 + }, + "[sig-cli] oc adm must-gather when looking at the audit logs [sig-node] kubelet runs apiserver processes strictly sequentially in order to not risk audit log corruption [Suite:openshift/conformance/parallel]": { + "average_duration": 49 + }, + "[sig-cli] oc adm must-gather when looking at the audit logs [sig-node] kubelet runs apiserver processes strictly sequentially in order to not risk audit log corruption [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 45 + }, + "[sig-cli] oc adm new-project [apigroup:project.openshift.io][apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 88 + }, + "[sig-cli] oc adm node-logs [Suite:openshift/conformance/parallel]": { + "average_duration": 7 + }, + "[sig-cli] oc adm policy [apigroup:authorization.openshift.io][apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 15 + }, + "[sig-cli] oc adm release extract image-references [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-cli] oc adm role-reapers [apigroup:authorization.openshift.io][apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 10 + }, + "[sig-cli] oc adm role-selectors [apigroup:template.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-cli] oc adm serviceaccounts [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-cli] oc adm storage-admin [apigroup:authorization.openshift.io][apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 42 + }, + "[sig-cli] oc adm ui-project-commands [apigroup:project.openshift.io][apigroup:authorization.openshift.io][apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 59 + }, + "[sig-cli] oc adm user-creation [apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-cli] oc adm who-can [apigroup:authorization.openshift.io][apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-cli] oc annotate pod [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-cli] oc api-resources can output expected information about api-resources [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-cli] oc api-resources can output expected information about build.openshift.io api-resources [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc api-resources can output expected information about image.openshift.io api-resources [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc api-resources can output expected information about operator.openshift.io api-resources [apigroup:operator.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc api-resources can output expected information about project.openshift.io api-resources [apigroup:project.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc api-resources can output expected information about route.openshift.io api-resources and api-version [apigroup:route.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc api-resources can output expected information about snapshot.storage.k8s.io api-resources [apigroup:snapshot.storage.k8s.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc basics can create and interact with a list of resources [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-cli] oc basics can create deploymentconfig and clusterquota [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 10 + }, + "[sig-cli] oc basics can describe an OAuth access token [apigroup:oauth.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-cli] oc basics can get version information from API [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc basics can get version information from CLI [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc basics can output expected --dry-run text [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc basics can patch resources [apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-cli] oc basics can process templates [apigroup:template.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-cli] oc basics can show correct whoami result [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc basics can show correct whoami result with console [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-cli] oc basics can show correct whoami result with console [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-cli] oc builds complex build start-build [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-cli] oc builds complex build start-build [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 7 + }, + "[sig-cli] oc builds complex build start-build [apigroup:build.openshift.io][apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-cli] oc builds complex build webhooks CRUD [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-cli] oc builds complex build webhooks CRUD [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 7 + }, + "[sig-cli] oc builds complex build webhooks CRUD [apigroup:build.openshift.io][apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-cli] oc builds get buildconfig [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-cli] oc builds get buildconfig [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-cli] oc builds new-build [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 19 + }, + "[sig-cli] oc builds new-build [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 17 + }, + "[sig-cli] oc builds patch buildconfig [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-cli] oc builds patch buildconfig [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-cli] oc can get list of nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc can route traffic to services [apigroup:route.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 16 + }, + "[sig-cli] oc can run inside of a busybox container [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 13 + }, + "[sig-cli] oc completion returns expected help messages [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-cli] oc debug deployment configs from a build [apigroup:image.openshift.io][apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 109 + }, + "[sig-cli] oc debug deployment from a build [apigroup:image.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 115 + }, + "[sig-cli] oc debug deployment from a build [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 71 + }, + "[sig-cli] oc debug dissect deployment config debug [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 52 + }, + "[sig-cli] oc debug dissect deployment debug [Suite:openshift/conformance/parallel]": { + "average_duration": 45 + }, + "[sig-cli] oc debug does not require a real resource on the server [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc debug ensure debug does not depend on a container actually existing for the selected resource [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-cli] oc debug ensure debug does not depend on a container actually existing for the selected resource for deployment [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc debug ensure it works with image streams [apigroup:image.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 14 + }, + "[sig-cli] oc debug ensure it works with image streams [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 13 + }, + "[sig-cli] oc debug ensure that the label is set for node debug [Suite:openshift/conformance/parallel]": { + "average_duration": 12 + }, + "[sig-cli] oc env can set environment variables [apigroup:apps.openshift.io][apigroup:image.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 8 + }, + "[sig-cli] oc env can set environment variables for deployment [apigroup:image.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 8 + }, + "[sig-cli] oc explain list uncovered GroupVersionResources [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc explain networking types when using openshift-sdn should contain proper fields description for special networking types [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-cli] oc explain should contain proper fields description for apps.openshift.io [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc explain should contain proper fields description for authorization.openshift.io [apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-cli] oc explain should contain proper fields description for config.openshift.io [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc explain should contain proper fields description for console.openshift.io [apigroup:console.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-cli] oc explain should contain proper fields description for image.openshift.io [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-cli] oc explain should contain proper fields description for network.operator.openshift.io [apigroup:network.operator.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-cli] oc explain should contain proper fields description for oauth.openshift.io [apigroup:oauth.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-cli] oc explain should contain proper fields description for project.openshift.io [apigroup:project.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc explain should contain proper fields description for rangeallocations of security.openshift.io, if the resource is present [apigroup:security.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc explain should contain proper fields description for route.openshift.io [apigroup:route.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc explain should contain proper fields description for security.internal.openshift.io [apigroup:security.internal.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc explain should contain proper fields description for security.openshift.io [apigroup:security.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-cli] oc explain should contain proper fields description for securitycontextconstraints of security.openshift.io, if the resource is present [apigroup:security.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc explain should contain proper fields description for template.openshift.io [apigroup:template.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-cli] oc explain should contain proper fields description for user.openshift.io [apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-cli] oc explain should contain proper spec+status for CRDs [Suite:openshift/conformance/parallel]": { + "average_duration": 24 + }, + "[sig-cli] oc explain should contain proper spec+status for CRDs [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 45 + }, + "[sig-cli] oc explain should contain spec+status for apps.openshift.io [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc explain should contain spec+status for build.openshift.io [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-cli] oc explain should contain spec+status for image.openshift.io [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-cli] oc explain should contain spec+status for podsecuritypolicyreviews of security.openshift.io, if the resource is present [apigroup:security.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc explain should contain spec+status for podsecuritypolicyselfsubjectreviews of security.openshift.io, if the resource is present [apigroup:security.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc explain should contain spec+status for podsecuritypolicysubjectreviews of security.openshift.io, if the resource is present [apigroup:security.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc explain should contain spec+status for project.openshift.io [apigroup:project.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc explain should contain spec+status for route.openshift.io [apigroup:route.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc explain should contain spec+status for security.openshift.io [apigroup:security.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-cli] oc explain should contain spec+status for template.openshift.io [apigroup:template.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc expose can ensure the expose command is functioning as expected [apigroup:route.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 7 + }, + "[sig-cli] oc help works as expected [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc idle Deployments [apigroup:route.openshift.io][apigroup:project.openshift.io][apigroup:image.openshift.io] by all [Suite:openshift/conformance/parallel]": { + "average_duration": 13 + }, + "[sig-cli] oc idle Deployments [apigroup:route.openshift.io][apigroup:project.openshift.io][apigroup:image.openshift.io] by label [Suite:openshift/conformance/parallel]": { + "average_duration": 13 + }, + "[sig-cli] oc idle Deployments [apigroup:route.openshift.io][apigroup:project.openshift.io][apigroup:image.openshift.io] by name [Suite:openshift/conformance/parallel]": { + "average_duration": 13 + }, + "[sig-cli] oc idle [apigroup:apps.openshift.io][apigroup:route.openshift.io][apigroup:project.openshift.io][apigroup:image.openshift.io] by all [Suite:openshift/conformance/parallel]": { + "average_duration": 15 + }, + "[sig-cli] oc idle [apigroup:apps.openshift.io][apigroup:route.openshift.io][apigroup:project.openshift.io][apigroup:image.openshift.io] by checking previous scale [Suite:openshift/conformance/parallel]": { + "average_duration": 15 + }, + "[sig-cli] oc idle [apigroup:apps.openshift.io][apigroup:route.openshift.io][apigroup:project.openshift.io][apigroup:image.openshift.io] by label [Suite:openshift/conformance/parallel]": { + "average_duration": 15 + }, + "[sig-cli] oc idle [apigroup:apps.openshift.io][apigroup:route.openshift.io][apigroup:project.openshift.io][apigroup:image.openshift.io] by name [Suite:openshift/conformance/parallel]": { + "average_duration": 16 + }, + "[sig-cli] oc label pod [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-cli] oc observe works as expected [Suite:openshift/conformance/parallel]": { + "average_duration": 12 + }, + "[sig-cli] oc observe works as expected with cluster operators [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-cli] oc probe can ensure the probe command is functioning as expected on deploymentconfigs [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 8 + }, + "[sig-cli] oc probe can ensure the probe command is functioning as expected on pods [Suite:openshift/conformance/parallel]": { + "average_duration": 10 + }, + "[sig-cli] oc project --show-labels works for projects [apigroup:project.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc project can switch between different projects [apigroup:authorization.openshift.io][apigroup:user.openshift.io][apigroup:project.openshift.io][Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 26 + }, + "[sig-cli] oc rsh specific flags should work well when access to a remote shell [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 11 + }, + "[sig-cli] oc rsh specific flags should work well when access to a remote shell [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-cli] oc run can use --image flag correctly [apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc run can use --image flag correctly for deployment [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] oc secret creates and retrieves expected [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-cli] oc service creates and deletes services [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-cli] oc set image can set images for pods and deployments [apigroup:image.openshift.io][Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 11 + }, + "[sig-cli] oc set image can set images for pods and deployments [apigroup:image.openshift.io][apigroup:apps.openshift.io][Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 11 + }, + "[sig-cli] oc statefulset creates and deletes statefulsets [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-cli] oc status can show correct status after switching between projects [apigroup:project.openshift.io][apigroup:image.openshift.io][Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 21 + }, + "[sig-cli] oc status returns expected help messages [apigroup:project.openshift.io][apigroup:build.openshift.io][apigroup:image.openshift.io][apigroup:apps.openshift.io][apigroup:route.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-cli] oc status returns expected help messages [apigroup:project.openshift.io][apigroup:build.openshift.io][apigroup:image.openshift.io][apigroup:route.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cli] policy scc-subject-review, scc-review [apigroup:authorization.openshift.io][apigroup:user.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-cli] templates different namespaces [apigroup:user.openshift.io][apigroup:project.openshift.io][apigroup:template.openshift.io][apigroup:authorization.openshift.io][Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 56 + }, + "[sig-cli] templates process [apigroup:apps.openshift.io][apigroup:template.openshift.io][Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 33 + }, + "[sig-cli] templates process [apigroup:template.openshift.io][Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 30 + }, + "[sig-cli][OCPFeatureGate:UpgradeStatus] oc adm upgrade status control plane section is consistent": { + "average_duration": 0 + }, + "[sig-cli][OCPFeatureGate:UpgradeStatus] oc adm upgrade status health section is consistent": { + "average_duration": 0 + }, + "[sig-cli][OCPFeatureGate:UpgradeStatus] oc adm upgrade status output has expected layout": { + "average_duration": 0 + }, + "[sig-cli][OCPFeatureGate:UpgradeStatus] oc adm upgrade status reports correctly when the cluster is not updating [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-cli][OCPFeatureGate:UpgradeStatus] oc adm upgrade status snapshots reflect the cluster upgrade lifecycle": { + "average_duration": 0 + }, + "[sig-cli][OCPFeatureGate:UpgradeStatus] oc adm upgrade status workers section is consistent": { + "average_duration": 0 + }, + "[sig-cli][OCPFeatureGate:UpgradeStatus] oc amd upgrade status never fails": { + "average_duration": 0 + }, + "[sig-cloud-provider-gcp] Upgrade [Feature:Upgrade] cluster upgrade should maintain a functioning cluster [Feature:ClusterUpgrade] [Suite:openshift/conformance/parallel]": { + "average_duration": 15 + }, + "[sig-cloud-provider][Feature:OpenShiftCloudControllerManager][Late] Cluster scoped load balancer healthcheck port and path should be 10256/healthz [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-cloud-provider][Feature:OpenShiftCloudControllerManager][Late] Deploy an external cloud provider [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-cloud-provider][Feature:OpenShiftCloudControllerManager][Late] Deploy an external cloud provider [apigroup:machineconfiguration.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-cluster-lifecycle] CSRs from machines that are not recognized by the cloud provider are not approved [Suite:openshift/conformance/parallel]": { + "average_duration": 28 + }, + "[sig-cluster-lifecycle] CSRs from machines that are not recognized by the cloud provider are not approved [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 34 + }, + "[sig-cluster-lifecycle] Pods cannot access the /config/master API endpoint [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 10 + }, + "[sig-cluster-lifecycle] Pods cannot access the /config/master API endpoint [Suite:openshift/conformance/parallel]": { + "average_duration": 7 + }, + "[sig-cluster-lifecycle] Pods cannot access the /config/master API endpoint [apigroup:config.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 16 + }, + "[sig-cluster-lifecycle] TestAdminAck should succeed [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/default": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/kube-system": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-apiserver": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-apiserver-operator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-authentication": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-authentication-operator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-cloud-controller-manager": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-cloud-controller-manager-operator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-cloud-credential-operator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-cloud-network-config-controller": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-cluster-csi-drivers": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-cluster-machine-approver": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-cluster-node-tuning-operator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-cluster-samples-operator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-cluster-storage-operator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-cluster-version": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-config": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-config-managed": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-config-operator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-console": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-console-operator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-controller-manager": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-controller-manager-operator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-dns": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-dns-operator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-etcd": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-etcd-operator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-host-network": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-image-registry": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-infra": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-ingress": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-ingress-canary": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-ingress-operator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-insights": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-kni-infra": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-kube-apiserver": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-kube-apiserver-operator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-kube-controller-manager": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-kube-controller-manager-operator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-kube-scheduler": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-kube-scheduler-operator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-kube-storage-version-migrator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-kube-storage-version-migrator-operator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-machine-api": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-machine-config-operator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-marketplace": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-monitoring": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-multus": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-network-diagnostics": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-network-operator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-nutanix-infra": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-oauth-apiserver": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-openstack-infra": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-operator-lifecycle-manager": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-operators": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-ovirt-infra": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-ovn-kubernetes": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-service-ca": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-service-ca-operator": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-user-workload-monitoring": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers for ns/openshift-vsphere-infra": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] pathological event should not see excessive Back-off restarting failed containers in e2e namespaces": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] should not see excessive Back-off restarting failed containers": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle] should not see excessive Back-off restarting failed containers in e2e namespaces": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle][Feature:Machines] Managed cluster should [sig-scheduling][Early] control plane machine set operator should not cause an early rollout [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-cluster-lifecycle][Feature:Machines] Managed cluster should [sig-scheduling][Early] control plane machine set operator should not have any events [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-cluster-lifecycle][Feature:Machines] Managed cluster should have machine resources [apigroup:machine.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-cluster-lifecycle][Feature:Machines][Early] Managed cluster should have same number of Machines and Nodes [apigroup:machine.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-cluster-lifecycle][Feature:Machines][Serial] Managed cluster should grow and decrease when scaling different machineSets simultaneously [Timeout:30m][apigroup:machine.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 441 + }, + "[sig-cluster-lifecycle][OCPFeatureGate:ImageStreamImportMode] ClusterVersion API desired architecture should be valid when architecture is set in release payload metadata [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-cluster-lifecycle][OCPFeatureGate:VSphereHostVMGroupZonal][platform:vsphere] A Machine in a managed cluster associated with a vm-host group should have the correct topology labels [apigroup:machine.openshift.io][Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle][OCPFeatureGate:VSphereHostVMGroupZonal][platform:vsphere] A Machine in a managed cluster should be placed in the correct vm-host group [apigroup:machine.openshift.io][Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle][OCPFeatureGate:VSphereMultiDisk][platform:vsphere][Disruptive] Managed cluster should create machines with data disks [apigroup:machine.openshift.io][Serial][Suite:openshift/conformance/serial]": { + "average_duration": 107 + }, + "[sig-cluster-lifecycle][OCPFeatureGate:VSphereMultiDisk][platform:vsphere][Disruptive] Managed cluster should create machinesets with a data disk using each provisioning mode [apigroup:machine.openshift.io][Serial][Suite:openshift/conformance/serial]": { + "average_duration": 131 + }, + "[sig-cluster-lifecycle][OCPFeatureGate:VSphereMultiDisk][platform:vsphere][Disruptive] Managed cluster should create machinesets with eagerly zeroed data disk [apigroup:machine.openshift.io][Serial][Suite:openshift/conformance/serial]": { + "average_duration": 132 + }, + "[sig-cluster-lifecycle][OCPFeatureGate:VSphereMultiDisk][platform:vsphere][Disruptive] Managed cluster should create machinesets with thick data disk [apigroup:machine.openshift.io][Serial][Suite:openshift/conformance/serial]": { + "average_duration": 130 + }, + "[sig-cluster-lifecycle][OCPFeatureGate:VSphereMultiDisk][platform:vsphere][Disruptive] Managed cluster should create machinesets with thin data disk [apigroup:machine.openshift.io][Serial][Suite:openshift/conformance/serial]": { + "average_duration": 128 + }, + "[sig-cluster-lifecycle][OCPFeatureGate:VSphereMultiNetworks][platform:vsphere] Managed cluster should machine network should be correlated with node networking [apigroup:machine.openshift.io][Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle][OCPFeatureGate:VSphereMultiNetworks][platform:vsphere] Managed cluster should machines should have all specified portgroup associated with their failure domain [apigroup:machine.openshift.io][Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-cluster-lifecycle][OCPFeatureGate:VSphereMultiNetworks][platform:vsphere] Managed cluster should new machines should pass multi network tests [Serial][apigroup:machine.openshift.io][Suite:openshift/conformance/serial]": { + "average_duration": 185 + }, + "[sig-cluster-lifecycle][OCPFeatureGate:VSphereMultiNetworks][platform:vsphere] Managed cluster should node VMs should have all specified portgroups attached which are associated with their failure domain [apigroup:machine.openshift.io][Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-cluster-lifecycle][OCPFeatureGate:VSphereMultiNetworks][platform:vsphere] Managed cluster should node addresses should be correlated with the machine network [apigroup:machine.openshift.io][Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-coreos] [Conformance] CoreOS bootimages TestBootimagesPresent [apigroup:machineconfiguration.openshift.io] [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 1 + }, + "[sig-coreos] master nodes updated": { + "average_duration": 0 + }, + "[sig-devex] check registry.redhat.io is available and samples operator can import sample imagestreams run sample related validations [apigroup:config.openshift.io][apigroup:image.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 95 + }, + "[sig-devex] check registry.redhat.io is available and samples operator can import sample imagestreams run sample related validations [apigroup:config.openshift.io][apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 91 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/dotnet:6.0-ubi8\" should print the usage": { + "average_duration": 23 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/dotnet:9.0-ubi8\" should print the usage": { + "average_duration": 17 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/nginx:1.20-ubi7\" should print the usage": { + "average_duration": 35 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/nginx:1.20-ubi9\" should print the usage": { + "average_duration": 20 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/nginx:1.22-ubi8\" should print the usage": { + "average_duration": 20 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/nginx:1.22-ubi9\" should print the usage": { + "average_duration": 22 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/nginx:1.26-ubi10\" should print the usage": { + "average_duration": 12 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/nodejs:16-ubi8\" should print the usage": { + "average_duration": 10 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/nodejs:18-ubi8\" should print the usage": { + "average_duration": 35 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/nodejs:18-ubi9\" should print the usage": { + "average_duration": 25 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/nodejs:20-ubi8\" should print the usage": { + "average_duration": 18 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/nodejs:20-ubi9\" should print the usage": { + "average_duration": 28 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/nodejs:22-ubi10\" should print the usage": { + "average_duration": 26 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/perl:5.26-ubi8\" should print the usage": { + "average_duration": 21 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/perl:5.30-el7\" should print the usage": { + "average_duration": 19 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/perl:5.32-ubi8\" should print the usage": { + "average_duration": 47 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/perl:5.32-ubi9\" should print the usage": { + "average_duration": 15 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/perl:5.40-ubi10\" should print the usage": { + "average_duration": 26 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/php:7.3-ubi7\" should print the usage": { + "average_duration": 25 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/php:7.4-ubi8\" should print the usage": { + "average_duration": 18 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/php:8.0-ubi8\" should print the usage": { + "average_duration": 38 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/php:8.0-ubi9\" should print the usage": { + "average_duration": 24 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/php:8.1-ubi9\" should print the usage": { + "average_duration": 29 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/php:8.2-ubi9\" should print the usage": { + "average_duration": 15 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/php:8.3-ubi10\" should print the usage": { + "average_duration": 14 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/python:2.7-ubi8\" should print the usage": { + "average_duration": 44 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/python:3.11-ubi8\" should print the usage": { + "average_duration": 19 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/python:3.11-ubi9\" should print the usage": { + "average_duration": 19 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/python:3.6-ubi8\" should print the usage": { + "average_duration": 27 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/python:3.8-ubi7\" should print the usage": { + "average_duration": 14 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/python:3.8-ubi8\" should print the usage": { + "average_duration": 41 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/python:3.9-ubi8\" should print the usage": { + "average_duration": 26 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/python:3.9-ubi9\" should print the usage": { + "average_duration": 25 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/ruby:2.5-ubi8\" should print the usage": { + "average_duration": 25 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/ruby:3.0-ubi7\" should print the usage": { + "average_duration": 68 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/ruby:3.0-ubi8\" should print the usage": { + "average_duration": 29 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/ruby:3.0-ubi9\" should print the usage": { + "average_duration": 24 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/ruby:3.1-ubi8\" should print the usage": { + "average_duration": 23 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/ruby:3.1-ubi9\" should print the usage": { + "average_duration": 30 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/ruby:3.3-ubi10\" should print the usage": { + "average_duration": 15 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/ruby:3.3-ubi8\" should print the usage": { + "average_duration": 14 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image \"image-registry.openshift-image-registry.svc:5000/openshift/ruby:3.3-ubi9\" should print the usage": { + "average_duration": 11 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/dotnet:6.0-ubi8\" should be SCL enabled": { + "average_duration": 20 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/dotnet:9.0-ubi8\" should be SCL enabled": { + "average_duration": 29 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/nginx:1.20-ubi7\" should be SCL enabled": { + "average_duration": 37 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/nginx:1.20-ubi9\" should be SCL enabled": { + "average_duration": 25 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/nginx:1.22-ubi8\" should be SCL enabled": { + "average_duration": 23 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/nginx:1.22-ubi9\" should be SCL enabled": { + "average_duration": 21 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/nginx:1.26-ubi10\" should be SCL enabled": { + "average_duration": 25 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/nodejs:16-ubi8\" should be SCL enabled": { + "average_duration": 48 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/nodejs:18-ubi8\" should be SCL enabled": { + "average_duration": 26 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/nodejs:18-ubi9\" should be SCL enabled": { + "average_duration": 60 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/nodejs:20-ubi8\" should be SCL enabled": { + "average_duration": 33 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/nodejs:20-ubi9\" should be SCL enabled": { + "average_duration": 30 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/nodejs:22-ubi10\" should be SCL enabled": { + "average_duration": 31 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/perl:5.26-ubi8\" should be SCL enabled": { + "average_duration": 43 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/perl:5.30-el7\" should be SCL enabled": { + "average_duration": 47 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/perl:5.32-ubi8\" should be SCL enabled": { + "average_duration": 26 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/perl:5.32-ubi9\" should be SCL enabled": { + "average_duration": 28 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/perl:5.40-ubi10\" should be SCL enabled": { + "average_duration": 33 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/php:7.3-ubi7\" should be SCL enabled": { + "average_duration": 18 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/php:7.4-ubi8\" should be SCL enabled": { + "average_duration": 25 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/php:8.0-ubi8\" should be SCL enabled": { + "average_duration": 33 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/php:8.0-ubi9\" should be SCL enabled": { + "average_duration": 29 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/php:8.1-ubi9\" should be SCL enabled": { + "average_duration": 64 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/php:8.2-ubi9\" should be SCL enabled": { + "average_duration": 26 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/php:8.3-ubi10\" should be SCL enabled": { + "average_duration": 22 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/python:2.7-ubi8\" should be SCL enabled": { + "average_duration": 30 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/python:3.11-ubi8\" should be SCL enabled": { + "average_duration": 25 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/python:3.11-ubi9\" should be SCL enabled": { + "average_duration": 18 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/python:3.6-ubi8\" should be SCL enabled": { + "average_duration": 28 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/python:3.8-ubi7\" should be SCL enabled": { + "average_duration": 44 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/python:3.8-ubi8\" should be SCL enabled": { + "average_duration": 60 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/python:3.9-ubi8\" should be SCL enabled": { + "average_duration": 29 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/python:3.9-ubi9\" should be SCL enabled": { + "average_duration": 30 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/ruby:2.5-ubi8\" should be SCL enabled": { + "average_duration": 31 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/ruby:3.0-ubi7\" should be SCL enabled": { + "average_duration": 14 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/ruby:3.0-ubi8\" should be SCL enabled": { + "average_duration": 40 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/ruby:3.0-ubi9\" should be SCL enabled": { + "average_duration": 24 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/ruby:3.1-ubi8\" should be SCL enabled": { + "average_duration": 30 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/ruby:3.1-ubi9\" should be SCL enabled": { + "average_duration": 43 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/ruby:3.3-ubi10\" should be SCL enabled": { + "average_duration": 23 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/ruby:3.3-ubi8\" should be SCL enabled": { + "average_duration": 22 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled using the SCL in s2i images \"image-registry.openshift-image-registry.svc:5000/openshift/ruby:3.3-ubi9\" should be SCL enabled": { + "average_duration": 27 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift sample application repositories [sig-devex][Feature:ImageEcosystem][nodejs] test nodejs images with nodejs-rest-http-crud db repo Building nodejs-postgresql app from new-app should build a nodejs-postgresql image and run it in a pod [apigroup:build.openshift.io]": { + "average_duration": 226 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift sample application repositories [sig-devex][Feature:ImageEcosystem][php] test php images with cakephp-ex db repo Building cakephp-mysql app from new-app should build a cakephp-mysql image and run it in a pod [apigroup:build.openshift.io]": { + "average_duration": 224 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift sample application repositories [sig-devex][Feature:ImageEcosystem][python] test python images with django-ex db repo Building django-psql app from new-app should build a django-psql image and run it in a pod [apigroup:build.openshift.io]": { + "average_duration": 201 + }, + "[sig-devex][Feature:ImageEcosystem][Slow] openshift sample application repositories [sig-devex][Feature:ImageEcosystem][ruby] test ruby images with rails-ex db repo Building rails-postgresql app from new-app should build a rails-postgresql image and run it in a pod [apigroup:build.openshift.io]": { + "average_duration": 673 + }, + "[sig-devex][Feature:ImageEcosystem][perl][Slow] hot deploy for openshift perl image hot deploy test should work [apigroup:image.openshift.io][apigroup:operator.openshift.io][apigroup:config.openshift.io][apigroup:build.openshift.io]": { + "average_duration": 87 + }, + "[sig-devex][Feature:ImageEcosystem][perl][Slow] hot deploy for openshift perl image hot deploy test should work [apigroup:image.openshift.io][apigroup:operator.openshift.io][apigroup:config.openshift.io][apigroup:build.openshift.io][apigroup:apps.openshift.io]": { + "average_duration": 186 + }, + "[sig-devex][Feature:ImageEcosystem][php][Slow] hot deploy for openshift php image CakePHP example should work with hot deploy [apigroup:image.openshift.io][apigroup:operator.openshift.io][apigroup:config.openshift.io][apigroup:build.openshift.io]": { + "average_duration": 245 + }, + "[sig-devex][Feature:ImageEcosystem][python][Slow] hot deploy for openshift python image Django example should work with hot deploy [apigroup:image.openshift.io][apigroup:operator.openshift.io][apigroup:config.openshift.io][apigroup:build.openshift.io]": { + "average_duration": 6 + }, + "[sig-devex][Feature:ImageEcosystem][ruby][Slow] hot deploy for openshift ruby image Rails example should work with hot deploy [apigroup:image.openshift.io][apigroup:operator.openshift.io][apigroup:config.openshift.io][apigroup:build.openshift.io]": { + "average_duration": 709 + }, + "[sig-devex][Feature:OpenShiftControllerManager] TestAutomaticCreationOfPullSecrets [apigroup:config.openshift.io][apigroup:image.openshift.io] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-devex][Feature:OpenShiftControllerManager] TestAutomaticCreationOfPullSecrets [apigroup:config.openshift.io][apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-devex][Feature:OpenShiftControllerManager] TestDockercfgTokenDeletedController [apigroup:image.openshift.io] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-devex][Feature:OpenShiftControllerManager] TestDockercfgTokenDeletedController [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-devex][Feature:Templates] template-api TestTemplate [apigroup:template.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-devex][Feature:Templates] template-api TestTemplateTransformationFromConfig [apigroup:template.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-devex][Feature:Templates] templateinstance creation with invalid object reports error should report a failure on creation [apigroup:template.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-devex][Feature:Templates] templateinstance cross-namespace test should create and delete objects across namespaces [apigroup:user.openshift.io][apigroup:template.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 7 + }, + "[sig-devex][Feature:Templates] templateinstance impersonation tests [apigroup:user.openshift.io][apigroup:authorization.openshift.io] should pass impersonation creation tests [apigroup:template.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 15 + }, + "[sig-devex][Feature:Templates] templateinstance impersonation tests [apigroup:user.openshift.io][apigroup:authorization.openshift.io] should pass impersonation deletion tests [apigroup:template.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 15 + }, + "[sig-devex][Feature:Templates] templateinstance impersonation tests [apigroup:user.openshift.io][apigroup:authorization.openshift.io] should pass impersonation update tests [apigroup:template.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 18 + }, + "[sig-devex][Feature:Templates] templateinstance object kinds test should create and delete objects from varying API groups [apigroup:template.openshift.io][apigroup:route.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-devex][Feature:Templates] templateinstance readiness test should report failed soon after an annotated objects has failed [apigroup:template.openshift.io][apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 18 + }, + "[sig-devex][Feature:Templates] templateinstance readiness test should report failed soon after an annotated objects has failed [apigroup:template.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 13 + }, + "[sig-devex][Feature:Templates] templateinstance readiness test should report failed soon after an annotated objects has failed [apigroup:template.openshift.io][apigroup:build.openshift.io][apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 16 + }, + "[sig-devex][Feature:Templates] templateinstance readiness test should report ready soon after all annotated objects are ready [apigroup:template.openshift.io][apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 98 + }, + "[sig-devex][Feature:Templates] templateinstance readiness test should report ready soon after all annotated objects are ready [apigroup:template.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 54 + }, + "[sig-devex][Feature:Templates] templateinstance readiness test should report ready soon after all annotated objects are ready [apigroup:template.openshift.io][apigroup:build.openshift.io][apigroup:apps.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 97 + }, + "[sig-devex][Feature:Templates] templateinstance security tests [apigroup:authorization.openshift.io][apigroup:template.openshift.io] should pass security tests [apigroup:route.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 17 + }, + "[sig-etcd] ETCD Microshift MicroShiftOnly-Author:geliu-Medium-62738-[ETCD] Build Microshift prototype to launch etcd as an transient systemd unit": { + "average_duration": 17 + }, + "[sig-etcd] cluster should not be without a leader for too long": { + "average_duration": 0 + }, + "[sig-etcd] etcd cluster has the same number of master nodes and voting members from the endpoints configmap [Early][apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-etcd] etcd leader changes are not excessive [Late] [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-etcd] etcd leader changes are not excessive [Late][apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-etcd] etcd pod logs do not log dropped internal Raft messages": { + "average_duration": 0 + }, + "[sig-etcd] etcd pod logs do not log slow fdatasync": { + "average_duration": 0 + }, + "[sig-etcd] etcd record the start revision of the etcd-operator [Early] [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-etcd] etcd should not log excessive overloaded network messages": { + "average_duration": 0 + }, + "[sig-etcd] etcd should not log excessive took too long messages": { + "average_duration": 0 + }, + "[sig-etcd][Feature:CertRotation][Suite:openshift/etcd/certrotation] etcd can manually rotate metrics signer certificates [Timeout:45m]": { + "average_duration": 1794 + }, + "[sig-etcd][Feature:CertRotation][Suite:openshift/etcd/certrotation] etcd can manually rotate signer certificates [Timeout:30m]": { + "average_duration": 1800 + }, + "[sig-etcd][Feature:CertRotation][Suite:openshift/etcd/certrotation] etcd can recreate dynamic certificates [Timeout:30m]": { + "average_duration": 1474 + }, + "[sig-etcd][Feature:CertRotation][Suite:openshift/etcd/certrotation] etcd can recreate trust bundle [Timeout:15m]": { + "average_duration": 700 + }, + "[sig-etcd][Feature:EtcdVerticalScaling][Suite:openshift/etcd/scaling] etcd is able to vertically scale up and down with a single node [Timeout:60m][apigroup:machine.openshift.io]": { + "average_duration": 1899 + }, + "[sig-etcd][Feature:EtcdVerticalScaling][Suite:openshift/etcd/scaling][Serial] etcd is able to vertically scale up and down when CPMS is disabled [apigroup:machine.openshift.io]": { + "average_duration": 1604 + }, + "[sig-etcd][Feature:EtcdVerticalScaling][Suite:openshift/etcd/scaling][Serial] etcd is able to vertically scale up and down with a single node [Timeout:60m][apigroup:machine.openshift.io]": { + "average_duration": 1604 + }, + "[sig-etcd][OCPFeatureGate:HardwareSpeed][Serial] etcd is able to set the hardware speed to \"\" [Timeout:30m][apigroup:machine.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 255 + }, + "[sig-etcd][OCPFeatureGate:HardwareSpeed][Serial] etcd is able to set the hardware speed to Slower [Timeout:30m][apigroup:machine.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 836 + }, + "[sig-etcd][OCPFeatureGate:HardwareSpeed][Serial] etcd is able to set the hardware speed to Standard [Timeout:30m][apigroup:machine.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 322 + }, + "[sig-etcd][apigroup:config.openshift.io] Ensure etcd health and quorum in HighlyAvailableArbiterMode should have all etcd pods running and quorum met [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-etcd][apigroup:config.openshift.io][OCPFeatureGate:DualReplica] Two Node with Fencing should have etcd pods and containers configured correctly [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-etcd][apigroup:config.openshift.io][OCPFeatureGate:DualReplica] Two Node with Fencing should have podman etcd containers running on each node [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-etcd][apigroup:config.openshift.io][OCPFeatureGate:DualReplica][Suite:openshift/two-node] Two Node with Fencing pods and podman containers Should validate the number of etcd pods and containers as configured": { + "average_duration": 1 + }, + "[sig-etcd][apigroup:config.openshift.io][OCPFeatureGate:DualReplica][Suite:openshift/two-node] Two Node with Fencing pods and podman containers Should verify the number of podman-etcd containers as configured": { + "average_duration": 27 + }, + "[sig-etcd][apigroup:config.openshift.io][OCPFeatureGate:DualReplica][Suite:openshift/two-node][Disruptive] Two Node with Fencing etcd recovery Should recover from graceful node shutdown with etcd member re-addition [Serial]": { + "average_duration": 328 + }, + "[sig-etcd][apigroup:config.openshift.io][OCPFeatureGate:DualReplica][Suite:openshift/two-node][Disruptive] Two Node with Fencing etcd recovery Should recover from ungraceful node shutdown with etcd member re-addition [Serial]": { + "average_duration": 249 + }, + "[sig-etcd][apigroup:config.openshift.io][OCPFeatureGate:DualReplica][Suite:openshift/two-node][Disruptive] Two Node with Fencing etcd recovery should recover from a double node failure (cold-boot) [Serial]": { + "average_duration": 0 + }, + "[sig-etcd][apigroup:config.openshift.io][OCPFeatureGate:DualReplica][Suite:openshift/two-node][Disruptive] Two Node with Fencing etcd recovery should recover from a double node failure [Serial]": { + "average_duration": 101 + }, + "[sig-etcd][apigroup:config.openshift.io][OCPFeatureGate:DualReplica][Suite:openshift/two-node][Disruptive] Two Node with Fencing etcd recovery should recover from double graceful node shutdown (cold-boot) [Serial]": { + "average_duration": 1922 + }, + "[sig-etcd][apigroup:config.openshift.io][OCPFeatureGate:DualReplica][Suite:openshift/two-node][Disruptive] Two Node with Fencing etcd recovery should recover from graceful node shutdown with etcd member re-addition [Serial]": { + "average_duration": 135 + }, + "[sig-etcd][apigroup:config.openshift.io][OCPFeatureGate:DualReplica][Suite:openshift/two-node][Disruptive] Two Node with Fencing etcd recovery should recover from graceful shutdown followed by ungraceful node failure (cold-boot) [Serial]": { + "average_duration": 0 + }, + "[sig-etcd][apigroup:config.openshift.io][OCPFeatureGate:DualReplica][Suite:openshift/two-node][Disruptive] Two Node with Fencing etcd recovery should recover from network disruption with etcd member re-addition [Serial]": { + "average_duration": 192 + }, + "[sig-etcd][apigroup:config.openshift.io][OCPFeatureGate:DualReplica][Suite:openshift/two-node][Disruptive] Two Node with Fencing etcd recovery should recover from sequential graceful node shutdowns (cold-boot) [Serial]": { + "average_duration": 0 + }, + "[sig-etcd][apigroup:config.openshift.io][OCPFeatureGate:DualReplica][Suite:openshift/two-node][Disruptive] Two Node with Fencing etcd recovery should recover from ungraceful node shutdown with etcd member re-addition [Serial]": { + "average_duration": 131 + }, + "[sig-etcd][apigroup:config.openshift.io][OCPFeatureGate:DualReplica][Suite:openshift/two-node][Slow][Serial][Disruptive][Requires:HypervisorSSHConfig] TNF should recover from an in-place node replacement": { + "average_duration": 999 + }, + "[sig-etcd][apigroup:config.openshift.io][OCPFeatureGate:HighlyAvailableArbiter] Ensure etcd health and quorum in HighlyAvailableArbiterMode should have all etcd pods running and quorum met [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-etcd][apigroup:config.openshift.io][OCPFeatureGate:HighlyAvailableArbiter][Suite:openshift/two-node][Disruptive] One master node outage is handled seamlessly should maintain etcd quorum and workloads with one master node down [Serial]": { + "average_duration": 1 + }, + "[sig-etcd][apigroup:config.openshift.io][OCPFeatureGate:HighlyAvailableArbiter][Suite:openshift/two-node][Disruptive] Recovery when arbiter node is down and master nodes restart should regain quorum after arbiter down and master nodes restart [Serial]": { + "average_duration": 855 + }, + "[sig-imagepolicy][OCPFeatureGate:SigstoreImageVerificationPKI][Serial] clusterimagepolicy signature validation tests fail with PKI email does not match [Suite:openshift/conformance/serial]": { + "average_duration": 251 + }, + "[sig-imagepolicy][OCPFeatureGate:SigstoreImageVerificationPKI][Serial] clusterimagepolicy signature validation tests fail with PKI root of trust does not match the identity in the signature [Suite:openshift/conformance/serial]": { + "average_duration": 250 + }, + "[sig-imagepolicy][OCPFeatureGate:SigstoreImageVerificationPKI][Serial] clusterimagepolicy signature validation tests pass with valid PKI [Suite:openshift/conformance/serial]": { + "average_duration": 252 + }, + "[sig-imagepolicy][OCPFeatureGate:SigstoreImageVerificationPKI][Serial] imagepolicy signature validation tests fail with PKI root of trust does not match the identity in the signature [Suite:openshift/conformance/serial]": { + "average_duration": 250 + }, + "[sig-imagepolicy][OCPFeatureGate:SigstoreImageVerificationPKI][Serial] imagepolicy signature validation tests pass with valid PKI [Suite:openshift/conformance/serial]": { + "average_duration": 251 + }, + "[sig-imagepolicy][OCPFeatureGate:SigstoreImageVerification][Serial] Should fail clusterimagepolicy signature validation root of trust does not match the identity in the signature [Suite:openshift/conformance/serial]": { + "average_duration": 84 + }, + "[sig-imagepolicy][OCPFeatureGate:SigstoreImageVerification][Serial] Should fail clusterimagepolicy signature validation when scope in allowedRegistries list does not skip signature verification [Suite:openshift/conformance/serial]": { + "average_duration": 165 + }, + "[sig-imagepolicy][OCPFeatureGate:SigstoreImageVerification][Serial] Should fail imagepolicy signature validation in different namespaces root of trust does not match the identity in the signature [Suite:openshift/conformance/serial]": { + "average_duration": 84 + }, + "[sig-imagepolicy][OCPFeatureGate:SigstoreImageVerification][Serial] Should pass clusterimagepolicy signature validation with signed image [Suite:openshift/conformance/serial]": { + "average_duration": 84 + }, + "[sig-imagepolicy][OCPFeatureGate:SigstoreImageVerification][Serial] Should pass imagepolicy signature validation with signed image in namespaces [Suite:openshift/conformance/serial]": { + "average_duration": 84 + }, + "[sig-imageregistry] Image --dry-run should not delete resources [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-imageregistry] Image --dry-run should not update resources [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-imageregistry] Image registry [apigroup:route.openshift.io] should redirect on blob pull [apigroup:image.openshift.io] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel]": { + "average_duration": 35 + }, + "[sig-imageregistry] Image registry [apigroup:route.openshift.io] should redirect on blob pull [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 32 + }, + "[sig-imageregistry] Image registry remains available using new connections": { + "average_duration": 0 + }, + "[sig-imageregistry] Image registry remains available using reused connections": { + "average_duration": 0 + }, + "[sig-imageregistry] disruption/image-registry connection/new should be available throughout the test": { + "average_duration": 0 + }, + "[sig-imageregistry] disruption/image-registry connection/reused should be available throughout the test": { + "average_duration": 0 + }, + "[sig-imageregistry][Feature:ImageAppend] Image append should create images by appending them [apigroup:image.openshift.io] [Skipped:Disconnected] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel]": { + "average_duration": 32 + }, + "[sig-imageregistry][Feature:ImageAppend] Image append should create images by appending them [apigroup:image.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 31 + }, + "[sig-imageregistry][Feature:ImageAppend] Image append should create images by appending them [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 22 + }, + "[sig-imageregistry][Feature:ImageExtract] Image extract should extract content from an image [apigroup:image.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 83 + }, + "[sig-imageregistry][Feature:ImageExtract] Image extract should extract content from an image [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 66 + }, + "[sig-imageregistry][Feature:ImageInfo] Image info should display information about images [apigroup:image.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 17 + }, + "[sig-imageregistry][Feature:ImageInfo] Image info should display information about images [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 11 + }, + "[sig-imageregistry][Feature:ImageLayers] Image layer subresource should identify a deleted image as missing [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-imageregistry][Feature:ImageLayers] Image layer subresource should return layers from tagged images [apigroup:image.openshift.io][apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 98 + }, + "[sig-imageregistry][Feature:ImageLayers] Image layer subresource should return layers from tagged images [apigroup:image.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 58 + }, + "[sig-imageregistry][Feature:ImageLookup] Image policy should perform lookup when the Deployment gets the resolve-names annotation later [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-imageregistry][Feature:ImageLookup] Image policy should perform lookup when the object has the resolve-names annotation [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 10 + }, + "[sig-imageregistry][Feature:ImageLookup] Image policy should update OpenShift object image fields when local names are on [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-imageregistry][Feature:ImageLookup] Image policy should update OpenShift object image fields when local names are on [apigroup:image.openshift.io][apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 8 + }, + "[sig-imageregistry][Feature:ImageLookup] Image policy should update standard Kube object image fields when local names are on [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-imageregistry][Feature:ImageLookup] Image policy should update standard Kube object image fields when local names are on [apigroup:image.openshift.io][apigroup:apps.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 10 + }, + "[sig-imageregistry][Feature:ImageTriggers] Annotation trigger reconciles after the image is overwritten [apigroup:image.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 7 + }, + "[sig-imageregistry][Feature:ImageTriggers] Annotation trigger reconciles after the image is overwritten [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-imageregistry][Feature:ImageTriggers] Image change build triggers TestMultipleImageChangeBuildTriggers [apigroup:image.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-imageregistry][Feature:ImageTriggers] Image change build triggers TestSimpleImageChangeBuildTriggerFromImageStreamTagCustom [apigroup:image.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-imageregistry][Feature:ImageTriggers] Image change build triggers TestSimpleImageChangeBuildTriggerFromImageStreamTagCustomWithConfigChange [apigroup:image.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-imageregistry][Feature:ImageTriggers] Image change build triggers TestSimpleImageChangeBuildTriggerFromImageStreamTagDocker [apigroup:image.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-imageregistry][Feature:ImageTriggers] Image change build triggers TestSimpleImageChangeBuildTriggerFromImageStreamTagDockerWithConfigChange [apigroup:image.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-imageregistry][Feature:ImageTriggers] Image change build triggers TestSimpleImageChangeBuildTriggerFromImageStreamTagSTI [apigroup:image.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-imageregistry][Feature:ImageTriggers] Image change build triggers TestSimpleImageChangeBuildTriggerFromImageStreamTagSTIWithConfigChange [apigroup:image.openshift.io][apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-imageregistry][Feature:ImageTriggers][Serial] ImageStream API TestImageStreamMappingCreate [apigroup:image.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 4 + }, + "[sig-imageregistry][Feature:ImageTriggers][Serial] ImageStream API TestImageStreamTagLifecycleHook [apigroup:image.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-imageregistry][Feature:ImageTriggers][Serial] ImageStream API TestImageStreamWithoutDockerImageConfig [apigroup:image.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-imageregistry][Feature:ImageTriggers][Serial] ImageStream admission TestImageStreamAdmitSpecUpdate [apigroup:image.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 18 + }, + "[sig-imageregistry][Feature:ImageTriggers][Serial] ImageStream admission TestImageStreamAdmitStatusUpdate [apigroup:image.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 13 + }, + "[sig-imageregistry][Feature:ImageTriggers][Serial] ImageStream admission TestImageStreamTagsAdmission [apigroup:image.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 19 + }, + "[sig-imageregistry][Feature:Image] oc tag should change image reference for internal images [apigroup:build.openshift.io][apigroup:image.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 99 + }, + "[sig-imageregistry][Feature:Image] oc tag should change image reference for internal images [apigroup:build.openshift.io][apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 62 + }, + "[sig-imageregistry][Feature:Image] oc tag should preserve image reference for external images [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-imageregistry][Feature:Image] oc tag should work when only imagestreams api is available [apigroup:image.openshift.io][apigroup:authorization.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 7 + }, + "[sig-imageregistry][Feature:Image] oc tag should work when only imagestreams api is available [apigroup:image.openshift.io][apigroup:authorization.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-imageregistry][Feature:Image] signature TestImageAddSignature [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-imageregistry][Feature:Image] signature TestImageRemoveSignature [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-imageregistry][OCPFeatureGate:ChunkSizeMiB][Serial][apigroup:imageregistry.operator.openshift.io] Image Registry Config ChunkSizeMiB should not accept invalid ChunkSizeMiB value [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-imageregistry][OCPFeatureGate:ChunkSizeMiB][Serial][apigroup:imageregistry.operator.openshift.io] Image Registry Config ChunkSizeMiB should reject ChunkSizeMiB value greater than 5 GiB [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-imageregistry][OCPFeatureGate:ChunkSizeMiB][Serial][apigroup:imageregistry.operator.openshift.io] Image Registry Config ChunkSizeMiB should set ChunkSizeMiB value [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-imageregistry][OCPFeatureGate:ChunkSizeMiB][Serial][apigroup:imageregistry.operator.openshift.io] Image Registry Config ChunkSizeMiB should set maximum valid ChunkSizeMiB value [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-imageregistry][OCPFeatureGate:ChunkSizeMiB][Serial][apigroup:imageregistry.operator.openshift.io] Image Registry Config ChunkSizeMiB should set minimum valid ChunkSizeMiB value [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-imageregistry][OCPFeatureGate:ImageStreamImportMode][Serial] ImageStream API import mode should be Legacy if the import mode specified in image.config.openshift.io config is Legacy [apigroup:image.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 89 + }, + "[sig-imageregistry][OCPFeatureGate:ImageStreamImportMode][Serial] ImageStream API import mode should be PreserveOriginal if the import mode specified in image.config.openshift.io config is PreserveOriginal [apigroup:image.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 540 + }, + "[sig-imageregistry][OCPFeatureGate:ImageStreamImportMode][Serial] ImageStream API import mode should be PreserveOriginal or Legacy depending on desired.architecture field in the CV [apigroup:image.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 2 + }, + "[sig-imageregistry][Serial] Image signature workflow can push a signed image to openshift registry and verify it [apigroup:user.openshift.io][apigroup:image.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/serial]": { + "average_duration": 56 + }, + "[sig-imageregistry][Serial] Image signature workflow can push a signed image to openshift registry and verify it [apigroup:user.openshift.io][apigroup:image.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 49 + }, + "[sig-imageregistry][Suite:openshift/test-image-stream-import-mode][OCPFeatureGate:ImageStreamImportMode][Serial][Disruptive] ImageStream API import mode should be Legacy if the import mode specified in image.config.openshift.io config is Legacy [apigroup:image.openshift.io]": { + "average_duration": 3 + }, + "[sig-imageregistry][Suite:openshift/test-image-stream-import-mode][OCPFeatureGate:ImageStreamImportMode][Serial][Disruptive] ImageStream API import mode should be PreserveOriginal if the import mode specified in image.config.openshift.io config is PreserveOriginal [apigroup:image.openshift.io]": { + "average_duration": 648 + }, + "[sig-installer][Feature:baremetal] Baremetal platform should [apigroup:config.openshift.io] have baremetalhost resources [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-installer][Feature:baremetal] Baremetal platform should [apigroup:config.openshift.io] have hostfirmwaresetting resources [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-installer][Feature:baremetal] Baremetal platform should [apigroup:config.openshift.io] have preprovisioning images for workers [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-installer][Feature:baremetal] Baremetal platform should [apigroup:config.openshift.io] not allow updating BootMacAddress [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-installer][Feature:baremetal] Baremetal platform should have baremetalhost resources [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-installer][Feature:baremetal] Baremetal platform should have hostfirmwaresetting resources [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-installer][Feature:baremetal] Baremetal platform should have preprovisioning images for workers [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-installer][Feature:baremetal] Baremetal platform should not allow updating BootMacAddress [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-installer][Feature:baremetal] Baremetal/OpenStack/vSphere/None platforms [apigroup:config.openshift.io] have a metal3 deployment [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-installer][Feature:baremetal] Baremetal/OpenStack/vSphere/None/AWS/Azure/GCP platforms have a metal3 deployment [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-installer][Feature:baremetal][Serial] Baremetal platform should [apigroup:config.openshift.io] skip inspection when disabled by annotation [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-installer][Feature:baremetal][Serial] Baremetal platform should ensure [apigroup:config.openshift.io] cluster baremetal operator and metal3 deployment return back healthy after they are deleted [Suite:openshift/conformance/serial]": { + "average_duration": 35 + }, + "[sig-installer][Feature:baremetal][Serial] Baremetal platform should skip inspection when disabled by annotation [Suite:openshift/conformance/serial]": { + "average_duration": 10 + }, + "[sig-installer][Suite:openshift/openstack] Bugfix bz_2022627: Machine should report all openstack instance addresses": { + "average_duration": 6 + }, + "[sig-installer][Suite:openshift/openstack] Bugfix bz_2073398: [Serial] MachineSet scale-in does not leak OpenStack ports": { + "average_duration": 13 + }, + "[sig-installer][Suite:openshift/openstack] Bugfix ocpbug_1765: [Serial] noAllowedAddressPairs on one port should not affect other ports": { + "average_duration": 84 + }, + "[sig-installer][Suite:openshift/openstack] Check shift-on-stack correlated metric in RHOSO prometheus": { + "average_duration": 7 + }, + "[sig-installer][Suite:openshift/openstack] Check shift-on-stack kube_node_info metric in RHOSO prometheus": { + "average_duration": 7 + }, + "[sig-installer][Suite:openshift/openstack] Check shift-on-stack kube_persistentvolume_info metric in RHOSO prometheus": { + "average_duration": 7 + }, + "[sig-installer][Suite:openshift/openstack] ControlPlane MachineSet ProviderSpec template is correctly applied to Machines": { + "average_duration": 3 + }, + "[sig-installer][Suite:openshift/openstack] ControlPlane MachineSet has role master": { + "average_duration": 3 + }, + "[sig-installer][Suite:openshift/openstack] ControlPlane MachineSet replica number corresponds to the number of Machines": { + "average_duration": 3 + }, + "[sig-installer][Suite:openshift/openstack] Machine ProviderSpec is correctly applied to OpenStack instances": { + "average_duration": 8 + }, + "[sig-installer][Suite:openshift/openstack] Machine are in phase Running": { + "average_duration": 4 + }, + "[sig-installer][Suite:openshift/openstack] MachineSet ProviderSpec template is correctly applied to Machines": { + "average_duration": 3 + }, + "[sig-installer][Suite:openshift/openstack] MachineSet replica number corresponds to the number of Machines": { + "average_duration": 3 + }, + "[sig-installer][Suite:openshift/openstack] The OpenShift cluster enables topology aware scheduling when compute and volume AZs are identical": { + "average_duration": 8 + }, + "[sig-installer][Suite:openshift/openstack] The OpenShift cluster runs with etcd on ephemeral local block device": { + "average_duration": 5 + }, + "[sig-installer][Suite:openshift/openstack] The OpenShift cluster should allow the manual setting of enable_topology to false [Serial]": { + "average_duration": 204 + }, + "[sig-installer][Suite:openshift/openstack] The OpenStack platform after deletion of a machineset should not have leftovers ports": { + "average_duration": 3 + }, + "[sig-installer][Suite:openshift/openstack] The OpenStack platform creates Control plane nodes in a server group": { + "average_duration": 21 + }, + "[sig-installer][Suite:openshift/openstack] The OpenStack platform creates Control plane nodes on separate hosts when serverGroupPolicy is anti-affinity": { + "average_duration": 6 + }, + "[sig-installer][Suite:openshift/openstack] The OpenStack platform creates Worker nodes in a server group": { + "average_duration": 21 + }, + "[sig-installer][Suite:openshift/openstack] The OpenStack platform creates Worker nodes on separate hosts when serverGroupPolicy is anti-affinity": { + "average_duration": 6 + }, + "[sig-installer][Suite:openshift/openstack] The OpenStack platform on instance creation should follow machineset specs": { + "average_duration": 4 + }, + "[sig-installer][Suite:openshift/openstack] The OpenStack platform on instance creation should report all openstack instance addresses on the corresponding Machine object": { + "average_duration": 5 + }, + "[sig-installer][Suite:openshift/openstack] The OpenStack platform on volume creation should create a cinder volume when using cinder default storage class": { + "average_duration": 53 + }, + "[sig-installer][Suite:openshift/openstack] The OpenStack platform on volume creation should create a manila share when using manila storage class": { + "average_duration": 11 + }, + "[sig-installer][Suite:openshift/openstack] The OpenStack platform on volume creation should follow PVC specs during resizing for prometheus": { + "average_duration": 87 + }, + "[sig-installer][Suite:openshift/openstack] The Openshift on cloud provider configuration should haul the user config to the expected config maps": { + "average_duration": 3 + }, + "[sig-installer][Suite:openshift/openstack] The Openshift on cloud provider configuration should set enabled property in [LoadBalancer] section in CCM depending on the NetworkType": { + "average_duration": 4 + }, + "[sig-installer][Suite:openshift/openstack] The Openshift on cloud provider configuration should set use-octavia and enabled properties in CCM depending on the NetworkType": { + "average_duration": 0 + }, + "[sig-installer][Suite:openshift/openstack] The Openshift on cloud provider configuration should store cloud credentials on secrets": { + "average_duration": 4 + }, + "[sig-installer][Suite:openshift/openstack][Kuryr] Kuryr should create a subnet for a namespace only when a pod without hostNetwork is created in the namespace": { + "average_duration": 3 + }, + "[sig-installer][Suite:openshift/openstack][egressip] An egressIP attached to a floating IP should be kept after EgressIP node failover with OVN-Kubernetes NetworkType": { + "average_duration": 17 + }, + "[sig-installer][Suite:openshift/openstack][egressip] An egressIP with IPv6 format should be created on dualstack cluster with OVN-Kubernetes NetworkType and dhcpv6-stateful mode": { + "average_duration": 4 + }, + "[sig-installer][Suite:openshift/openstack][egressip] An egressIP with IPv6 format should be created on dualstack or ssipv6 cluster with OVN-Kubernetes NetworkType and dhcpv6-stateful mode": { + "average_duration": 8 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should apply lb-method on TCP Amphora LoadBalancer when a TCP svc with monitors and ETP:Local is created on Openshift": { + "average_duration": 109 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should apply lb-method on TCP OVN LoadBalancer when a TCP svc with monitors and ETP:Local is created on Openshift": { + "average_duration": 3 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should apply lb-method on UDP Amphora LoadBalancer when a UDP svc with monitors and ETP:Local is created on Openshift": { + "average_duration": 103 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should apply lb-method on UDP Amphora LoadBalancer when an UDP svc with monitors and ETP:Local is created on Openshift": { + "average_duration": 123 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should apply lb-method on UDP OVN LoadBalancer when a UDP svc with monitors and ETP:Local is created on Openshift": { + "average_duration": 3 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should apply lb-method on UDP OVN LoadBalancer when an UDP svc with monitors and ETP:Local is created on Openshift": { + "average_duration": 3 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should create a TCP Amphora LoadBalancer when LoadBalancerService ingressController is created on Openshift": { + "average_duration": 86 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should create a TCP Amphora LoadBalancer when a TCP svc with type:LoadBalancer and IP family policy PreferDualStack and IP families [IPv4 IPv6] is created on Openshift": { + "average_duration": 2 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should create a TCP Amphora LoadBalancer when a TCP svc with type:LoadBalancer and IP family policy PreferDualStack and IP families [IPv6 IPv4] is created on Openshift": { + "average_duration": 2 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should create a TCP Amphora LoadBalancer when a TCP svc with type:LoadBalancer is created on Openshift": { + "average_duration": 113 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should create a TCP OVN LoadBalancer when LoadBalancerService ingressController is created on Openshift": { + "average_duration": 3 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should create a TCP OVN LoadBalancer when a TCP svc with type:LoadBalancer and IP family policy PreferDualStack and IP families [IPv4 IPv6] is created on Openshift": { + "average_duration": 2 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should create a TCP OVN LoadBalancer when a TCP svc with type:LoadBalancer and IP family policy PreferDualStack and IP families [IPv6 IPv4] is created on Openshift": { + "average_duration": 2 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should create a TCP OVN LoadBalancer when a TCP svc with type:LoadBalancer is created on Openshift": { + "average_duration": 3 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should create a UDP Amphora LoadBalancer when a UDP svc with type:LoadBalancer is created on Openshift": { + "average_duration": 93 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should create a UDP OVN LoadBalancer when a UDP svc with type:LoadBalancer is created on Openshift": { + "average_duration": 3 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should create an UDP Amphora LoadBalancer using a pre-created FIP when an UDP LoadBalancer svc setting the LoadBalancerIP spec is created on Openshift": { + "average_duration": 80 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should create an UDP Amphora LoadBalancer when an UDP svc with type:LoadBalancer is created on Openshift": { + "average_duration": 117 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should create an UDP OVN LoadBalancer using a pre-created FIP when an UDP LoadBalancer svc setting the LoadBalancerIP spec is created on Openshift": { + "average_duration": 3 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should create an UDP OVN LoadBalancer when an UDP svc with type:LoadBalancer is created on Openshift": { + "average_duration": 3 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should limit service access on an UDP Amphora LoadBalancer when an UDP LoadBalancer svc setting the loadBalancerSourceRanges spec is created on Openshift": { + "average_duration": 122 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should limit service access on an UDP OVN LoadBalancer when an UDP LoadBalancer svc setting the loadBalancerSourceRanges spec is created on Openshift": { + "average_duration": 3 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should not re-use an existing UDP Amphora LoadBalancer if shared internal svc is created": { + "average_duration": 3 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should not re-use an existing UDP OVN LoadBalancer if shared internal svc is created": { + "average_duration": 3 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should re-use an existing UDP Amphora LoadBalancer when new svc is created on Openshift with the proper annotation": { + "average_duration": 9 + }, + "[sig-installer][Suite:openshift/openstack][lb][Serial] The Openstack platform should re-use an existing UDP OVN LoadBalancer when new svc is created on Openshift with the proper annotation": { + "average_duration": 3 + }, + "[sig-instrumentation] Events API should delete a collection of events [Conformance]": { + "average_duration": 1 + }, + "[sig-instrumentation] Events API should delete a collection of events [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-instrumentation] Events API should ensure that an event can be fetched, patched, deleted, and listed [Conformance]": { + "average_duration": 2 + }, + "[sig-instrumentation] Events API should ensure that an event can be fetched, patched, deleted, and listed [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-instrumentation] Events should delete a collection of events [Conformance]": { + "average_duration": 1 + }, + "[sig-instrumentation] Events should delete a collection of events [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-instrumentation] Events should manage the lifecycle of an event [Conformance]": { + "average_duration": 2 + }, + "[sig-instrumentation] Events should manage the lifecycle of an event [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-instrumentation] Metrics should grab all metrics from kubelet /metrics/resource endpoint": { + "average_duration": 2 + }, + "[sig-instrumentation] Metrics should grab all metrics from kubelet /metrics/resource endpoint [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-instrumentation] MetricsGrabber should grab all metrics slis from API server.": { + "average_duration": 1 + }, + "[sig-instrumentation] MetricsGrabber should grab all metrics slis from API server. [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-instrumentation] Monitoring statefulsets are not recreated after upgrade": { + "average_duration": 0 + }, + "[sig-instrumentation] Prometheus [apigroup:image.openshift.io] when installed on the cluster should have a AlertmanagerReceiversNotConfigured alert in firing state [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-instrumentation] Prometheus [apigroup:image.openshift.io] when installed on the cluster should have a AlertmanagerReceiversNotConfigured alert in firing state [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-instrumentation] Prometheus [apigroup:image.openshift.io] when installed on the cluster should have important platform topology metrics [apigroup:config.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-instrumentation] Prometheus [apigroup:image.openshift.io] when installed on the cluster should have important platform topology metrics [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-instrumentation] Prometheus [apigroup:image.openshift.io] when installed on the cluster should have non-Pod host cAdvisor metrics [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-instrumentation] Prometheus [apigroup:image.openshift.io] when installed on the cluster should have non-Pod host cAdvisor metrics [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-instrumentation] Prometheus [apigroup:image.openshift.io] when installed on the cluster should provide ingress metrics [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-instrumentation] Prometheus [apigroup:image.openshift.io] when installed on the cluster should provide ingress metrics [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-instrumentation] Prometheus [apigroup:image.openshift.io] when installed on the cluster should provide named network metrics [apigroup:project.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 76 + }, + "[sig-instrumentation] Prometheus [apigroup:image.openshift.io] when installed on the cluster should provide named network metrics [apigroup:project.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 68 + }, + "[sig-instrumentation] Prometheus [apigroup:image.openshift.io] when installed on the cluster should report telemetry [Late] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 7 + }, + "[sig-instrumentation] Prometheus [apigroup:image.openshift.io] when installed on the cluster should report telemetry [Serial] [Late] [Skipped:Disconnected] [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-instrumentation] Prometheus [apigroup:image.openshift.io] when installed on the cluster should report telemetry [Serial] [Late] [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-instrumentation] Prometheus [apigroup:image.openshift.io] when installed on the cluster should start and expose a secured proxy and unsecured metrics [apigroup:config.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 17 + }, + "[sig-instrumentation] Prometheus [apigroup:image.openshift.io] when installed on the cluster should start and expose a secured proxy and unsecured metrics [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 12 + }, + "[sig-instrumentation] Prometheus [apigroup:image.openshift.io] when installed on the cluster shouldn't have failing rules evaluation [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-instrumentation] Prometheus [apigroup:image.openshift.io] when installed on the cluster shouldn't have failing rules evaluation [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-instrumentation] Prometheus [apigroup:image.openshift.io] when installed on the cluster shouldn't report any alerts in firing state apart from Watchdog and AlertmanagerReceiversNotConfigured [Early][apigroup:config.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 7 + }, + "[sig-instrumentation] Prometheus [apigroup:image.openshift.io] when installed on the cluster shouldn't report any alerts in firing state apart from Watchdog and AlertmanagerReceiversNotConfigured [Early][apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-instrumentation] Prometheus [apigroup:image.openshift.io] when installed on the cluster when using openshift-sdn should be able to get the sdn ovs flows [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-instrumentation] disruption/metrics-api connection/new should be available throughout the test": { + "average_duration": 0 + }, + "[sig-instrumentation] disruption/metrics-api connection/reused should be available throughout the test": { + "average_duration": 0 + }, + "[sig-instrumentation][Late] Alerts shouldn't exceed the 650 series limit of total series sent via telemetry from each cluster [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-instrumentation][Late] Alerts shouldn't exceed the series limit of total series sent via telemetry from each cluster [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-instrumentation][Late] Alerts shouldn't report any unexpected alerts in firing or pending state [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-instrumentation][Late] Alerts shouldn't report any unexpected alerts in firing or pending state [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-instrumentation][Late] OpenShift alerting rules [apigroup:image.openshift.io] should have a runbook_url annotation if the alert is critical [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-instrumentation][Late] OpenShift alerting rules [apigroup:image.openshift.io] should have a runbook_url annotation if the alert is critical [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-instrumentation][Late] OpenShift alerting rules [apigroup:image.openshift.io] should have a valid severity label [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-instrumentation][Late] OpenShift alerting rules [apigroup:image.openshift.io] should have a valid severity label [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-instrumentation][Late] OpenShift alerting rules [apigroup:image.openshift.io] should have description and summary annotations [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-instrumentation][Late] OpenShift alerting rules [apigroup:image.openshift.io] should have description and summary annotations [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-instrumentation][Late] OpenShift alerting rules [apigroup:image.openshift.io] should link to a valid URL if the runbook_url annotation is defined [Suite:openshift/conformance/parallel]": { + "average_duration": 19 + }, + "[sig-instrumentation][Late] OpenShift alerting rules [apigroup:image.openshift.io] should link to an HTTP(S) location if the runbook_url annotation is defined [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-instrumentation][Late] Platform Prometheus targets should not be accessible without auth [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 299 + }, + "[sig-instrumentation][OCPFeatureGate:MetricsCollectionProfiles][Serial] The collection profiles feature-set in a heterogeneous environment, should expose information about the applied collection profile using meta-metrics [Suite:openshift/conformance/serial]": { + "average_duration": 18 + }, + "[sig-instrumentation][OCPFeatureGate:MetricsCollectionProfiles][Serial] The collection profiles feature-set in a heterogeneous environment, should have at least one implementation for each collection profile [Suite:openshift/conformance/serial]": { + "average_duration": 1 + }, + "[sig-instrumentation][OCPFeatureGate:MetricsCollectionProfiles][Serial] The collection profiles feature-set in a heterogeneous environment, should revert to default collection profile when an empty collection profile value is specified [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-instrumentation][OCPFeatureGate:MetricsCollectionProfiles][Serial] The collection profiles feature-set in a homogeneous minimal environment, should hide default metrics [Suite:openshift/conformance/serial]": { + "average_duration": 66 + }, + "[sig-instrumentation][OCPFeatureGate:MetricsCollectionProfiles][Serial] The collection profiles feature-set initially, in a homogeneous default environment, should expose default metrics [Suite:openshift/conformance/serial]": { + "average_duration": 2 + }, + "[sig-instrumentation][sig-builds][Feature:Builds] Prometheus when installed on the cluster should start and expose a secured proxy and verify build metrics [apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 85 + }, + "[sig-instrumentation][sig-builds][Feature:Builds] Prometheus when installed on the cluster should start and expose a secured proxy and verify build metrics [apigroup:build.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 73 + }, + "[sig-instrumentation][sig-builds][Feature:Builds] Prometheus when installed on the cluster should start and expose a secured proxy and verify build metrics [apigroup:config.openshift.io][apigroup:build.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 92 + }, + "[sig-kubevirt] migration when running openshift cluster on KubeVirt virtual machines and live migrate hosted control plane workers [Early] should maintain node readiness [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-kubevirt] services when running openshift cluster on KubeVirt virtual machines should allow connections to pods from guest cluster PodNetwork pod via LoadBalancer service across different guest nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-kubevirt] services when running openshift cluster on KubeVirt virtual machines should allow connections to pods from guest hostNetwork pod via NodePort across different guest nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-kubevirt] services when running openshift cluster on KubeVirt virtual machines should allow connections to pods from guest podNetwork pod via NodePort across different guest nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-kubevirt] services when running openshift cluster on KubeVirt virtual machines should allow connections to pods from infra cluster pod via LoadBalancer service across different guest nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-kubevirt] services when running openshift cluster on KubeVirt virtual machines should allow connections to pods from infra cluster pod via NodePort across different infra nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-kubevirt] services when running openshift cluster on KubeVirt virtual machines should allow direct connections to pods from guest cluster pod in host network across different guest nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-kubevirt] services when running openshift cluster on KubeVirt virtual machines should allow direct connections to pods from guest cluster pod in pod network across different guest nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-mco][OCPFeatureGate:MachineConfigNodes] Should have MCN properties matching associated node properties for nodes in default MCPs [apigroup:machineconfiguration.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-mco][OCPFeatureGate:MachineConfigNodes] Should properly block MCN updates by impersonation of the MCD SA [apigroup:machineconfiguration.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-mco][OCPFeatureGate:MachineConfigNodes] Should properly block MCN updates from a MCD that is not the associated one [apigroup:machineconfiguration.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-mco][OCPFeatureGate:MachineConfigNodes] [Serial]Should have MCN properties matching associated node properties for nodes in custom MCPs [apigroup:machineconfiguration.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 79 + }, + "[sig-mco][OCPFeatureGate:MachineConfigNodes] [Serial]Should properly transition through MCN conditions on rebootless node update [apigroup:machineconfiguration.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 97 + }, + "[sig-mco][OCPFeatureGate:MachineConfigNodes] [Serial]Should properly update the MCN from the associated MCD [apigroup:machineconfiguration.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 2 + }, + "[sig-mco][OCPFeatureGate:MachineConfigNodes] [Suite:openshift/machine-config-operator/disruptive][Disruptive]Should properly report MCN conditions on node degrade [apigroup:machineconfiguration.openshift.io] [Serial]": { + "average_duration": 428 + }, + "[sig-mco][OCPFeatureGate:MachineConfigNodes] [Suite:openshift/machine-config-operator/disruptive][Disruptive][Slow]Should properly create and remove MCN on node creation and deletion [apigroup:machineconfiguration.openshift.io] [Serial]": { + "average_duration": 183 + }, + "[sig-mco][OCPFeatureGate:ManagedBootImagesAWS][Serial] Should degrade on a MachineSet with an OwnerReference [apigroup:machineconfiguration.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 8 + }, + "[sig-mco][OCPFeatureGate:ManagedBootImagesAWS][Serial] Should not update boot images on any MachineSet when not configured [apigroup:machineconfiguration.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 17 + }, + "[sig-mco][OCPFeatureGate:ManagedBootImagesAWS][Serial] Should stamp coreos-bootimages configmap with current MCO hash and release version [apigroup:machineconfiguration.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 9 + }, + "[sig-mco][OCPFeatureGate:ManagedBootImagesAWS][Serial] Should update boot images on all MachineSets when configured [apigroup:machineconfiguration.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 19 + }, + "[sig-mco][OCPFeatureGate:ManagedBootImagesAWS][Serial] Should update boot images only on MachineSets that are opted in [apigroup:machineconfiguration.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 18 + }, + "[sig-mco][OCPFeatureGate:ManagedBootImages][Serial] Should degrade on a MachineSet with an OwnerReference [apigroup:machineconfiguration.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 6 + }, + "[sig-mco][OCPFeatureGate:ManagedBootImages][Serial] Should not update boot images on any MachineSet when not configured [apigroup:machineconfiguration.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 11 + }, + "[sig-mco][OCPFeatureGate:ManagedBootImages][Serial] Should stamp coreos-bootimages configmap with current MCO hash and release version [apigroup:machineconfiguration.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 7 + }, + "[sig-mco][OCPFeatureGate:ManagedBootImages][Serial] Should update boot images on all MachineSets when configured [apigroup:machineconfiguration.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 11 + }, + "[sig-mco][OCPFeatureGate:ManagedBootImages][Serial] Should update boot images only on MachineSets that are opted in [apigroup:machineconfiguration.openshift.io] [Suite:openshift/conformance/serial]": { + "average_duration": 11 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][OCPFeatureGate:OnClusterBuild][Serial][Disruptive] MCO ocb PolarionID:77781-A successfully built MachineOSConfig can be re-build": { + "average_duration": 3713 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][OCPFeatureGate:OnClusterBuild][Serial][Disruptive] MCO ocb PolarionID:77782-A MachineOSConfig with an unfinished build can be re-build": { + "average_duration": 2505 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][OCPFeatureGate:OnClusterBuild][Serial][Disruptive] MCO ocb PolarionID:83138-A MachineOSConfig fails to apply or degrades if invalid inputs are given": { + "average_duration": 135 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][OCPFeatureGate:OnClusterBuild][Serial][Disruptive] MCO ocb PolarionID:83140-A MachineOSConfig with custom containerfile definition can be successfully applied": { + "average_duration": 2314 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][OCPFeatureGate:OnClusterBuild][Serial][Disruptive] MCO ocb PolarionID:83141-A valid MachineOSConfig leads to a successful MachineOSBuild and cleanup of its associated resources": { + "average_duration": 504 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO ocb PolarionID:77781-A successfully built MachineOSConfig can be re-build": { + "average_duration": 3459 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO ocb PolarionID:77782-A MachineOSConfig with an unfinished build can be re-build": { + "average_duration": 2317 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO ocb PolarionID:83138-A MachineOSConfig fails to apply or degrades if invalid inputs are given": { + "average_duration": 136 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO ocb PolarionID:83140-A MachineOSConfig with custom containerfile definition can be successfully applied": { + "average_duration": 2102 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO ocb PolarionID:83141-A valid MachineOSConfig leads to a successful MachineOSBuild and cleanup of its associated resources": { + "average_duration": 505 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO ocb [PolarionID:77781][OTP] A successfully built MachineOSConfig can be re-build": { + "average_duration": 3021 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO ocb [PolarionID:77782][OTP] A MachineOSConfig with an unfinished build can be re-build": { + "average_duration": 2436 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO ocb [PolarionID:83138][OTP] A MachineOSConfig fails to apply or degrades if invalid inputs are given": { + "average_duration": 143 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO ocb [PolarionID:83140][OTP] A MachineOSConfig with custom containerfile definition can be successfully applied": { + "average_duration": 2236 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO ocb [PolarionID:83141][OTP] A valid MachineOSConfig leads to a successful MachineOSBuild and cleanup of its associated resources": { + "average_duration": 473 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO password PolarionID:59417-MCD create/update password with MachineConfig in CoreOS nodes": { + "average_duration": 406 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO password PolarionID:59424-ssh keys can be found in new dir on RHCOS9 node": { + "average_duration": 121 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO password PolarionID:59426-ssh keys can be updated in new dir on RHCOS9 node": { + "average_duration": 379 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO password PolarionID:62533-Passwd login must not work with ssh": { + "average_duration": 276 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO password PolarionID:64986-Remove all ssh keys": { + "average_duration": 308 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO password PolarionID:72137-Create a password for a user different from 'core' user": { + "average_duration": 109 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO password PolarionID:75552-apply ssh keys when root owns .ssh": { + "average_duration": 285 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO password [PolarionID:59417][OTP] MCD create/update password with MachineConfig in CoreOS nodes": { + "average_duration": 408 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO password [PolarionID:59424][OTP] ssh keys can be found in new dir on RHCOS9 node": { + "average_duration": 159 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO password [PolarionID:59426][LEVEL0][OTP] ssh keys can be updated in new dir on RHCOS9 node": { + "average_duration": 389 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO password [PolarionID:62533][OTP] Passwd login must not work with ssh": { + "average_duration": 263 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO password [PolarionID:64986][OTP] Remove all ssh keys": { + "average_duration": 284 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO password [PolarionID:72137][OTP] Create a password for a user different from 'core' user": { + "average_duration": 110 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive] MCO password [PolarionID:75552][OTP] apply ssh keys when root owns .ssh": { + "average_duration": 285 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive][OCPFeatureGate:ImageModeStatusReporting] MachineConfigNode conditions should properly transition on a non-image based update when OCB is enabled in a custom MCP [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 1243 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive][OCPFeatureGate:ImageModeStatusReporting] MachineConfigNode conditions should properly transition on an image based update when OCB is enabled in a custom MCP [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 1771 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive][OCPFeatureGate:ImageModeStatusReporting] MachineConfigNode properties should match the associated node properties when OCB is enabled in a custom MCP [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 992 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive][OCPFeatureGate:ImageModeStatusReporting] MachineConfigPool machine counts should transition correctly on an update in a default MCP [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 270 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive][OCPFeatureGate:ImageModeStatusReporting] MachineConfigPool machine counts should transition when OCB is enabled in a default MCP [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 2368 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive][OCPFeatureGate:ManagedBootImagesCPMS] MCO ControlPlaneMachineSet [PolarionID:85399][OTP] ControlPlaneMachineSets boot-image update. Partial mode not allowed [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 4 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive][OCPFeatureGate:ManagedBootImagesCPMS] MCO ControlPlaneMachineSet [PolarionID:85467][OTP] ControlPlaneMachineSets. Bootimage upgrade stub ignition to spec 3 [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 312 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive][OCPFeatureGate:ManagedBootImagesCPMS] MCO ControlPlaneMachineSet [PolarionID:85478][OTP] ControlPlaneMachineSets. Correctly handle marketplace boot-images [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 112 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive][OCPFeatureGate:ManagedBootImagesCPMS] MCO ControlPlaneMachineSet [PolarionID:85479][OTP] ControlPlaneMachineSets. Not updated when using Mode: None [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 114 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][Disruptive][OCPFeatureGate:ManagedBootImagesCPMS] MCO ControlPlaneMachineSet [PolarionID:85480][OTP] ControlPlaneMachineSets. Not updated when owner reference [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 101 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][OCPFeatureGate:ManagedBootImagesAzure] Should not update boot images on any MachineSet when not configured [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 14 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][OCPFeatureGate:ManagedBootImagesAzure] Should stamp coreos-bootimages configmap with current MCO hash and release version [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 13 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][OCPFeatureGate:ManagedBootImagesAzure] Should update boot images on all MachineSets when configured [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 20 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][OCPFeatureGate:ManagedBootImagesAzure] Should update boot images only on MachineSets that are opted in [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 18 + }, + "[sig-mco][Suite:openshift/machine-config-operator/disruptive][Serial][OCPFeatureGate:ManagedBootImagesAzure] [Disruptive] Should update boot images on an Azure MachineSets with a legacy boot image and scale successfully [apigroup:machineconfiguration.openshift.io]": { + "average_duration": 73 + }, + "[sig-network-edge] Application behind service load balancer with PDB remains available using new connections": { + "average_duration": 0 + }, + "[sig-network-edge] Application behind service load balancer with PDB remains available using reused connections": { + "average_duration": 0 + }, + "[sig-network-edge] DNS should answer A and AAAA queries for a dual-stack service [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-network-edge] DNS should answer queries using the local DNS endpoint [Suite:openshift/conformance/parallel]": { + "average_duration": 26 + }, + "[sig-network-edge] Network_Edge Author:mjoseph-MicroShiftOnly-Critical-60149-http route using Ingress resource for Microshift": { + "average_duration": 18 + }, + "[sig-network-edge] Network_Edge Author:mjoseph-MicroShiftOnly-Critical-60266-creation of edge and passthrough routes for Microshift": { + "average_duration": 22 + }, + "[sig-network-edge] Network_Edge Author:mjoseph-MicroShiftOnly-Critical-60283-creation of http and re-encrypt routes for Microshift": { + "average_duration": 21 + }, + "[sig-network-edge] Network_Edge Author:mjoseph-MicroShiftOnly-High-60136-reencrypt route using Ingress resource for Microshift with destination CA certificate": { + "average_duration": 18 + }, + "[sig-network-edge] Network_Edge Author:shudili-MicroShiftOnly-High-72802-make router namespace ownership check configurable for the default microshift configuration": { + "average_duration": 53 + }, + "[sig-network-edge] Network_Edge Author:shudili-MicroShiftOnly-High-73152-Expose router as load balancer service type": { + "average_duration": 33 + }, + "[sig-network-edge] Network_Edge Author:shudili-MicroShiftOnly-High-73202-Add configurable listening IP addresses and listening ports": { + "average_duration": 47 + }, + "[sig-network-edge] disruption/service-load-balancer-with-pdb connection/new should be available throughout the test": { + "average_duration": 0 + }, + "[sig-network-edge] disruption/service-load-balancer-with-pdb connection/reused should be available throughout the test": { + "average_duration": 0 + }, + "[sig-network-edge] ns/openshift-authentication route/oauth-openshift disruption/ingress-to-oauth-server connection/new should be available throughout the test": { + "average_duration": 126 + }, + "[sig-network-edge] ns/openshift-authentication route/oauth-openshift disruption/ingress-to-oauth-server connection/reused should be available throughout the test": { + "average_duration": 126 + }, + "[sig-network-edge] ns/openshift-console route/console disruption/ingress-to-console connection/new should be available throughout the test": { + "average_duration": 115 + }, + "[sig-network-edge] ns/openshift-console route/console disruption/ingress-to-console connection/reused should be available throughout the test": { + "average_duration": 115 + }, + "[sig-network-edge][Conformance][Area:Networking][Feature:Router] The HAProxy router should be able to connect to a service that is idled because a GET on the route will unidle it [Skipped:Disconnected] [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 44 + }, + "[sig-network-edge][Conformance][Area:Networking][Feature:Router] The HAProxy router should be able to connect to a service that is idled because a GET on the route will unidle it [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 32 + }, + "[sig-network-edge][Conformance][Area:Networking][Feature:Router] The HAProxy router should be able to connect to a service that is idled because a GET on the route will unidle it [apigroup:config.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 38 + }, + "[sig-network-edge][Conformance][Area:Networking][Feature:Router] The HAProxy router should pass the gRPC interoperability tests [apigroup:config.openshift.io][apigroup:route.openshift.io][apigroup:operator.openshift.io] [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 35 + }, + "[sig-network-edge][Conformance][Area:Networking][Feature:Router] The HAProxy router should pass the gRPC interoperability tests [apigroup:route.openshift.io][apigroup:operator.openshift.io] [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 71 + }, + "[sig-network-edge][Conformance][Area:Networking][Feature:Router][apigroup:route.openshift.io] The HAProxy router should pass the h2spec conformance tests [apigroup:authorization.openshift.io][apigroup:user.openshift.io][apigroup:security.openshift.io][apigroup:operator.openshift.io] [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 56 + }, + "[sig-network-edge][Conformance][Area:Networking][Feature:Router][apigroup:route.openshift.io] The HAProxy router should pass the h2spec conformance tests [apigroup:config.openshift.io][apigroup:authorization.openshift.io][apigroup:user.openshift.io][apigroup:security.openshift.io][apigroup:operator.openshift.io] [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 28 + }, + "[sig-network-edge][Conformance][Area:Networking][Feature:Router][apigroup:route.openshift.io][apigroup:config.openshift.io] The HAProxy router should pass the http2 tests [apigroup:image.openshift.io][apigroup:operator.openshift.io] [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 65 + }, + "[sig-network-edge][Feature:Idling] Idling with a single service and ReplicationController should idle the service and ReplicationController properly [Suite:openshift/conformance/parallel]": { + "average_duration": 26 + }, + "[sig-network-edge][Feature:Idling] Unidling [apigroup:apps.openshift.io][apigroup:route.openshift.io] should handle many TCP connections by possibly dropping those over a certain bound [Serial] [Skipped:Network/OVNKubernetes] [Suite:openshift/conformance/serial]": { + "average_duration": 38 + }, + "[sig-network-edge][Feature:Idling] Unidling [apigroup:apps.openshift.io][apigroup:route.openshift.io] should handle many TCP connections by possibly dropping those over a certain bound [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 25 + }, + "[sig-network-edge][Feature:Idling] Unidling [apigroup:apps.openshift.io][apigroup:route.openshift.io] should handle many UDP senders (by continuing to drop all packets on the floor) [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 36 + }, + "[sig-network-edge][Feature:Idling] Unidling [apigroup:apps.openshift.io][apigroup:route.openshift.io] should work with TCP (when fully idled) [Skipped:Network/OVNKubernetes] [Suite:openshift/conformance/parallel]": { + "average_duration": 59 + }, + "[sig-network-edge][Feature:Idling] Unidling [apigroup:apps.openshift.io][apigroup:route.openshift.io] should work with TCP (when fully idled) [Suite:openshift/conformance/parallel]": { + "average_duration": 29 + }, + "[sig-network-edge][Feature:Idling] Unidling [apigroup:apps.openshift.io][apigroup:route.openshift.io] should work with UDP [Suite:openshift/conformance/parallel]": { + "average_duration": 40 + }, + "[sig-network-edge][Feature:Idling] Unidling with Deployments [apigroup:route.openshift.io] should handle many TCP connections by possibly dropping those over a certain bound [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 22 + }, + "[sig-network-edge][Feature:Idling] Unidling with Deployments [apigroup:route.openshift.io] should handle many UDP senders (by continuing to drop all packets on the floor) [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 34 + }, + "[sig-network-edge][Feature:Idling] Unidling with Deployments [apigroup:route.openshift.io] should work with TCP (when fully idled) [Suite:openshift/conformance/parallel]": { + "average_duration": 21 + }, + "[sig-network-edge][Feature:Idling] Unidling with Deployments [apigroup:route.openshift.io] should work with UDP [Suite:openshift/conformance/parallel]": { + "average_duration": 33 + }, + "[sig-network-edge][OCPFeatureGate:GatewayAPIController][Feature:Router][apigroup:gateway.networking.k8s.io] Ensure GIE is enabled after creating an inferencePool CRD [Suite:openshift/conformance/parallel]": { + "average_duration": 58 + }, + "[sig-network-edge][OCPFeatureGate:GatewayAPIController][Feature:Router][apigroup:gateway.networking.k8s.io] Ensure HTTPRoute object is created [Suite:openshift/conformance/parallel]": { + "average_duration": 88 + }, + "[sig-network-edge][OCPFeatureGate:GatewayAPIController][Feature:Router][apigroup:gateway.networking.k8s.io] Ensure LB, service, and dnsRecord are created for a Gateway object [Suite:openshift/conformance/parallel]": { + "average_duration": 46 + }, + "[sig-network-edge][OCPFeatureGate:GatewayAPIController][Feature:Router][apigroup:gateway.networking.k8s.io] Ensure OSSM and OLM related resources are created after creating GatewayClass [Suite:openshift/conformance/parallel]": { + "average_duration": 46 + }, + "[sig-network-edge][OCPFeatureGate:GatewayAPIController][Feature:Router][apigroup:gateway.networking.k8s.io] Ensure custom gatewayclass can be accepted [Suite:openshift/conformance/parallel]": { + "average_duration": 42 + }, + "[sig-network-edge][OCPFeatureGate:GatewayAPIController][Feature:Router][apigroup:gateway.networking.k8s.io] Ensure default gatewayclass is accepted [Suite:openshift/conformance/parallel]": { + "average_duration": 29 + }, + "[sig-network] CVE-2021-29923 IPv4 Service Type ClusterIP with leading zeros should work interpreted as decimal [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-network] Connectivity Pod Lifecycle should be able to connect from a Pod to a terminating Pod": { + "average_duration": 22 + }, + "[sig-network] Connectivity Pod Lifecycle should be able to connect from a Pod to a terminating Pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-network] Connectivity Pod Lifecycle should be able to have zero downtime on a Blue Green deployment using Services and Readiness Gates": { + "average_duration": 35 + }, + "[sig-network] Connectivity Pod Lifecycle should be able to have zero downtime on a Blue Green deployment using Services and Readiness Gates [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-network] Conntrack proxy implementation should not be vulnerable to the invalid conntrack state bug [Privileged]": { + "average_duration": 62 + }, + "[sig-network] Conntrack proxy implementation should not be vulnerable to the invalid conntrack state bug [Privileged] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 65 + }, + "[sig-network] Conntrack should be able to preserve UDP traffic when initial unready endpoints get ready": { + "average_duration": 23 + }, + "[sig-network] Conntrack should be able to preserve UDP traffic when initial unready endpoints get ready [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-network] Conntrack should be able to preserve UDP traffic when server pod cycles for a ClusterIP service": { + "average_duration": 15 + }, + "[sig-network] Conntrack should be able to preserve UDP traffic when server pod cycles for a ClusterIP service [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-network] Conntrack should be able to preserve UDP traffic when server pod cycles for a ClusterIP service and client is hostNetwork": { + "average_duration": 18 + }, + "[sig-network] Conntrack should be able to preserve UDP traffic when server pod cycles for a ClusterIP service and client is hostNetwork [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-network] Conntrack should be able to preserve UDP traffic when server pod cycles for a ClusterIP service with InternalTrafficPolicy set to Local": { + "average_duration": 23 + }, + "[sig-network] Conntrack should be able to preserve UDP traffic when server pod cycles for a ClusterIP service with InternalTrafficPolicy set to Local [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 24 + }, + "[sig-network] Conntrack should be able to preserve UDP traffic when server pod cycles for a NodePort service": { + "average_duration": 17 + }, + "[sig-network] Conntrack should be able to preserve UDP traffic when server pod cycles for a NodePort service [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-network] Conntrack should drop INVALID conntrack entries [Privileged] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 73 + }, + "[sig-network] DNS HostNetwork spec.Hostname field is not silently ignored and is used for hostname for a Pod": { + "average_duration": 5 + }, + "[sig-network] DNS HostNetwork spec.Hostname field is not silently ignored and is used for hostname for a Pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-network] DNS HostNetwork spec.Hostname field is silently ignored and the node hostname is used when hostNetwork is set to true for a Pod": { + "average_duration": 4 + }, + "[sig-network] DNS HostNetwork spec.Hostname field is silently ignored and the node hostname is used when hostNetwork is set to true for a Pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-network] DNS [Feature:RelaxedDNSSearchValidation] [FeatureGate:RelaxedDNSSearchValidation] [Beta] should work with a search path containing an underscore and a search path with a single dot [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-network] DNS should provide /etc/hosts entries for the cluster [Conformance]": { + "average_duration": 5 + }, + "[sig-network] DNS should provide /etc/hosts entries for the cluster [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-network] DNS should provide DNS for ExternalName services [Conformance]": { + "average_duration": 16 + }, + "[sig-network] DNS should provide DNS for ExternalName services [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-network] DNS should provide DNS for pods for Hostname [Conformance]": { + "average_duration": 8 + }, + "[sig-network] DNS should provide DNS for pods for Hostname [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-network] DNS should provide DNS for pods for Subdomain [Conformance]": { + "average_duration": 12 + }, + "[sig-network] DNS should provide DNS for pods for Subdomain [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-network] DNS should provide DNS for services [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-network] DNS should provide DNS for services [Conformance]": { + "average_duration": 12 + }, + "[sig-network] DNS should provide DNS for services [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-network] DNS should provide DNS for the cluster [Conformance] [Skipped:Proxy] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-network] DNS should provide DNS for the cluster [Conformance]": { + "average_duration": 5 + }, + "[sig-network] DNS should provide DNS for the cluster [Conformance] [Skipped:Proxy] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-network] DNS should provide DNS for the cluster [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-network] DNS should provide DNS for the cluster [Provider:GCE]": { + "average_duration": 1 + }, + "[sig-network] DNS should provide DNS for the cluster [Provider:GCE] [Skipped:Proxy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-network] DNS should provide DNS for the cluster [Provider:GCE] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-network] DNS should resolve DNS of partial qualified names for services [LinuxOnly] [Conformance]": { + "average_duration": 13 + }, + "[sig-network] DNS should resolve DNS of partial qualified names for services [LinuxOnly] [Conformance] [Skipped:Proxy] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-network] DNS should resolve DNS of partial qualified names for services [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-network] DNS should resolve DNS of partial qualified names for the cluster [LinuxOnly]": { + "average_duration": 7 + }, + "[sig-network] DNS should resolve DNS of partial qualified names for the cluster [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-network] DNS should support configurable pod DNS nameservers [Conformance]": { + "average_duration": 5 + }, + "[sig-network] DNS should support configurable pod DNS nameservers [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-network] DNS should support configurable pod resolv.conf": { + "average_duration": 8 + }, + "[sig-network] DNS should support configurable pod resolv.conf [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-network] DNS should work with a search path containing an underscore and a search path with a single dot": { + "average_duration": 6 + }, + "[sig-network] DNS should work with a search path containing an underscore and a search path with a single dot [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-network] DNS should work with the pod containing more than 6 DNS search paths and longer than 256 search list characters": { + "average_duration": 7 + }, + "[sig-network] DNS should work with the pod containing more than 6 DNS search paths and longer than 256 search list characters [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-network] Disruption should not overlap with DNS problems in cluster running tests": { + "average_duration": 0 + }, + "[sig-network] EndpointSlice should create Endpoints and EndpointSlices for Pods matching a Service [Conformance]": { + "average_duration": 7 + }, + "[sig-network] EndpointSlice should create Endpoints and EndpointSlices for Pods matching a Service [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-network] EndpointSlice should create and delete Endpoints and EndpointSlices for a Service with a selector specified [Conformance]": { + "average_duration": 1 + }, + "[sig-network] EndpointSlice should create and delete Endpoints and EndpointSlices for a Service with a selector specified [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-network] EndpointSlice should have Endpoints and EndpointSlices pointing to API Server [Conformance]": { + "average_duration": 1 + }, + "[sig-network] EndpointSlice should have Endpoints and EndpointSlices pointing to API Server [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-network] EndpointSlice should support a Service with multiple endpoint IPs specified in multiple EndpointSlices [Conformance]": { + "average_duration": 11 + }, + "[sig-network] EndpointSlice should support a Service with multiple endpoint IPs specified in multiple EndpointSlices [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-network] EndpointSlice should support a Service with multiple endpoint IPs specified in multiple EndpointSlices [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-network] EndpointSlice should support a Service with multiple ports specified in multiple EndpointSlices [Conformance]": { + "average_duration": 9 + }, + "[sig-network] EndpointSlice should support a Service with multiple ports specified in multiple EndpointSlices [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-network] EndpointSlice should support a Service with multiple ports specified in multiple EndpointSlices [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-network] EndpointSlice should support creating EndpointSlice API operations [Conformance]": { + "average_duration": 1 + }, + "[sig-network] EndpointSlice should support creating EndpointSlice API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-network] EndpointSliceMirroring should mirror a custom Endpoint with multiple subsets and same IP address": { + "average_duration": 10 + }, + "[sig-network] EndpointSliceMirroring should mirror a custom Endpoint with multiple subsets and same IP address [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-network] EndpointSliceMirroring should mirror a custom Endpoints resource through create update and delete [Conformance]": { + "average_duration": 2 + }, + "[sig-network] EndpointSliceMirroring should mirror a custom Endpoints resource through create update and delete [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-network] HostPort validates that there is no conflict between pods with same hostPort but different hostIP and protocol [LinuxOnly] [Conformance]": { + "average_duration": 18 + }, + "[sig-network] HostPort validates that there is no conflict between pods with same hostPort but different hostIP and protocol [LinuxOnly] [Conformance] [Serial:Self] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-network] HostPort validates that there is no conflict between pods with same hostPort but different hostIP and protocol [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-network] Ingress API should support creating Ingress API operations [Conformance]": { + "average_duration": 1 + }, + "[sig-network] Ingress API should support creating Ingress API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-network] IngressClass API should support creating IngressClass API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-network] IngressClass API should support creating IngressClass API operations [Conformance]": { + "average_duration": 1 + }, + "[sig-network] IngressClass API should support creating IngressClass API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-network] IngressClass [Feature:Ingress] should allow IngressClass to have Namespace-scoped parameters [Serial]": { + "average_duration": 1 + }, + "[sig-network] IngressClass [Feature:Ingress] should allow IngressClass to have Namespace-scoped parameters [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-network] IngressClass [Feature:Ingress] should choose the one with the later CreationTimestamp, if equal the one with the lower name when two ingressClasses are marked as default [Serial]": { + "average_duration": 2 + }, + "[sig-network] IngressClass [Feature:Ingress] should choose the one with the later CreationTimestamp, if equal the one with the lower name when two ingressClasses are marked as default [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-network] IngressClass [Feature:Ingress] should choose the one with the later CreationTimestamp, if equal the one with the lower name when two ingressClasses are marked as default[Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-network] IngressClass [Feature:Ingress] should not set default value if no default IngressClass [Serial]": { + "average_duration": 2 + }, + "[sig-network] IngressClass [Feature:Ingress] should not set default value if no default IngressClass [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-network] IngressClass [Feature:Ingress] should set default value on new IngressClass [Serial]": { + "average_duration": 2 + }, + "[sig-network] IngressClass [Feature:Ingress] should set default value on new IngressClass [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-network] Internal connectivity for TCP and UDP on ports 9000-9999 is allowed [Serial:Self] [Suite:openshift/conformance/parallel]": { + "average_duration": 21 + }, + "[sig-network] KubeProxy should update metric for tracking accepted packets destined for localhost nodeports [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-network] LoadBalancers [Feature:LoadBalancer] should be able to preserve UDP traffic when server pod cycles for a LoadBalancer service on different nodes": { + "average_duration": 50 + }, + "[sig-network] LoadBalancers [Feature:LoadBalancer] should be able to preserve UDP traffic when server pod cycles for a LoadBalancer service on different nodes [Skipped:alibabacloud] [Skipped:aws] [Skipped:baremetal] [Skipped:external] [Skipped:ibmcloud] [Skipped:kubevirt] [Skipped:nutanix] [Skipped:openstack] [Skipped:ovirt] [Skipped:vsphere] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 46 + }, + "[sig-network] LoadBalancers [Feature:LoadBalancer] should be able to preserve UDP traffic when server pod cycles for a LoadBalancer service on different nodes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 48 + }, + "[sig-network] LoadBalancers [Feature:LoadBalancer] should be able to preserve UDP traffic when server pod cycles for a LoadBalancer service on the same nodes": { + "average_duration": 52 + }, + "[sig-network] LoadBalancers [Feature:LoadBalancer] should be able to preserve UDP traffic when server pod cycles for a LoadBalancer service on the same nodes [Skipped:alibabacloud] [Skipped:aws] [Skipped:baremetal] [Skipped:external] [Skipped:ibmcloud] [Skipped:kubevirt] [Skipped:nutanix] [Skipped:openstack] [Skipped:ovirt] [Skipped:vsphere] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 50 + }, + "[sig-network] LoadBalancers [Feature:LoadBalancer] should be able to preserve UDP traffic when server pod cycles for a LoadBalancer service on the same nodes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 48 + }, + "[sig-network] Netpol API should support creating NetworkPolicy API operations": { + "average_duration": 5 + }, + "[sig-network] Netpol API should support creating NetworkPolicy API operations [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-network] Netpol API should support creating NetworkPolicy API with endport field": { + "average_duration": 3 + }, + "[sig-network] Netpol API should support creating NetworkPolicy API with endport field [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-network] Netpol API should support creating NetworkPolicy with Status subresource [Feature:NetworkPolicyStatus] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy]": { + "average_duration": 44 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 82 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 55 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 48 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy]": { + "average_duration": 38 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 44 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy]": { + "average_duration": 36 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 71 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy]": { + "average_duration": 54 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 54 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 63 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated pod [Feature:NetworkPolicy]": { + "average_duration": 56 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 54 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow ingress access from updated pod [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 63 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy]": { + "average_duration": 42 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 80 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 68 + }, + "[sig-network] Netpol NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-network] Netpol NetworkPolicy between server and client should deny egress from all pods in a namespace [Feature:NetworkPolicy]": { + "average_duration": 47 + }, + "[sig-network] Netpol NetworkPolicy between server and client should deny egress from all pods in a namespace [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 60 + }, + "[sig-network] Netpol NetworkPolicy between server and client should deny egress from all pods in a namespace [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 50 + }, + "[sig-network] Netpol NetworkPolicy between server and client should deny egress from all pods in a namespace [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 57 + }, + "[sig-network] Netpol NetworkPolicy between server and client should deny egress from pods based on PodSelector [Feature:NetworkPolicy]": { + "average_duration": 40 + }, + "[sig-network] Netpol NetworkPolicy between server and client should deny egress from pods based on PodSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 43 + }, + "[sig-network] Netpol NetworkPolicy between server and client should deny egress from pods based on PodSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 37 + }, + "[sig-network] Netpol NetworkPolicy between server and client should deny egress from pods based on PodSelector [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 43 + }, + "[sig-network] Netpol NetworkPolicy between server and client should deny ingress access to updated pod [Feature:NetworkPolicy]": { + "average_duration": 46 + }, + "[sig-network] Netpol NetworkPolicy between server and client should deny ingress access to updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 48 + }, + "[sig-network] Netpol NetworkPolicy between server and client should deny ingress access to updated pod [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 58 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce egress policy allowing traffic to a server in a different namespace based on PodSelector and NamespaceSelector [Feature:NetworkPolicy]": { + "average_duration": 39 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce egress policy allowing traffic to a server in a different namespace based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce egress policy allowing traffic to a server in a different namespace based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 44 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy]": { + "average_duration": 34 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 34 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy]": { + "average_duration": 65 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy] [Feature:UDP] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 60 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce ingress policy allowing any port traffic to a server on a specific protocol [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce multiple egress policies with egress allow-all policy taking precedence [Feature:NetworkPolicy]": { + "average_duration": 61 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce multiple egress policies with egress allow-all policy taking precedence [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 62 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce multiple egress policies with egress allow-all policy taking precedence [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 70 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce multiple ingress policies with ingress allow-all policy taking precedence [Feature:NetworkPolicy]": { + "average_duration": 62 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce multiple ingress policies with ingress allow-all policy taking precedence [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 62 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce multiple ingress policies with ingress allow-all policy taking precedence [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 70 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policies to check ingress and egress policies can be controlled independently based on PodSelector [Feature:NetworkPolicy]": { + "average_duration": 51 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policies to check ingress and egress policies can be controlled independently based on PodSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policies to check ingress and egress policies can be controlled independently based on PodSelector [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 57 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policy based on Multiple PodSelectors and NamespaceSelectors [Feature:NetworkPolicy]": { + "average_duration": 37 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policy based on Multiple PodSelectors and NamespaceSelectors [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 37 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policy based on Multiple PodSelectors and NamespaceSelectors [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 43 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy]": { + "average_duration": 39 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 37 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 43 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policy based on Ports [Feature:NetworkPolicy]": { + "average_duration": 37 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policy based on Ports [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policy based on Ports [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 43 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic for a target [Feature:NetworkPolicy]": { + "average_duration": 45 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic for a target [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 46 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic for a target [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 43 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic for a target [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 50 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic from pods in all namespaces [Feature:NetworkPolicy]": { + "average_duration": 34 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic from pods in all namespaces [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow ingress traffic from pods in all namespaces [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow traffic based on NamespaceSelector with MatchLabels using default ns label [Feature:NetworkPolicy]": { + "average_duration": 40 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow traffic based on NamespaceSelector with MatchLabels using default ns label [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 37 + }, + "[sig-network] Netpol NetworkPolicy between server and client should enforce policy to allow traffic based on NamespaceSelector with MatchLabels using default ns label [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 43 + }, + "[sig-network] Netpol NetworkPolicy between server and client should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy]": { + "average_duration": 53 + }, + "[sig-network] Netpol NetworkPolicy between server and client should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-network] Netpol NetworkPolicy between server and client should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 58 + }, + "[sig-network] Netpol NetworkPolicy between server and client should not allow access by TCP when a policy specifies only UDP [Feature:NetworkPolicy]": { + "average_duration": 38 + }, + "[sig-network] Netpol NetworkPolicy between server and client should not allow access by TCP when a policy specifies only UDP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 37 + }, + "[sig-network] Netpol NetworkPolicy between server and client should not allow access by TCP when a policy specifies only UDP [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 44 + }, + "[sig-network] Netpol NetworkPolicy between server and client should not mistakenly treat 'protocol: SCTP' as 'protocol: TCP', even if the plugin doesn't support SCTP [Feature:NetworkPolicy]": { + "average_duration": 52 + }, + "[sig-network] Netpol NetworkPolicy between server and client should not mistakenly treat 'protocol: SCTP' as 'protocol: TCP', even if the plugin doesn't support SCTP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 50 + }, + "[sig-network] Netpol NetworkPolicy between server and client should not mistakenly treat 'protocol: SCTP' as 'protocol: TCP', even if the plugin doesn't support SCTP [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 57 + }, + "[sig-network] Netpol NetworkPolicy between server and client should properly isolate pods that are selected by a policy allowing SCTP, even if the plugin doesn't support SCTP [Feature:NetworkPolicy]": { + "average_duration": 39 + }, + "[sig-network] Netpol NetworkPolicy between server and client should properly isolate pods that are selected by a policy allowing SCTP, even if the plugin doesn't support SCTP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-network] Netpol NetworkPolicy between server and client should properly isolate pods that are selected by a policy allowing SCTP, even if the plugin doesn't support SCTP [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 44 + }, + "[sig-network] Netpol NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy]": { + "average_duration": 70 + }, + "[sig-network] Netpol NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-network] Netpol NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 79 + }, + "[sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-all' policy [Feature:NetworkPolicy]": { + "average_duration": 56 + }, + "[sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-all' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 57 + }, + "[sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-all' policy [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 63 + }, + "[sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy]": { + "average_duration": 52 + }, + "[sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 50 + }, + "[sig-network] Netpol NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 56 + }, + "[sig-network] Netpol NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy]": { + "average_duration": 63 + }, + "[sig-network] Netpol NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 54 + }, + "[sig-network] Netpol NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 67 + }, + "[sig-network] Netpol NetworkPolicy between server and client should support denying of egress traffic on the client side (even if the server explicitly allows this traffic) [Feature:NetworkPolicy]": { + "average_duration": 52 + }, + "[sig-network] Netpol NetworkPolicy between server and client should support denying of egress traffic on the client side (even if the server explicitly allows this traffic) [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 51 + }, + "[sig-network] Netpol NetworkPolicy between server and client should support denying of egress traffic on the client side (even if the server explicitly allows this traffic) [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 56 + }, + "[sig-network] Netpol NetworkPolicy between server and client should work with Ingress, Egress specified together [Feature:NetworkPolicy]": { + "average_duration": 65 + }, + "[sig-network] Netpol NetworkPolicy between server and client should work with Ingress, Egress specified together [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 70 + }, + "[sig-network] Netpol NetworkPolicy between server and client should work with Ingress, Egress specified together [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 79 + }, + "[sig-network] NetworkManager should not log too many netlink events to system journal": { + "average_duration": 0 + }, + "[sig-network] NetworkPolicy API should support creating NetworkPolicy API operations [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 88 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 91 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 78 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 81 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should allow ingress access from updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 102 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy] [Skipped:Network/OVNKubernetes] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 83 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should deny ingress access to updated pod [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 78 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce egress policy allowing traffic to a server in a different namespace based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 135 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 79 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce multiple egress policies with egress allow-all policy taking precedence [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 102 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce multiple ingress policies with ingress allow-all policy taking precedence [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 93 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce multiple, stacked policies with overlapping podSelectors [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 34 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce policies to check ingress and egress policies can be controlled independently based on PodSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 106 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on NamespaceSelector with MatchExpressions[Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 79 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 132 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector or NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 87 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector with MatchExpressions[Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 81 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on Ports [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 79 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce policy to allow traffic from pods within server namespace based on PodSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 153 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce policy to allow traffic only from a different namespace, based on NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 79 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce policy to allow traffic only from a pod in a different namespace based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 209 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should enforce updated policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 242 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 91 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should not allow access by TCP when a policy specifies only SCTP [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 90 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 135 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should support a 'default-deny-all' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 135 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 73 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 34 + }, + "[sig-network] NetworkPolicyLegacy [LinuxOnly] NetworkPolicy between server and client should work with Ingress,Egress specified together [Feature:NetworkPolicy] [Skipped:Network/OpenShiftSDN/Multitenant] [Skipped:Network/OpenShiftSDN] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 144 + }, + "[sig-network] Networking Granular Checks: Pods should function for intra-pod communication: http [NodeConformance] [Conformance]": { + "average_duration": 20 + }, + "[sig-network] Networking Granular Checks: Pods should function for intra-pod communication: http [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-network] Networking Granular Checks: Pods should function for intra-pod communication: udp [NodeConformance] [Conformance]": { + "average_duration": 21 + }, + "[sig-network] Networking Granular Checks: Pods should function for intra-pod communication: udp [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-network] Networking Granular Checks: Pods should function for node-pod communication: http [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 21 + }, + "[sig-network] Networking Granular Checks: Pods should function for node-pod communication: http [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-network] Networking Granular Checks: Pods should function for node-pod communication: udp [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 23 + }, + "[sig-network] Networking Granular Checks: Pods should function for node-pod communication: udp [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 28 + }, + "[sig-network] Networking Granular Checks: Services should be able to handle large requests: http": { + "average_duration": 20 + }, + "[sig-network] Networking Granular Checks: Services should be able to handle large requests: http [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-network] Networking Granular Checks: Services should be able to handle large requests: udp": { + "average_duration": 20 + }, + "[sig-network] Networking Granular Checks: Services should be able to handle large requests: udp [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-network] Networking Granular Checks: Services should function for client IP based session affinity: http [LinuxOnly]": { + "average_duration": 39 + }, + "[sig-network] Networking Granular Checks: Services should function for client IP based session affinity: http [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 46 + }, + "[sig-network] Networking Granular Checks: Services should function for client IP based session affinity: udp [LinuxOnly]": { + "average_duration": 41 + }, + "[sig-network] Networking Granular Checks: Services should function for client IP based session affinity: udp [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 48 + }, + "[sig-network] Networking Granular Checks: Services should function for endpoint-Service: http": { + "average_duration": 37 + }, + "[sig-network] Networking Granular Checks: Services should function for endpoint-Service: http [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 44 + }, + "[sig-network] Networking Granular Checks: Services should function for endpoint-Service: udp": { + "average_duration": 38 + }, + "[sig-network] Networking Granular Checks: Services should function for endpoint-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 44 + }, + "[sig-network] Networking Granular Checks: Services should function for multiple endpoint-Services with same selector": { + "average_duration": 84 + }, + "[sig-network] Networking Granular Checks: Services should function for multiple endpoint-Services with same selector [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 93 + }, + "[sig-network] Networking Granular Checks: Services should function for node-Service: http": { + "average_duration": 37 + }, + "[sig-network] Networking Granular Checks: Services should function for node-Service: http [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 44 + }, + "[sig-network] Networking Granular Checks: Services should function for node-Service: udp": { + "average_duration": 46 + }, + "[sig-network] Networking Granular Checks: Services should function for node-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 53 + }, + "[sig-network] Networking Granular Checks: Services should function for pod-Service: http": { + "average_duration": 37 + }, + "[sig-network] Networking Granular Checks: Services should function for pod-Service: http [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 44 + }, + "[sig-network] Networking Granular Checks: Services should function for pod-Service: udp": { + "average_duration": 36 + }, + "[sig-network] Networking Granular Checks: Services should function for pod-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 44 + }, + "[sig-network] Networking Granular Checks: Services should support basic nodePort: udp functionality": { + "average_duration": 33 + }, + "[sig-network] Networking Granular Checks: Services should support basic nodePort: udp functionality [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-network] Networking Granular Checks: Services should update endpoints: http": { + "average_duration": 104 + }, + "[sig-network] Networking Granular Checks: Services should update endpoints: http [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 113 + }, + "[sig-network] Networking Granular Checks: Services should update endpoints: udp": { + "average_duration": 103 + }, + "[sig-network] Networking Granular Checks: Services should update endpoints: udp [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 113 + }, + "[sig-network] Networking IPerf2 [Feature:Networking-Performance] should run iperf2": { + "average_duration": 50 + }, + "[sig-network] Networking IPerf2 [Feature:Networking-Performance] should run iperf2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 56 + }, + "[sig-network] Networking should allow creating a Pod with an SCTP HostPort [LinuxOnly] [Serial]": { + "average_duration": 8 + }, + "[sig-network] Networking should allow creating a Pod with an SCTP HostPort [LinuxOnly] [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-network] Networking should provide Internet connection for containers [Feature:Networking-IPv4]": { + "average_duration": 5 + }, + "[sig-network] Networking should provide Internet connection for containers [Feature:Networking-IPv4] [Skipped:Disconnected] [Skipped:Proxy] [Skipped:azure] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-network] Networking should provide Internet connection for containers [Feature:Networking-IPv4] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-network] NoSNAT Should be able to send traffic between Pods without SNAT": { + "average_duration": 14 + }, + "[sig-network] NoSNAT Should be able to send traffic between Pods without SNAT [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-network] Proxy version v1 A set of valid responses are returned for both pod and service Proxy [Conformance]": { + "average_duration": 4 + }, + "[sig-network] Proxy version v1 A set of valid responses are returned for both pod and service Proxy [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-network] Proxy version v1 A set of valid responses are returned for both pod and service ProxyWithPath [Conformance]": { + "average_duration": 4 + }, + "[sig-network] Proxy version v1 A set of valid responses are returned for both pod and service ProxyWithPath [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-network] Proxy version v1 should proxy logs on node using proxy subresource ": { + "average_duration": 1 + }, + "[sig-network] Proxy version v1 should proxy logs on node using proxy subresource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-network] Proxy version v1 should proxy logs on node with explicit kubelet port using proxy subresource ": { + "average_duration": 1 + }, + "[sig-network] Proxy version v1 should proxy logs on node with explicit kubelet port using proxy subresource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-network] Proxy version v1 should proxy through a service and a pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-network] Proxy version v1 should proxy through a service and a pod [Conformance]": { + "average_duration": 6 + }, + "[sig-network] Proxy version v1 should proxy through a service and a pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-network] SCTP [LinuxOnly] should allow creating a basic SCTP service with pod and endpoints [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-network] SCTP [LinuxOnly] should create a ClusterIP Service with SCTP ports [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-network] SCTP [LinuxOnly] should create a Pod with SCTP HostPort [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-network] Service endpoints latency should not be very high [Conformance] [Serial] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-network] Service endpoints latency should not be very high [Conformance]": { + "average_duration": 6 + }, + "[sig-network] Service endpoints latency should not be very high [Conformance] [Serial] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-network] ServiceCIDR and IPAddress API should support IPAddress API operations [Conformance]": { + "average_duration": 1 + }, + "[sig-network] ServiceCIDR and IPAddress API should support IPAddress API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-network] ServiceCIDR and IPAddress API should support ServiceCIDR API operations [Conformance]": { + "average_duration": 1 + }, + "[sig-network] ServiceCIDR and IPAddress API should support ServiceCIDR API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-network] ServiceCIDR should be blocked [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-network] Services should allow creating a basic SCTP service with pod and endpoints [LinuxOnly] [Serial]": { + "average_duration": 13 + }, + "[sig-network] Services should allow creating a basic SCTP service with pod and endpoints [LinuxOnly] [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-network] Services should allow pods to hairpin back to themselves through services": { + "average_duration": 5 + }, + "[sig-network] Services should allow pods to hairpin back to themselves through services [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-network] Services should be able to change the type from ClusterIP to ExternalName [Conformance]": { + "average_duration": 9 + }, + "[sig-network] Services should be able to change the type from ClusterIP to ExternalName [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-network] Services should be able to change the type from ExternalName to ClusterIP [Conformance]": { + "average_duration": 11 + }, + "[sig-network] Services should be able to change the type from ExternalName to ClusterIP [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-network] Services should be able to change the type from ExternalName to NodePort [Conformance]": { + "average_duration": 13 + }, + "[sig-network] Services should be able to change the type from ExternalName to NodePort [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-network] Services should be able to change the type from NodePort to ExternalName [Conformance]": { + "average_duration": 9 + }, + "[sig-network] Services should be able to change the type from NodePort to ExternalName [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-network] Services should be able to connect to terminating and unready endpoints if PublishNotReadyAddresses is true": { + "average_duration": 59 + }, + "[sig-network] Services should be able to connect to terminating and unready endpoints if PublishNotReadyAddresses is true [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 65 + }, + "[sig-network] Services should be able to create a functioning NodePort service [Conformance]": { + "average_duration": 13 + }, + "[sig-network] Services should be able to create a functioning NodePort service [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-network] Services should be able to switch session affinity for NodePort service [LinuxOnly] [Conformance]": { + "average_duration": 23 + }, + "[sig-network] Services should be able to switch session affinity for NodePort service [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 30 + }, + "[sig-network] Services should be able to switch session affinity for service with type clusterIP [LinuxOnly] [Conformance]": { + "average_duration": 15 + }, + "[sig-network] Services should be able to switch session affinity for service with type clusterIP [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-network] Services should be able to update service type to NodePort listening on same port number but different protocols": { + "average_duration": 28 + }, + "[sig-network] Services should be able to update service type to NodePort listening on same port number but different protocols [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 36 + }, + "[sig-network] Services should be possible to connect to a service via ExternalIP when the external IP is not assigned to a node": { + "average_duration": 11 + }, + "[sig-network] Services should be possible to connect to a service via ExternalIP when the external IP is not assigned to a node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-network] Services should be rejected for evicted pods (no endpoints exist)": { + "average_duration": 107 + }, + "[sig-network] Services should be rejected for evicted pods (no endpoints exist) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 116 + }, + "[sig-network] Services should be rejected when no endpoints exist": { + "average_duration": 5 + }, + "[sig-network] Services should be rejected when no endpoints exist [Skipped:ibmroks] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-network] Services should be rejected when no endpoints exist [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-network] Services should be updated after adding or deleting ports ": { + "average_duration": 16 + }, + "[sig-network] Services should be updated after adding or deleting ports [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-network] Services should check NodePort out-of-range": { + "average_duration": 1 + }, + "[sig-network] Services should check NodePort out-of-range [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-network] Services should complete a service status lifecycle [Conformance]": { + "average_duration": 1 + }, + "[sig-network] Services should complete a service status lifecycle [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-network] Services should connect to the named ports exposed by restartable init containers": { + "average_duration": 9 + }, + "[sig-network] Services should connect to the named ports exposed by restartable init containers [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-network] Services should connect to the ports exposed by restartable init containers": { + "average_duration": 9 + }, + "[sig-network] Services should connect to the ports exposed by restartable init containers [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-network] Services should create endpoints for unready pods": { + "average_duration": 11 + }, + "[sig-network] Services should create endpoints for unready pods [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-network] Services should delete a collection of services [Conformance]": { + "average_duration": 1 + }, + "[sig-network] Services should delete a collection of services [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-network] Services should fail health check node port if there are only terminating endpoints": { + "average_duration": 8 + }, + "[sig-network] Services should fail health check node port if there are only terminating endpoints [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-network] Services should fallback to local terminating endpoints when there are no ready endpoints with externalTrafficPolicy=Local": { + "average_duration": 39 + }, + "[sig-network] Services should fallback to local terminating endpoints when there are no ready endpoints with externalTrafficPolicy=Local [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 44 + }, + "[sig-network] Services should fallback to local terminating endpoints when there are no ready endpoints with internalTrafficPolicy=Local": { + "average_duration": 36 + }, + "[sig-network] Services should fallback to local terminating endpoints when there are no ready endpoints with internalTrafficPolicy=Local [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-network] Services should fallback to terminating endpoints when there are no ready endpoints with externallTrafficPolicy=Cluster": { + "average_duration": 36 + }, + "[sig-network] Services should fallback to terminating endpoints when there are no ready endpoints with externallTrafficPolicy=Cluster [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-network] Services should fallback to terminating endpoints when there are no ready endpoints with internalTrafficPolicy=Cluster": { + "average_duration": 36 + }, + "[sig-network] Services should fallback to terminating endpoints when there are no ready endpoints with internalTrafficPolicy=Cluster [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-network] Services should find a service from listing all namespaces [Conformance]": { + "average_duration": 1 + }, + "[sig-network] Services should find a service from listing all namespaces [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-network] Services should have session affinity timeout work for NodePort service [LinuxOnly]": { + "average_duration": 201 + }, + "[sig-network] Services should have session affinity timeout work for NodePort service [LinuxOnly] [Conformance] [Skipped:Network/OVNKuberenetes] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 58 + }, + "[sig-network] Services should have session affinity timeout work for NodePort service [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 196 + }, + "[sig-network] Services should have session affinity timeout work for service with type clusterIP [LinuxOnly]": { + "average_duration": 196 + }, + "[sig-network] Services should have session affinity timeout work for service with type clusterIP [LinuxOnly] [Conformance] [Skipped:Network/OVNKuberenetes] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 54 + }, + "[sig-network] Services should have session affinity timeout work for service with type clusterIP [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 195 + }, + "[sig-network] Services should have session affinity work for NodePort service [LinuxOnly] [Conformance]": { + "average_duration": 16 + }, + "[sig-network] Services should have session affinity work for NodePort service [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-network] Services should have session affinity work for service with type clusterIP [LinuxOnly] [Conformance]": { + "average_duration": 12 + }, + "[sig-network] Services should have session affinity work for service with type clusterIP [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-network] Services should not be able to connect to terminating and unready endpoints if PublishNotReadyAddresses is false": { + "average_duration": 65 + }, + "[sig-network] Services should not be able to connect to terminating and unready endpoints if PublishNotReadyAddresses is false [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 68 + }, + "[sig-network] Services should preserve source pod IP for traffic thru service cluster IP [LinuxOnly]": { + "average_duration": 9 + }, + "[sig-network] Services should preserve source pod IP for traffic thru service cluster IP [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-network] Services should prevent NodePort collisions": { + "average_duration": 1 + }, + "[sig-network] Services should prevent NodePort collisions [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-network] Services should provide secure master service [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-network] Services should provide secure master service [Conformance]": { + "average_duration": 1 + }, + "[sig-network] Services should provide secure master service [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-network] Services should release NodePorts on delete": { + "average_duration": 4 + }, + "[sig-network] Services should release NodePorts on delete [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-network] Services should respect internalTrafficPolicy=Local Pod (hostNetwork: true) to Pod": { + "average_duration": 14 + }, + "[sig-network] Services should respect internalTrafficPolicy=Local Pod (hostNetwork: true) to Pod [Feature:ServiceInternalTrafficPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 28 + }, + "[sig-network] Services should respect internalTrafficPolicy=Local Pod (hostNetwork: true) to Pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-network] Services should respect internalTrafficPolicy=Local Pod and Node, to Pod (hostNetwork: true)": { + "average_duration": 24 + }, + "[sig-network] Services should respect internalTrafficPolicy=Local Pod and Node, to Pod (hostNetwork: true) [Feature:ServiceInternalTrafficPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-network] Services should respect internalTrafficPolicy=Local Pod and Node, to Pod (hostNetwork: true) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 29 + }, + "[sig-network] Services should respect internalTrafficPolicy=Local Pod to Pod": { + "average_duration": 15 + }, + "[sig-network] Services should respect internalTrafficPolicy=Local Pod to Pod [Feature:ServiceInternalTrafficPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-network] Services should respect internalTrafficPolicy=Local Pod to Pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-network] Services should serve a basic endpoint from pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-network] Services should serve a basic endpoint from pods [Conformance]": { + "average_duration": 16 + }, + "[sig-network] Services should serve a basic endpoint from pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-network] Services should serve endpoints on same port and different protocol for internal traffic on Type LoadBalancer ": { + "average_duration": 13 + }, + "[sig-network] Services should serve endpoints on same port and different protocol for internal traffic on Type LoadBalancer [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-network] Services should serve endpoints on same port and different protocols [Conformance]": { + "average_duration": 28 + }, + "[sig-network] Services should serve endpoints on same port and different protocols [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-network] Services should serve endpoints on same port and different protocols [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 51 + }, + "[sig-network] Services should serve multiport endpoints from pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-network] Services should serve multiport endpoints from pods [Conformance]": { + "average_duration": 14 + }, + "[sig-network] Services should serve multiport endpoints from pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-network] Services should support externalTrafficPolicy=Local for type=NodePort": { + "average_duration": 6 + }, + "[sig-network] Services should support externalTrafficPolicy=Local for type=NodePort [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-network] Services should test the lifecycle of an Endpoint [Conformance]": { + "average_duration": 1 + }, + "[sig-network] Services should test the lifecycle of an Endpoint [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-network] Services should work after the service has been recreated": { + "average_duration": 19 + }, + "[sig-network] Services should work after the service has been recreated [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should be able to handle large requests: http": { + "average_duration": 25 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should be able to handle large requests: http [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should be able to handle large requests: udp": { + "average_duration": 26 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should be able to handle large requests: udp [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should function for client IP based session affinity: http [LinuxOnly]": { + "average_duration": 51 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should function for client IP based session affinity: http [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 58 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should function for client IP based session affinity: udp [LinuxOnly]": { + "average_duration": 55 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should function for client IP based session affinity: udp [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 60 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should function for endpoint-Service: http": { + "average_duration": 44 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should function for endpoint-Service: http [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 50 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should function for endpoint-Service: udp": { + "average_duration": 46 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should function for endpoint-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 50 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should function for node-Service: http": { + "average_duration": 44 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should function for node-Service: http [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 53 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should function for node-Service: udp": { + "average_duration": 55 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should function for node-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 60 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should function for pod-Service: http": { + "average_duration": 45 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should function for pod-Service: http [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 53 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should function for pod-Service: udp": { + "average_duration": 44 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should function for pod-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 55 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should function for service endpoints using hostNetwork": { + "average_duration": 102 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should function for service endpoints using hostNetwork [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 118 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should update endpoints: http": { + "average_duration": 136 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should update endpoints: http [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 141 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should update endpoints: udp": { + "average_duration": 136 + }, + "[sig-network] [Feature:IPv6DualStack] Granular Checks: Services Secondary IP Family [LinuxOnly] should update endpoints: udp [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 141 + }, + "[sig-network] [Feature:IPv6DualStack] should be able to reach pod on ipv4 and ipv6 ip": { + "average_duration": 155 + }, + "[sig-network] [Feature:IPv6DualStack] should be able to reach pod on ipv4 and ipv6 ip [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 150 + }, + "[sig-network] [Feature:IPv6DualStack] should create a single stack service with cluster ip from primary service range": { + "average_duration": 7 + }, + "[sig-network] [Feature:IPv6DualStack] should create a single stack service with cluster ip from primary service range [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-network] [Feature:IPv6DualStack] should create pod, add ipv6 and ipv4 ip to host ips": { + "average_duration": 6 + }, + "[sig-network] [Feature:IPv6DualStack] should create pod, add ipv6 and ipv4 ip to host ips [Feature:PodHostIPs] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-network] [Feature:IPv6DualStack] should create pod, add ipv6 and ipv4 ip to host ips [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-network] [Feature:IPv6DualStack] should create pod, add ipv6 and ipv4 ip to pod ips": { + "average_duration": 7 + }, + "[sig-network] [Feature:IPv6DualStack] should create pod, add ipv6 and ipv4 ip to pod ips [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-network] [Feature:IPv6DualStack] should create service with ipv4 cluster ip": { + "average_duration": 7 + }, + "[sig-network] [Feature:IPv6DualStack] should create service with ipv4 cluster ip [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-network] [Feature:IPv6DualStack] should create service with ipv4,v6 cluster ip": { + "average_duration": 6 + }, + "[sig-network] [Feature:IPv6DualStack] should create service with ipv4,v6 cluster ip [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-network] [Feature:IPv6DualStack] should create service with ipv6 cluster ip": { + "average_duration": 7 + }, + "[sig-network] [Feature:IPv6DualStack] should create service with ipv6 cluster ip [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-network] [Feature:IPv6DualStack] should create service with ipv6,v4 cluster ip": { + "average_duration": 7 + }, + "[sig-network] [Feature:IPv6DualStack] should create service with ipv6,v4 cluster ip [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-network] [Feature:IPv6DualStack] should have ipv4 and ipv6 internal node ip": { + "average_duration": 1 + }, + "[sig-network] [Feature:IPv6DualStack] should have ipv4 and ipv6 internal node ip [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-network] can collect host-to-host poller pod logs": { + "average_duration": 0 + }, + "[sig-network] can collect host-to-pod poller pod logs": { + "average_duration": 0 + }, + "[sig-network] can collect host-to-service poller pod logs": { + "average_duration": 0 + }, + "[sig-network] can collect network.openshift.io/disruption-actor=poller,network.openshift.io/disruption-target=host-to-host poller pod logs": { + "average_duration": 0 + }, + "[sig-network] can collect network.openshift.io/disruption-actor=poller,network.openshift.io/disruption-target=host-to-pod poller pod logs": { + "average_duration": 0 + }, + "[sig-network] can collect network.openshift.io/disruption-actor=poller,network.openshift.io/disruption-target=host-to-service poller pod logs": { + "average_duration": 0 + }, + "[sig-network] can collect network.openshift.io/disruption-actor=poller,network.openshift.io/disruption-target=pod-to-host poller pod logs": { + "average_duration": 0 + }, + "[sig-network] can collect network.openshift.io/disruption-actor=poller,network.openshift.io/disruption-target=pod-to-pod poller pod logs": { + "average_duration": 0 + }, + "[sig-network] can collect network.openshift.io/disruption-actor=poller,network.openshift.io/disruption-target=pod-to-service poller pod logs": { + "average_duration": 0 + }, + "[sig-network] can collect pod-to-host poller pod logs": { + "average_duration": 0 + }, + "[sig-network] can collect pod-to-pod network disruption": { + "average_duration": 0 + }, + "[sig-network] can collect pod-to-pod poller pod logs": { + "average_duration": 0 + }, + "[sig-network] can collect pod-to-service poller pod logs": { + "average_duration": 0 + }, + "[sig-network] external gateway address when using openshift ovn-kubernetes should match the address family of the pod [Suite:openshift/conformance/parallel]": { + "average_duration": 129 + }, + "[sig-network] load balancer should be managed by OpenShift [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-network] load balancer should not be managed by OpenShift [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-network] multicast when using one of the OpenshiftSDN modes 'redhat/openshift-ovs-multitenant, redhat/openshift-ovs-networkpolicy' should allow multicast traffic in namespaces where it is enabled [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-network] multicast when using one of the OpenshiftSDN modes 'redhat/openshift-ovs-multitenant, redhat/openshift-ovs-networkpolicy' should block multicast traffic in namespaces where it is disabled [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-network] multicast when using one of the OpenshiftSDN modes 'redhat/openshift-ovs-subnet' should block multicast traffic [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network] network isolation when using a plugin in a mode that does not isolate namespaces by default should allow communication between pods in different namespaces on different nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 17 + }, + "[sig-network] network isolation when using a plugin in a mode that does not isolate namespaces by default should allow communication between pods in different namespaces on the same node [Suite:openshift/conformance/parallel]": { + "average_duration": 16 + }, + "[sig-network] network isolation when using a plugin in a mode that isolates namespaces by default should allow communication from default to non-default namespace on a different node [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network] network isolation when using a plugin in a mode that isolates namespaces by default should allow communication from default to non-default namespace on the same node [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network] network isolation when using a plugin in a mode that isolates namespaces by default should allow communication from non-default to default namespace on a different node [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network] network isolation when using a plugin in a mode that isolates namespaces by default should allow communication from non-default to default namespace on the same node [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network] network isolation when using a plugin in a mode that isolates namespaces by default should prevent communication between pods in different namespaces on different nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network] network isolation when using a plugin in a mode that isolates namespaces by default should prevent communication between pods in different namespaces on the same node [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network] ovs-vswitchd should not log any unreasonably long poll intervals to system journal": { + "average_duration": 0 + }, + "[sig-network] pods should successfully create sandboxes by adding pod to network": { + "average_duration": 0 + }, + "[sig-network] pods should successfully create sandboxes by binding hostport": { + "average_duration": 0 + }, + "[sig-network] pods should successfully create sandboxes by getting pod": { + "average_duration": 0 + }, + "[sig-network] pods should successfully create sandboxes by initializing docker source": { + "average_duration": 0 + }, + "[sig-network] pods should successfully create sandboxes by not timing out": { + "average_duration": 0 + }, + "[sig-network] pods should successfully create sandboxes by other": { + "average_duration": 0 + }, + "[sig-network] pods should successfully create sandboxes by ovn default network ready": { + "average_duration": 0 + }, + "[sig-network] pods should successfully create sandboxes by pinging container registry": { + "average_duration": 0 + }, + "[sig-network] pods should successfully create sandboxes by reading container": { + "average_duration": 0 + }, + "[sig-network] pods should successfully create sandboxes by writing child": { + "average_duration": 0 + }, + "[sig-network] pods should successfully create sandboxes by writing network status": { + "average_duration": 0 + }, + "[sig-network] services basic functionality should allow connections to another pod on a different node via a service IP [Suite:openshift/conformance/parallel]": { + "average_duration": 20 + }, + "[sig-network] services basic functionality should allow connections to another pod on a different node via a service IP [Suite:openshift/conformance/parallel]": { + "average_duration": 13 + }, + "[sig-network] services basic functionality should allow connections to another pod on the same node via a service IP [Suite:openshift/conformance/parallel]": { + "average_duration": 19 + }, + "[sig-network] services basic functionality should allow connections to another pod on the same node via a service IP [Suite:openshift/conformance/parallel]": { + "average_duration": 14 + }, + "[sig-network] services when running openshift ipv4 cluster ensures external ip policy is configured correctly on the cluster [apigroup:config.openshift.io] [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 1085 + }, + "[sig-network] services when running openshift ipv4 cluster on bare metal [apigroup:config.openshift.io] ensures external auto assign cidr is configured correctly on the cluster [apigroup:config.openshift.io] [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 105 + }, + "[sig-network] services when using a plugin in a mode that does not isolate namespaces by default should allow connections to pods in different namespaces on different nodes via service IPs [Suite:openshift/conformance/parallel]": { + "average_duration": 20 + }, + "[sig-network] services when using a plugin in a mode that does not isolate namespaces by default should allow connections to pods in different namespaces on different nodes via service IPs [Suite:openshift/conformance/parallel]": { + "average_duration": 15 + }, + "[sig-network] services when using a plugin in a mode that does not isolate namespaces by default should allow connections to pods in different namespaces on the same node via service IPs [Suite:openshift/conformance/parallel]": { + "average_duration": 19 + }, + "[sig-network] services when using a plugin in a mode that does not isolate namespaces by default should allow connections to pods in different namespaces on the same node via service IPs [Suite:openshift/conformance/parallel]": { + "average_duration": 16 + }, + "[sig-network] services when using a plugin in a mode that isolates namespaces by default should allow connections from pods in the default namespace to a service in another namespace on a different node [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network] services when using a plugin in a mode that isolates namespaces by default should allow connections from pods in the default namespace to a service in another namespace on the same node [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network] services when using a plugin in a mode that isolates namespaces by default should allow connections to services in the default namespace from a pod in another namespace on a different node [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network] services when using a plugin in a mode that isolates namespaces by default should allow connections to services in the default namespace from a pod in another namespace on the same node [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network] services when using a plugin in a mode that isolates namespaces by default should prevent connections to pods in different namespaces on different nodes via service IPs [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network] services when using a plugin in a mode that isolates namespaces by default should prevent connections to pods in different namespaces on the same node via service IPs [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network] there should be nearly zero single second disruptions for cache-kube-api-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for cache-kube-api-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for cache-oauth-api-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for cache-oauth-api-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for cache-openshift-api-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for cache-openshift-api-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for disruption/cache-kube-api connection/new": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for disruption/cache-kube-api connection/reused": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for disruption/cache-oauth-api connection/new": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for disruption/cache-oauth-api connection/reused": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for disruption/cache-openshift-api connection/new": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for disruption/cache-openshift-api connection/reused": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for disruption/kube-api connection/new": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for disruption/kube-api connection/reused": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for disruption/oauth-api connection/new": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for disruption/oauth-api connection/reused": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for disruption/openshift-api connection/new": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for disruption/openshift-api connection/reused": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for ingress-to-console-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for ingress-to-console-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for ingress-to-oauth-server-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for ingress-to-oauth-server-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for kube-api-http1-internal-lb-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for kube-api-http1-internal-lb-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for kube-api-http1-service-network-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for kube-api-http1-service-network-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for kube-api-http2-internal-lb-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for kube-api-http2-internal-lb-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for kube-api-http2-service-network-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for kube-api-http2-service-network-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for kube-api-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for kube-api-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for metrics-api-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for metrics-api-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for ns/openshift-authentication route/oauth-openshift disruption/ingress-to-oauth-server connection/new": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for ns/openshift-authentication route/oauth-openshift disruption/ingress-to-oauth-server connection/reused": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for ns/openshift-console route/console disruption/ingress-to-console connection/new": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for ns/openshift-console route/console disruption/ingress-to-console connection/reused": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for oauth-api-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for oauth-api-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for openshift-api-http2-internal-lb-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for openshift-api-http2-internal-lb-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for openshift-api-http2-service-network-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for openshift-api-http2-service-network-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for openshift-api-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be nearly zero single second disruptions for openshift-api-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for cache-kube-api-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for cache-kube-api-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for cache-oauth-api-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for cache-oauth-api-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for cache-openshift-api-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for cache-openshift-api-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for disruption/cache-kube-api connection/new": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for disruption/cache-kube-api connection/reused": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for disruption/cache-oauth-api connection/new": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for disruption/cache-oauth-api connection/reused": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for disruption/cache-openshift-api connection/new": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for disruption/cache-openshift-api connection/reused": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for disruption/kube-api connection/new": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for disruption/kube-api connection/reused": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for disruption/oauth-api connection/new": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for disruption/oauth-api connection/reused": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for disruption/openshift-api connection/new": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for disruption/openshift-api connection/reused": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for ingress-to-console-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for ingress-to-console-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for ingress-to-oauth-server-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for ingress-to-oauth-server-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for kube-api-http1-internal-lb-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for kube-api-http1-internal-lb-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for kube-api-http1-service-network-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for kube-api-http1-service-network-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for kube-api-http2-internal-lb-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for kube-api-http2-internal-lb-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for kube-api-http2-service-network-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for kube-api-http2-service-network-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for kube-api-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for kube-api-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for metrics-api-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for metrics-api-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for ns/openshift-authentication route/oauth-openshift disruption/ingress-to-oauth-server connection/new": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for ns/openshift-authentication route/oauth-openshift disruption/ingress-to-oauth-server connection/reused": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for ns/openshift-console route/console disruption/ingress-to-console connection/new": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for ns/openshift-console route/console disruption/ingress-to-console connection/reused": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for oauth-api-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for oauth-api-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for openshift-api-http2-internal-lb-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for openshift-api-http2-internal-lb-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for openshift-api-http2-service-network-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for openshift-api-http2-service-network-reused-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for openshift-api-new-connections": { + "average_duration": 0 + }, + "[sig-network] there should be reasonably few single second disruptions for openshift-api-reused-connections": { + "average_duration": 0 + }, + "[sig-network][Feature:EgressFirewall] egressFirewall should have no impact outside its namespace [Suite:openshift/conformance/parallel]": { + "average_duration": 14 + }, + "[sig-network][Feature:EgressFirewall] egressFirewall should have no impact outside its namespace [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 31 + }, + "[sig-network][Feature:EgressFirewall] when using openshift ovn-kubernetes should ensure egressfirewall is created [Suite:openshift/conformance/parallel]": { + "average_duration": 24 + }, + "[sig-network][Feature:EgressFirewall] when using openshift ovn-kubernetes should ensure egressfirewall is created [Suite:openshift/conformance/parallel]": { + "average_duration": 23 + }, + "[sig-network][Feature:EgressFirewall] when using openshift-sdn should ensure egressnetworkpolicy is created [apigroup:network.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 15 + }, + "[sig-network][Feature:EgressFirewall] when using openshift-sdn should ensure egressnetworkpolicy is created [apigroup:network.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-network][Feature:EgressIP][apigroup:config.openshift.io] [external-targets][apigroup:user.openshift.io][apigroup:security.openshift.io] EgressIPs can be assigned automatically [Skipped:Network/OVNKubernetes] [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 32 + }, + "[sig-network][Feature:EgressIP][apigroup:config.openshift.io] [external-targets][apigroup:user.openshift.io][apigroup:security.openshift.io] only pods matched by the pod selector should have the EgressIPs [Skipped:Network/OpenShiftSDN] [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 52 + }, + "[sig-network][Feature:EgressIP][apigroup:config.openshift.io] [external-targets][apigroup:user.openshift.io][apigroup:security.openshift.io] pods should have the assigned EgressIPs and EgressIPs can be deleted and recreated [Skipped:azure][apigroup:route.openshift.io] [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 76 + }, + "[sig-network][Feature:EgressIP][apigroup:config.openshift.io] [external-targets][apigroup:user.openshift.io][apigroup:security.openshift.io] pods should have the assigned EgressIPs and EgressIPs can be updated [Skipped:Network/OpenShiftSDN] [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 49 + }, + "[sig-network][Feature:EgressIP][apigroup:config.openshift.io] [external-targets][apigroup:user.openshift.io][apigroup:security.openshift.io] pods should keep the assigned EgressIPs when being rescheduled to another node [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 47 + }, + "[sig-network][Feature:EgressIP][apigroup:operator.openshift.io] [external-targets][apigroup:user.openshift.io][apigroup:security.openshift.io] EgressIPs can be assigned automatically [Skipped:Network/OVNKubernetes] [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 33 + }, + "[sig-network][Feature:EgressIP][apigroup:operator.openshift.io] [external-targets][apigroup:user.openshift.io][apigroup:security.openshift.io] only pods matched by the pod selector should have the EgressIPs [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 32 + }, + "[sig-network][Feature:EgressIP][apigroup:operator.openshift.io] [external-targets][apigroup:user.openshift.io][apigroup:security.openshift.io] only pods matched by the pod selector should have the EgressIPs [Skipped:Network/OpenShiftSDN] [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 35 + }, + "[sig-network][Feature:EgressIP][apigroup:operator.openshift.io] [external-targets][apigroup:user.openshift.io][apigroup:security.openshift.io] pods should have the assigned EgressIPs and EgressIPs can be deleted and recreated [Skipped:azure][apigroup:route.openshift.io] [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 40 + }, + "[sig-network][Feature:EgressIP][apigroup:operator.openshift.io] [external-targets][apigroup:user.openshift.io][apigroup:security.openshift.io] pods should have the assigned EgressIPs and EgressIPs can be updated [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 32 + }, + "[sig-network][Feature:EgressIP][apigroup:operator.openshift.io] [external-targets][apigroup:user.openshift.io][apigroup:security.openshift.io] pods should have the assigned EgressIPs and EgressIPs can be updated [Skipped:Network/OpenShiftSDN] [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 34 + }, + "[sig-network][Feature:EgressIP][apigroup:operator.openshift.io] [external-targets][apigroup:user.openshift.io][apigroup:security.openshift.io] pods should keep the assigned EgressIPs when being rescheduled to another node [Serial] [Skipped:Network/OVNKubernetes] [Suite:openshift/conformance/serial]": { + "average_duration": 51 + }, + "[sig-network][Feature:EgressIP][apigroup:operator.openshift.io] [external-targets][apigroup:user.openshift.io][apigroup:security.openshift.io] pods should keep the assigned EgressIPs when being rescheduled to another node [Serial] [Suite:openshift/conformance/serial]": { + "average_duration": 31 + }, + "[sig-network][Feature:EgressRouterCNI] should ensure ipv4 egressrouter cni resources are created [apigroup:operator.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 11 + }, + "[sig-network][Feature:EgressRouterCNI] when using openshift ovn-kubernetes should ensure ipv6 egressrouter cni resources are created [apigroup:operator.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 11 + }, + "[sig-network][Feature:IPsec] IPsec resilience when using openshift ovn-kubernetes check pod traffic is working across nodes [apigroup:config.openshift.io] [Suite:openshift/network/ipsec]": { + "average_duration": 8 + }, + "[sig-network][Feature:IPsec] IPsec resilience when using openshift ovn-kubernetes check pod traffic is working across nodes after ipsec daemonset restart [apigroup:config.openshift.io] [Suite:openshift/network/ipsec]": { + "average_duration": 526 + }, + "[sig-network][Feature:IPsec] when using openshift ovn-kubernetes check traffic with IPsec [apigroup:config.openshift.io] [Suite:openshift/network/ipsec]": { + "average_duration": 378 + }, + "[sig-network][Feature:Layer2LiveMigration][OCPFeatureGate:NetworkSegmentation][Suite:openshift/network/virtualization] primary UDN smoke test when using openshift ovn-kubernetes assert the primary UDN feature works as expected": { + "average_duration": 29 + }, + "[sig-network][Feature:Layer2LiveMigration][Suite:openshift/network/virtualization] Kubevirt Virtual Machines Placeholder test for GA": { + "average_duration": 0 + }, + "[sig-network][Feature:MultiNetworkPolicy][Serial][apigroup:operator.openshift.io] should enforce a network policies on secondary network IPv4 [Suite:openshift/conformance/serial]": { + "average_duration": 5 + }, + "[sig-network][Feature:MultiNetworkPolicy][Serial][apigroup:operator.openshift.io] should enforce a network policies on secondary network IPv6 [Suite:openshift/conformance/serial]": { + "average_duration": 9 + }, + "[sig-network][Feature:Multus] should use multus to create net1 device from network-attachment-definition [apigroup:k8s.cni.cncf.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-network][Feature:Network Policy Audit logging] when using openshift ovn-kubernetes should ensure acl logs are created and correct [apigroup:project.openshift.io][apigroup:network.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 13 + }, + "[sig-network][Feature:Router] The HAProxy router should enable openshift-monitoring to pull metrics [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 12 + }, + "[sig-network][Feature:Router] The HAProxy router should enable openshift-monitoring to pull metrics [Suite:openshift/conformance/parallel]": { + "average_duration": 8 + }, + "[sig-network][Feature:Router] The HAProxy router should expose a health check on the metrics port [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 10 + }, + "[sig-network][Feature:Router] The HAProxy router should expose a health check on the metrics port [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-network][Feature:Router] The HAProxy router should expose prometheus metrics for a route [apigroup:route.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 48 + }, + "[sig-network][Feature:Router] The HAProxy router should expose prometheus metrics for a route [apigroup:route.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 41 + }, + "[sig-network][Feature:Router] The HAProxy router should expose the profiling endpoints [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 11 + }, + "[sig-network][Feature:Router] The HAProxy router should expose the profiling endpoints [Suite:openshift/conformance/parallel]": { + "average_duration": 7 + }, + "[sig-network][Feature:Router][apigroup:config.openshift.io] The HAProxy router should enable openshift-monitoring to pull metrics [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 18 + }, + "[sig-network][Feature:Router][apigroup:config.openshift.io] The HAProxy router should expose a health check on the metrics port [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 16 + }, + "[sig-network][Feature:Router][apigroup:config.openshift.io] The HAProxy router should expose prometheus metrics for a route [apigroup:route.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 57 + }, + "[sig-network][Feature:Router][apigroup:config.openshift.io] The HAProxy router should expose the profiling endpoints [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 18 + }, + "[sig-network][Feature:Router][apigroup:config.openshift.io][apigroup:image.openshift.io] The HAProxy router should serve a route that points to two services and respect weights [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 139 + }, + "[sig-network][Feature:Router][apigroup:config.openshift.io][apigroup:operator.openshift.io][apigroup:apps.openshift.io] The HAProxy router should set Forwarded headers appropriately [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 35 + }, + "[sig-network][Feature:Router][apigroup:image.openshift.io] The HAProxy router should serve a route that points to two services and respect weights [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 123 + }, + "[sig-network][Feature:Router][apigroup:image.openshift.io] The HAProxy router should serve a route that points to two services and respect weights [Suite:openshift/conformance/parallel]": { + "average_duration": 110 + }, + "[sig-network][Feature:Router][apigroup:operator.openshift.io] The HAProxy router should respond with 503 to unrecognized hosts [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 11 + }, + "[sig-network][Feature:Router][apigroup:operator.openshift.io] The HAProxy router should respond with 503 to unrecognized hosts [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-network][Feature:Router][apigroup:operator.openshift.io] The HAProxy router should serve routes that were created from an ingress [apigroup:route.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 19 + }, + "[sig-network][Feature:Router][apigroup:operator.openshift.io] The HAProxy router should serve routes that were created from an ingress [apigroup:route.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 11 + }, + "[sig-network][Feature:Router][apigroup:operator.openshift.io] The HAProxy router should set Forwarded headers appropriately [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 20 + }, + "[sig-network][Feature:Router][apigroup:operator.openshift.io] The HAProxy router should set Forwarded headers appropriately [Suite:openshift/conformance/parallel]": { + "average_duration": 16 + }, + "[sig-network][Feature:Router][apigroup:operator.openshift.io][apigroup:apps.openshift.io] The HAProxy router should respond with 503 to unrecognized hosts [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 15 + }, + "[sig-network][Feature:Router][apigroup:operator.openshift.io][apigroup:apps.openshift.io] The HAProxy router should serve routes that were created from an ingress [apigroup:route.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 24 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io] The HAProxy router converges when multiple routers are writing conflicting status [Suite:openshift/conformance/parallel]": { + "average_duration": 69 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io] The HAProxy router converges when multiple routers are writing conflicting upgrade validation status [Suite:openshift/conformance/parallel]": { + "average_duration": 79 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io] The HAProxy router converges when multiple routers are writing status [Suite:openshift/conformance/parallel]": { + "average_duration": 34 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io] The HAProxy router reports the expected host names in admitted routes' statuses [Suite:openshift/conformance/parallel]": { + "average_duration": 15 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io] The HAProxy router should override the route host for overridden domains with a custom value [apigroup:image.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 36 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io] The HAProxy router should override the route host for overridden domains with a custom value [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 29 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io] The HAProxy router should override the route host with a custom value [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 36 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io] The HAProxy router should override the route host with a custom value [Suite:openshift/conformance/parallel]": { + "average_duration": 27 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io] The HAProxy router should run even if it has no access to update status [apigroup:image.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 25 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io] The HAProxy router should run even if it has no access to update status [apigroup:image.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 18 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io] The HAProxy router should serve the correct routes when running with the haproxy config manager [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io] The HAProxy router should serve the correct routes when scoped to a single namespace and label set [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 36 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io] The HAProxy router should serve the correct routes when scoped to a single namespace and label set [Suite:openshift/conformance/parallel]": { + "average_duration": 27 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io] when FIPS is disabled the HAProxy router should serve routes when configured with a 1024-bit RSA key [Feature:Networking-IPv4] [Suite:openshift/conformance/parallel]": { + "average_duration": 26 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io] when FIPS is disabled the HAProxy router should serve routes when configured with a 1024-bit RSA key [Suite:openshift/conformance/parallel]": { + "average_duration": 26 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io] when FIPS is enabled the HAProxy router should not work when configured with a 1024-bit RSA key [Suite:openshift/conformance/parallel]": { + "average_duration": 13 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io][apigroup:config.openshift.io] The HAProxy router reports the expected host names in admitted routes' statuses [Suite:openshift/conformance/parallel]": { + "average_duration": 25 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io][apigroup:config.openshift.io] The HAProxy router should run even if it has no access to update status [apigroup:image.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 34 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io][apigroup:config.openshift.io] The HAProxy router should serve the correct routes when running with the haproxy config manager [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io][apigroup:operator.openshift.io] The HAProxy router should support reencrypt to services backed by a serving certificate automatically [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 24 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io][apigroup:operator.openshift.io] The HAProxy router should support reencrypt to services backed by a serving certificate automatically [Suite:openshift/conformance/parallel]": { + "average_duration": 21 + }, + "[sig-network][Feature:Router][apigroup:route.openshift.io][apigroup:operator.openshift.io][apigroup:apps.openshift.io] The HAProxy router should support reencrypt to services backed by a serving certificate automatically [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 30 + }, + "[sig-network][Feature:Whereabouts] should assign unique IP addresses to each pod in the event of a race condition case [apigroup:k8s.cni.cncf.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 21 + }, + "[sig-network][Feature:Whereabouts] should use whereabouts net-attach-def to limit IP ranges for newly created pods [apigroup:k8s.cni.cncf.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 51 + }, + "[sig-network][Feature:bond] should create a pod with bond interface [Suite:openshift/conformance/parallel]": { + "average_duration": 28 + }, + "[sig-network][Feature:bond] should create a pod with bond interface [apigroup:k8s.cni.cncf.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 13 + }, + "[sig-network][Feature:commatrix][apigroup:config.openshift.io][Serial] should validate the communication matrix ports match the node's listening ports [Suite:openshift/conformance/serial]": { + "average_duration": 17 + }, + "[sig-network][Feature:tap] should create a pod with a tap interface [apigroup:k8s.cni.cncf.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 11 + }, + "[sig-network][Feature:tuning] pod should not start for sysctls not on whitelist [apigroup:k8s.cni.cncf.io] net.ipv4.conf.IFNAME.arp_filter [Suite:openshift/conformance/parallel]": { + "average_duration": 17 + }, + "[sig-network][Feature:tuning] pod should not start for sysctls not on whitelist [apigroup:k8s.cni.cncf.io] net.ipv4.conf.all.send_redirects [Suite:openshift/conformance/parallel]": { + "average_duration": 17 + }, + "[sig-network][Feature:tuning] pod should start with all sysctl on whitelist [apigroup:k8s.cni.cncf.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 12 + }, + "[sig-network][Feature:tuning] pod sysctl should not affect existing pods [apigroup:k8s.cni.cncf.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 14 + }, + "[sig-network][Feature:tuning] pod sysctl should not affect newly created pods [apigroup:k8s.cni.cncf.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 19 + }, + "[sig-network][Feature:tuning] pod sysctls should not affect node [apigroup:k8s.cni.cncf.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 17 + }, + "[sig-network][Feature:tuning] sysctl allowlist update should start a pod with custom sysctl only when the sysctl is added to whitelist [Suite:openshift/conformance/parallel]": { + "average_duration": 29 + }, + "[sig-network][Feature:vlan] should create pingable pods with ipvlan interface on an in-container master [apigroup:k8s.cni.cncf.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 17 + }, + "[sig-network][Feature:vlan] should create pingable pods with macvlan interface on an in-container master [apigroup:k8s.cni.cncf.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 18 + }, + "[sig-network][Feature:vlan] should create pingable pods with vlan interface on an in-container master [apigroup:k8s.cni.cncf.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 17 + }, + "[sig-network][OCPFeatureGate:DNSNameResolver][Feature:EgressFirewall] when using openshift ovn-kubernetes should ensure egressfirewall with wildcard dns rules is created [Suite:openshift/conformance/parallel]": { + "average_duration": 25 + }, + "[sig-network][OCPFeatureGate:GatewayAPI][Feature:Router][apigroup:gateway.networking.k8s.io] Verify Gateway API CRDs and ensure CRD of experimental group can not be created [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-network][OCPFeatureGate:GatewayAPI][Feature:Router][apigroup:gateway.networking.k8s.io] Verify Gateway API CRDs and ensure CRD of experimental group is not installed [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-network][OCPFeatureGate:GatewayAPI][Feature:Router][apigroup:gateway.networking.k8s.io] Verify Gateway API CRDs and ensure CRD of standard group can not be created [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-network][OCPFeatureGate:GatewayAPI][Feature:Router][apigroup:gateway.networking.k8s.io] Verify Gateway API CRDs and ensure existing CRDs can not be deleted [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-network][OCPFeatureGate:GatewayAPI][Feature:Router][apigroup:gateway.networking.k8s.io] Verify Gateway API CRDs and ensure existing CRDs can not be updated [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network][OCPFeatureGate:GatewayAPI][Feature:Router][apigroup:gateway.networking.k8s.io] Verify Gateway API CRDs and ensure required CRDs should already be installed [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-network][OCPFeatureGate:NetworkDiagnosticsConfig][Serial] Should be enabled by default [Suite:openshift/conformance/serial]": { + "average_duration": 9 + }, + "[sig-network][OCPFeatureGate:NetworkDiagnosticsConfig][Serial] Should function without any target pods [Suite:openshift/conformance/serial]": { + "average_duration": 36 + }, + "[sig-network][OCPFeatureGate:NetworkDiagnosticsConfig][Serial] Should move the source diagnostics pods based on the new selector and tolerations [Suite:openshift/conformance/serial]": { + "average_duration": 30 + }, + "[sig-network][OCPFeatureGate:NetworkDiagnosticsConfig][Serial] Should move the target diagnostics pods based on the new selector and tolerations [Suite:openshift/conformance/serial]": { + "average_duration": 32 + }, + "[sig-network][OCPFeatureGate:NetworkDiagnosticsConfig][Serial] Should remove all network diagnostics pods when disabled [Suite:openshift/conformance/serial]": { + "average_duration": 37 + }, + "[sig-network][OCPFeatureGate:NetworkDiagnosticsConfig][Serial] Should set the condition to false if there are no nodes able to host the source pods [Suite:openshift/conformance/serial]": { + "average_duration": 31 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] EndpointSlices mirroring when using openshift ovn-kubernetes created using NetworkAttachmentDefinitions does not mirror EndpointSlices in namespaces not using user defined primary networks L2 dualstack primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 25 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] EndpointSlices mirroring when using openshift ovn-kubernetes created using NetworkAttachmentDefinitions does not mirror EndpointSlices in namespaces not using user defined primary networks L3 dualstack primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 26 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] EndpointSlices mirroring when using openshift ovn-kubernetes created using NetworkAttachmentDefinitions mirrors EndpointSlices managed by the default controller for namespaces with user defined primary networks L2 primary UDN, cluster-networked pods [Suite:openshift/conformance/parallel]": { + "average_duration": 38 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] EndpointSlices mirroring when using openshift ovn-kubernetes created using NetworkAttachmentDefinitions mirrors EndpointSlices managed by the default controller for namespaces with user defined primary networks L2 primary UDN, host-networked pods [Suite:openshift/conformance/parallel]": { + "average_duration": 33 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] EndpointSlices mirroring when using openshift ovn-kubernetes created using NetworkAttachmentDefinitions mirrors EndpointSlices managed by the default controller for namespaces with user defined primary networks L3 primary UDN, cluster-networked pods [Suite:openshift/conformance/parallel]": { + "average_duration": 39 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] EndpointSlices mirroring when using openshift ovn-kubernetes created using NetworkAttachmentDefinitions mirrors EndpointSlices managed by the default controller for namespaces with user defined primary networks L3 primary UDN, host-networked pods [Suite:openshift/conformance/parallel]": { + "average_duration": 33 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] EndpointSlices mirroring when using openshift ovn-kubernetes created using UserDefinedNetwork does not mirror EndpointSlices in namespaces not using user defined primary networks L2 dualstack primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 26 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] EndpointSlices mirroring when using openshift ovn-kubernetes created using UserDefinedNetwork does not mirror EndpointSlices in namespaces not using user defined primary networks L3 dualstack primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 25 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] EndpointSlices mirroring when using openshift ovn-kubernetes created using UserDefinedNetwork mirrors EndpointSlices managed by the default controller for namespaces with user defined primary networks L2 primary UDN, cluster-networked pods [Suite:openshift/conformance/parallel]": { + "average_duration": 37 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] EndpointSlices mirroring when using openshift ovn-kubernetes created using UserDefinedNetwork mirrors EndpointSlices managed by the default controller for namespaces with user defined primary networks L2 primary UDN, host-networked pods [Suite:openshift/conformance/parallel]": { + "average_duration": 34 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] EndpointSlices mirroring when using openshift ovn-kubernetes created using UserDefinedNetwork mirrors EndpointSlices managed by the default controller for namespaces with user defined primary networks L3 primary UDN, cluster-networked pods [Suite:openshift/conformance/parallel]": { + "average_duration": 38 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] EndpointSlices mirroring when using openshift ovn-kubernetes created using UserDefinedNetwork mirrors EndpointSlices managed by the default controller for namespaces with user defined primary networks L3 primary UDN, host-networked pods [Suite:openshift/conformance/parallel]": { + "average_duration": 34 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] Network Policies when using openshift ovn-kubernetes allow ingress traffic to one pod from a particular namespace in L2 primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 33 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] Network Policies when using openshift ovn-kubernetes allow ingress traffic to one pod from a particular namespace in L3 primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 34 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] Network Policies when using openshift ovn-kubernetes pods within namespace should be isolated when deny policy is present in L2 dualstack primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 19 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] Network Policies when using openshift ovn-kubernetes pods within namespace should be isolated when deny policy is present in L3 dualstack primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 20 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes ClusterUserDefinedNetwork CRD Controller pod connected to ClusterUserDefinedNetwork CR \u0026 managed NADs cannot be deleted when being used [Suite:openshift/conformance/parallel]": { + "average_duration": 17 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes ClusterUserDefinedNetwork CRD Controller should create NAD according to spec in each target namespace and report active namespaces [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes ClusterUserDefinedNetwork CRD Controller should create NAD in new created namespaces that apply to namespace-selector [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes ClusterUserDefinedNetwork CRD Controller when CR is deleted, should delete all managed NAD in each target namespace [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes ClusterUserDefinedNetwork CRD Controller when namespace-selector is mutated should create NAD in namespaces that apply to mutated namespace-selector [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes ClusterUserDefinedNetwork CRD Controller when namespace-selector is mutated should delete managed NAD in namespaces that no longer apply to namespace-selector [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes UDN Pod should react to k8s.ovn.org/open-default-ports annotations changes [Suite:openshift/conformance/parallel]": { + "average_duration": 51 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes UserDefinedNetwork CRD controller pod connected to UserDefinedNetwork cannot be deleted when being used [Suite:openshift/conformance/parallel]": { + "average_duration": 17 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes UserDefinedNetwork CRD controller should create NetworkAttachmentDefinition according to spec [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes UserDefinedNetwork CRD controller should delete NetworkAttachmentDefinition when UserDefinedNetwork is deleted [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes UserDefinedNetwork pod connected to UserDefinedNetwork cannot be deleted when being used [Suite:openshift/conformance/parallel]": { + "average_duration": 22 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes UserDefinedNetwork should create NetworkAttachmentDefinition according to spec [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes UserDefinedNetwork should delete NetworkAttachmentDefinition when UserDefinedNetwork is deleted [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes created using ClusterUserDefinedNetwork can perform east/west traffic between nodes for two pods connected over a L2 primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 20 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes created using ClusterUserDefinedNetwork can perform east/west traffic between nodes two pods connected over a L3 primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 20 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes created using ClusterUserDefinedNetwork is isolated from the default network with L2 primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 105 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes created using ClusterUserDefinedNetwork is isolated from the default network with L3 primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 106 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes created using ClusterUserDefinedNetwork isolates overlapping CIDRs with L2 primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 101 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes created using ClusterUserDefinedNetwork isolates overlapping CIDRs with L3 primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 210 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes created using NetworkAttachmentDefinitions can perform east/west traffic between nodes for two pods connected over a L2 primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 20 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes created using NetworkAttachmentDefinitions can perform east/west traffic between nodes two pods connected over a L3 primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 20 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes created using NetworkAttachmentDefinitions is isolated from the default network with L2 primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 104 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes created using NetworkAttachmentDefinitions is isolated from the default network with L3 primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 105 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes created using NetworkAttachmentDefinitions isolates overlapping CIDRs with L2 primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 102 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes created using NetworkAttachmentDefinitions isolates overlapping CIDRs with L3 primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 217 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes created using UserDefinedNetwork can perform east/west traffic between nodes for two pods connected over a L2 primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 20 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes created using UserDefinedNetwork can perform east/west traffic between nodes two pods connected over a L3 primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 19 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes created using UserDefinedNetwork is isolated from the default network with L2 primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 104 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes created using UserDefinedNetwork is isolated from the default network with L3 primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 105 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes created using UserDefinedNetwork isolates overlapping CIDRs with L2 primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 102 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes created using UserDefinedNetwork isolates overlapping CIDRs with L3 primary UDN [Suite:openshift/conformance/parallel]": { + "average_duration": 210 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes when primary network exist, ClusterUserDefinedNetwork status should report not-ready [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-network][OCPFeatureGate:NetworkSegmentation][Feature:UserDefinedPrimaryNetworks] when using openshift ovn-kubernetes when primary network exist, UserDefinedNetwork status should report not-ready [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using NetworkAttachmentDefinitions [Suite:openshift/network/virtualization] should keep ip [OCPFeatureGate:NetworkSegmentation] when the VM attached to a primary UDN is migrated between nodes": { + "average_duration": 151 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using NetworkAttachmentDefinitions [Suite:openshift/network/virtualization] should keep ip [OCPFeatureGate:NetworkSegmentation] when the VM attached to a primary UDN is restarted": { + "average_duration": 231 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using NetworkAttachmentDefinitions [Suite:openshift/network/virtualization] should keep ip [OCPFeatureGate:NetworkSegmentation] when the VMI attached to a primary UDN is migrated between nodes": { + "average_duration": 150 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using NetworkAttachmentDefinitions [Suite:openshift/network/virtualization] should keep ip [OCPFeatureGate:PreconfiguredUDNAddresses] when the VM with preconfigured IP address is created when the address is already taken": { + "average_duration": 134 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using NetworkAttachmentDefinitions [Suite:openshift/network/virtualization] should keep ip [OCPFeatureGate:PreconfiguredUDNAddresses] when the VM with preconfigured IP and MAC attached to a primary UDN is migrated between nodes": { + "average_duration": 153 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using NetworkAttachmentDefinitions [Suite:openshift/network/virtualization] should keep ip [OCPFeatureGate:PreconfiguredUDNAddresses] when the VM with preconfigured IPs attached to a primary UDN is restarted": { + "average_duration": 229 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using NetworkAttachmentDefinitions [Suite:openshift/network/virtualization] should keep ip [OCPFeatureGate:PreconfiguredUDNAddresses] when the VM with preconfigured MAC address is created when the address is already taken": { + "average_duration": 133 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using NetworkAttachmentDefinitions [Suite:openshift/network/virtualization] should keep ip [OCPFeatureGate:PreconfiguredUDNAddresses] when the VM with preconfigured MAC attached to a primary UDN is restarted": { + "average_duration": 231 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using NetworkAttachmentDefinitions [Suite:openshift/network/virtualization] should keep ip when the VM attached to a secondary UDN is migrated between nodes": { + "average_duration": 139 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using NetworkAttachmentDefinitions [Suite:openshift/network/virtualization] should keep ip when the VM attached to a secondary UDN is restarted": { + "average_duration": 219 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using NetworkAttachmentDefinitions [Suite:openshift/network/virtualization] should keep ip when the VMI attached to a secondary UDN is migrated between nodes": { + "average_duration": 139 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using [OCPFeatureGate:NetworkSegmentation] UserDefinedNetwork [Suite:openshift/network/virtualization] should keep ip [OCPFeatureGate:NetworkSegmentation] when the VM attached to a primary UDN is migrated between nodes": { + "average_duration": 162 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using [OCPFeatureGate:NetworkSegmentation] UserDefinedNetwork [Suite:openshift/network/virtualization] should keep ip [OCPFeatureGate:NetworkSegmentation] when the VM attached to a primary UDN is restarted": { + "average_duration": 231 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using [OCPFeatureGate:NetworkSegmentation] UserDefinedNetwork [Suite:openshift/network/virtualization] should keep ip [OCPFeatureGate:NetworkSegmentation] when the VMI attached to a primary UDN is migrated between nodes": { + "average_duration": 153 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using [OCPFeatureGate:NetworkSegmentation] UserDefinedNetwork [Suite:openshift/network/virtualization] should keep ip [OCPFeatureGate:PreconfiguredUDNAddresses] when the VM with preconfigured IP address is created when the address is already taken": { + "average_duration": 134 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using [OCPFeatureGate:NetworkSegmentation] UserDefinedNetwork [Suite:openshift/network/virtualization] should keep ip [OCPFeatureGate:PreconfiguredUDNAddresses] when the VM with preconfigured IP and MAC attached to a primary UDN is migrated between nodes": { + "average_duration": 151 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using [OCPFeatureGate:NetworkSegmentation] UserDefinedNetwork [Suite:openshift/network/virtualization] should keep ip [OCPFeatureGate:PreconfiguredUDNAddresses] when the VM with preconfigured IPs attached to a primary UDN is restarted": { + "average_duration": 231 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using [OCPFeatureGate:NetworkSegmentation] UserDefinedNetwork [Suite:openshift/network/virtualization] should keep ip [OCPFeatureGate:PreconfiguredUDNAddresses] when the VM with preconfigured MAC address is created when the address is already taken": { + "average_duration": 135 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using [OCPFeatureGate:NetworkSegmentation] UserDefinedNetwork [Suite:openshift/network/virtualization] should keep ip [OCPFeatureGate:PreconfiguredUDNAddresses] when the VM with preconfigured MAC attached to a primary UDN is restarted": { + "average_duration": 232 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using [OCPFeatureGate:NetworkSegmentation] UserDefinedNetwork [Suite:openshift/network/virtualization] should keep ip when the VM attached to a secondary UDN is migrated between nodes": { + "average_duration": 141 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using [OCPFeatureGate:NetworkSegmentation] UserDefinedNetwork [Suite:openshift/network/virtualization] should keep ip when the VM attached to a secondary UDN is restarted": { + "average_duration": 220 + }, + "[sig-network][OCPFeatureGate:PersistentIPsForVirtualization][Feature:Layer2LiveMigration] Kubevirt Virtual Machines when using openshift ovn-kubernetes with user defined networks and persistent ips configured created using [OCPFeatureGate:NetworkSegmentation] UserDefinedNetwork [Suite:openshift/network/virtualization] should keep ip when the VMI attached to a secondary UDN is migrated between nodes": { + "average_duration": 139 + }, + "[sig-network][OCPFeatureGate:RouteAdvertisements][Feature:RouteAdvertisements][apigroup:operator.openshift.io] when using openshift ovn-kubernetes [EgressIP] Advertising EgressIP [apigroup:user.openshift.io][apigroup:security.openshift.io] For cluster user defined networks When the network topology is Layer 3 UDN pods should have the assigned EgressIPs and EgressIPs can be created, updated and deleted [apigroup:route.openshift.io] When the network is IPv4 [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-network][OCPFeatureGate:RouteAdvertisements][Feature:RouteAdvertisements][apigroup:operator.openshift.io] when using openshift ovn-kubernetes [EgressIP] Advertising EgressIP [apigroup:user.openshift.io][apigroup:security.openshift.io] For cluster user defined networks When the network topology is Layer 3 UDN pods should have the assigned EgressIPs and EgressIPs can be created, updated and deleted [apigroup:route.openshift.io] When the network is IPv6 [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-network][OCPFeatureGate:RouteAdvertisements][Feature:RouteAdvertisements][apigroup:operator.openshift.io] when using openshift ovn-kubernetes [EgressIP] Advertising EgressIP [apigroup:user.openshift.io][apigroup:security.openshift.io] For the default network Pods should have the assigned EgressIPs and EgressIPs can be created, updated and deleted [apigroup:route.openshift.io] When the network is IPv4 [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-network][OCPFeatureGate:RouteAdvertisements][Feature:RouteAdvertisements][apigroup:operator.openshift.io] when using openshift ovn-kubernetes [EgressIP] Advertising EgressIP [apigroup:user.openshift.io][apigroup:security.openshift.io] For the default network Pods should have the assigned EgressIPs and EgressIPs can be created, updated and deleted [apigroup:route.openshift.io] When the network is IPv6 [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-network][OCPFeatureGate:RouteAdvertisements][Feature:RouteAdvertisements][apigroup:operator.openshift.io] when using openshift ovn-kubernetes [PodNetwork] Advertising a cluster user defined network [apigroup:user.openshift.io][apigroup:security.openshift.io] Over a VRF-Lite configuration Pods should be able to communicate on a secondary network [Timeout:30m] [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-network][OCPFeatureGate:RouteAdvertisements][Feature:RouteAdvertisements][apigroup:operator.openshift.io] when using openshift ovn-kubernetes [PodNetwork] Advertising a cluster user defined network [apigroup:user.openshift.io][apigroup:security.openshift.io] Over the default VRF When the network topology is Layer 2 External host should be able to query route advertised pods by the pod IP [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-network][OCPFeatureGate:RouteAdvertisements][Feature:RouteAdvertisements][apigroup:operator.openshift.io] when using openshift ovn-kubernetes [PodNetwork] Advertising a cluster user defined network [apigroup:user.openshift.io][apigroup:security.openshift.io] Over the default VRF When the network topology is Layer 2 Pods should communicate with external host without being SNATed [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-network][OCPFeatureGate:RouteAdvertisements][Feature:RouteAdvertisements][apigroup:operator.openshift.io] when using openshift ovn-kubernetes [PodNetwork] Advertising a cluster user defined network [apigroup:user.openshift.io][apigroup:security.openshift.io] Over the default VRF When the network topology is Layer 3 External host should be able to query route advertised pods by the pod IP [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-network][OCPFeatureGate:RouteAdvertisements][Feature:RouteAdvertisements][apigroup:operator.openshift.io] when using openshift ovn-kubernetes [PodNetwork] Advertising a cluster user defined network [apigroup:user.openshift.io][apigroup:security.openshift.io] Over the default VRF When the network topology is Layer 3 Pods should communicate with external host without being SNATed [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-network][OCPFeatureGate:RouteAdvertisements][Feature:RouteAdvertisements][apigroup:operator.openshift.io] when using openshift ovn-kubernetes [PodNetwork] Advertising the default network [apigroup:user.openshift.io][apigroup:security.openshift.io] External host should be able to query route advertised pods by the pod IP [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-network][OCPFeatureGate:RouteAdvertisements][Feature:RouteAdvertisements][apigroup:operator.openshift.io] when using openshift ovn-kubernetes [PodNetwork] Advertising the default network [apigroup:user.openshift.io][apigroup:security.openshift.io] Pods should communicate with external host without being SNATed [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-network][OCPFeatureGate:RouteExternalCertificate][Feature:Router][apigroup:route.openshift.io] with invalid setup the router should not support external certificate if inline certificate is also present [Suite:openshift/conformance/parallel]": { + "average_duration": 8 + }, + "[sig-network][OCPFeatureGate:RouteExternalCertificate][Feature:Router][apigroup:route.openshift.io] with invalid setup the router should not support external certificate if the route termination type is Passthrough [Suite:openshift/conformance/parallel]": { + "average_duration": 8 + }, + "[sig-network][OCPFeatureGate:RouteExternalCertificate][Feature:Router][apigroup:route.openshift.io] with invalid setup the router should not support external certificate if the secret is in a different namespace [Suite:openshift/conformance/parallel]": { + "average_duration": 8 + }, + "[sig-network][OCPFeatureGate:RouteExternalCertificate][Feature:Router][apigroup:route.openshift.io] with invalid setup the router should not support external certificate if the secret is not of type kubernetes.io/tls [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-network][OCPFeatureGate:RouteExternalCertificate][Feature:Router][apigroup:route.openshift.io] with invalid setup the router should not support external certificate without proper permissions [Suite:openshift/conformance/parallel]": { + "average_duration": 8 + }, + "[sig-network][OCPFeatureGate:RouteExternalCertificate][Feature:Router][apigroup:route.openshift.io] with valid setup the router should support external certificate and routes are reachable [Suite:openshift/conformance/parallel]": { + "average_duration": 32 + }, + "[sig-network][OCPFeatureGate:RouteExternalCertificate][Feature:Router][apigroup:route.openshift.io] with valid setup the router should support external certificate and the route is updated to remove the external certificate and again re-add the same external certificate then also the route is reachable [Suite:openshift/conformance/parallel]": { + "average_duration": 15 + }, + "[sig-network][OCPFeatureGate:RouteExternalCertificate][Feature:Router][apigroup:route.openshift.io] with valid setup the router should support external certificate and the route is updated to remove the external certificate then also the route is reachable and serves the default certificate [Suite:openshift/conformance/parallel]": { + "average_duration": 19 + }, + "[sig-network][OCPFeatureGate:RouteExternalCertificate][Feature:Router][apigroup:route.openshift.io] with valid setup the router should support external certificate and the route is updated to use new external certificate then also the route is reachable [Suite:openshift/conformance/parallel]": { + "average_duration": 19 + }, + "[sig-network][OCPFeatureGate:RouteExternalCertificate][Feature:Router][apigroup:route.openshift.io] with valid setup the router should support external certificate and the route is updated to use new external certificate, but RBAC permissions are not added route update is rejected [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-network][OCPFeatureGate:RouteExternalCertificate][Feature:Router][apigroup:route.openshift.io] with valid setup the router should support external certificate and the route is updated to use new external certificate, but secret does not exist route update is rejected [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-network][OCPFeatureGate:RouteExternalCertificate][Feature:Router][apigroup:route.openshift.io] with valid setup the router should support external certificate and the route is updated to use new external certificate, but secret is not of type kubernetes.io/tls route update is rejected [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-network][OCPFeatureGate:RouteExternalCertificate][Feature:Router][apigroup:route.openshift.io] with valid setup the router should support external certificate and the route is updated to use same external certificate then also the route is reachable [Suite:openshift/conformance/parallel]": { + "average_duration": 16 + }, + "[sig-network][OCPFeatureGate:RouteExternalCertificate][Feature:Router][apigroup:route.openshift.io] with valid setup the router should support external certificate and the route is updated to use same external certificate, but RBAC permissions are dropped route update is rejected [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-network][OCPFeatureGate:RouteExternalCertificate][Feature:Router][apigroup:route.openshift.io] with valid setup the router should support external certificate and the secret is deleted and re-created again but RBAC permissions are dropped then routes are not reachable [Suite:openshift/conformance/parallel]": { + "average_duration": 15 + }, + "[sig-network][OCPFeatureGate:RouteExternalCertificate][Feature:Router][apigroup:route.openshift.io] with valid setup the router should support external certificate and the secret is deleted and re-created again then routes are reachable [Suite:openshift/conformance/parallel]": { + "average_duration": 32 + }, + "[sig-network][OCPFeatureGate:RouteExternalCertificate][Feature:Router][apigroup:route.openshift.io] with valid setup the router should support external certificate and the secret is deleted then routes are not reachable [Suite:openshift/conformance/parallel]": { + "average_duration": 16 + }, + "[sig-network][OCPFeatureGate:RouteExternalCertificate][Feature:Router][apigroup:route.openshift.io] with valid setup the router should support external certificate and the secret is updated but RBAC permissions are dropped then routes are not reachable [Suite:openshift/conformance/parallel]": { + "average_duration": 16 + }, + "[sig-network][OCPFeatureGate:RouteExternalCertificate][Feature:Router][apigroup:route.openshift.io] with valid setup the router should support external certificate and the secret is updated then also routes are reachable [Suite:openshift/conformance/parallel]": { + "average_duration": 32 + }, + "[sig-network][endpoints] admission [apigroup:config.openshift.io] blocks manual creation of EndpointSlices pointing to the cluster or service network [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-network][endpoints] admission [apigroup:config.openshift.io] blocks manual creation of Endpoints pointing to the cluster or service network [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-networking] SDN microshift Author:weliang-MicroShiftOnly-Medium-60550-Pod should be accessible via node ip and host port": { + "average_duration": 21 + }, + "[sig-networking] SDN microshift MicroShiftOnly-Author:anusaxen-Critical-60331-mixed ingress and egress policies can work well": { + "average_duration": 47 + }, + "[sig-networking] SDN microshift MicroShiftOnly-Author:anusaxen-High-60332-Network Policies should work with OVNKubernetes when traffic hairpins back to the same source through a service": { + "average_duration": 27 + }, + "[sig-networking] SDN microshift MicroShiftOnly-Author:anusaxen-High-60426-podSelector allow-to and allow-from can work together": { + "average_duration": 74 + }, + "[sig-networking] SDN microshift MicroShiftOnly-Author:anusaxen-High-64752-Conntrack rule deletion for UDP traffic when NodePort service ep gets deleted": { + "average_duration": 66 + }, + "[sig-networking] SDN microshift MicroShiftOnly-Author:jechen-High-65838-br-ex interface should be unmanaged by NetworkManager": { + "average_duration": 15 + }, + "[sig-networking] SDN microshift MicroShiftOnly-Author:qiowang-High-60290-Idling/Unidling services": { + "average_duration": 26 + }, + "[sig-networking] SDN microshift MicroShiftOnly-Author:zzhao-Critical-60968-Check loadbalance service with different external and internal traffic policies works well on Microshift": { + "average_duration": 37 + }, + "[sig-networking] SDN microshift MicroShiftOnly-Author:zzhao-Medium-61218-only one loadbalance can be located at same time if creating multi loadbalance service with same port[Serial]": { + "average_duration": 31 + }, + "[sig-networking] pathological event should not see excessive FailedToUpdateEndpointSlices Error updating Endpoint Slices": { + "average_duration": 0 + }, + "[sig-networking] should not see excessive FailedToUpdateEndpointSlices Error updating Endpoint Slices": { + "average_duration": 0 + }, + "[sig-node-tuning] NTO should SNO installation does not finish due to wait for non-existing machine-config [Early] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-node] AppArmor load AppArmor profiles can disable an AppArmor profile, using unconfined": { + "average_duration": 1 + }, + "[sig-node] AppArmor load AppArmor profiles can disable an AppArmor profile, using unconfined [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] AppArmor load AppArmor profiles should enforce an AppArmor profile [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-node] AppArmor load AppArmor profiles should enforce an AppArmor profile specified in annotations": { + "average_duration": 1 + }, + "[sig-node] AppArmor load AppArmor profiles should enforce an AppArmor profile specified in annotations [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] AppArmor load AppArmor profiles should enforce an AppArmor profile specified on the container": { + "average_duration": 1 + }, + "[sig-node] AppArmor load AppArmor profiles should enforce an AppArmor profile specified on the container [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] AppArmor load AppArmor profiles should enforce an AppArmor profile specified on the pod": { + "average_duration": 1 + }, + "[sig-node] AppArmor load AppArmor profiles should enforce an AppArmor profile specified on the pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] ConfigMap should be consumable as environment variable names when configmap keys start with a digit [Feature:RelaxedEnvironmentVariableValidation] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] ConfigMap should be consumable as environment variable names with various prefixes [Conformance]": { + "average_duration": 5 + }, + "[sig-node] ConfigMap should be consumable as environment variable names with various prefixes [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] ConfigMap should be consumable via environment variable [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] ConfigMap should be consumable via environment variable [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-node] ConfigMap should be consumable via the environment [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] ConfigMap should be consumable via the environment [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] ConfigMap should fail to create ConfigMap with empty key [Conformance]": { + "average_duration": 1 + }, + "[sig-node] ConfigMap should fail to create ConfigMap with empty key [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] ConfigMap should run through a ConfigMap lifecycle [Conformance]": { + "average_duration": 1 + }, + "[sig-node] ConfigMap should run through a ConfigMap lifecycle [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] ConfigMap should update ConfigMap successfully": { + "average_duration": 1 + }, + "[sig-node] ConfigMap should update ConfigMap successfully [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart exec hook properly [NodeConformance] [Conformance]": { + "average_duration": 9 + }, + "[sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart exec hook properly [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart http hook properly [NodeConformance] [Conformance]": { + "average_duration": 9 + }, + "[sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart http hook properly [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart https hook properly [MinimumKubeletVersion:1.23] [NodeConformance]": { + "average_duration": 9 + }, + "[sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart https hook properly [MinimumKubeletVersion:1.23] [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop exec hook properly [NodeConformance] [Conformance]": { + "average_duration": 9 + }, + "[sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop exec hook properly [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop http hook properly [NodeConformance] [Conformance]": { + "average_duration": 9 + }, + "[sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop http hook properly [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop https hook properly [MinimumKubeletVersion:1.23] [NodeConformance]": { + "average_duration": 9 + }, + "[sig-node] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop https hook properly [MinimumKubeletVersion:1.23] [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] Container Runtime blackbox test on terminated container should report termination message as empty when pod succeeds and TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]": { + "average_duration": 4 + }, + "[sig-node] Container Runtime blackbox test on terminated container should report termination message as empty when pod succeeds and TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Container Runtime blackbox test on terminated container should report termination message from file when pod succeeds and TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]": { + "average_duration": 4 + }, + "[sig-node] Container Runtime blackbox test on terminated container should report termination message from file when pod succeeds and TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Container Runtime blackbox test on terminated container should report termination message from log output if TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]": { + "average_duration": 4 + }, + "[sig-node] Container Runtime blackbox test on terminated container should report termination message from log output if TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Container Runtime blackbox test on terminated container should report termination message if TerminationMessagePath is set [NodeConformance]": { + "average_duration": 4 + }, + "[sig-node] Container Runtime blackbox test on terminated container should report termination message if TerminationMessagePath is set [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Container Runtime blackbox test on terminated container should report termination message if TerminationMessagePath is set as non-root user and at a non-default path [NodeConformance] [Conformance]": { + "average_duration": 4 + }, + "[sig-node] Container Runtime blackbox test on terminated container should report termination message if TerminationMessagePath is set as non-root user and at a non-default path [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Container Runtime blackbox test when running a container with a new image should be able to pull image [NodeConformance]": { + "average_duration": 4 + }, + "[sig-node] Container Runtime blackbox test when running a container with a new image should be able to pull image [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull from private registry without secret [NodeConformance]": { + "average_duration": 3 + }, + "[sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull from private registry without secret [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull image from invalid registry [NodeConformance]": { + "average_duration": 4 + }, + "[sig-node] Container Runtime blackbox test when running a container with a new image should not be able to pull image from invalid registry [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] Container Runtime blackbox test when starting a container that exits should run with the expected status [NodeConformance] [Conformance]": { + "average_duration": 25 + }, + "[sig-node] Container Runtime blackbox test when starting a container that exits should run with the expected status [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-node] Containers should be able to override the image's default arguments (container cmd) [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Containers should be able to override the image's default arguments (container cmd) [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-node] Containers should be able to override the image's default command (container entrypoint) [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Containers should be able to override the image's default command (container entrypoint) [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Containers should be able to override the image's default command and arguments [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Containers should be able to override the image's default command and arguments [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Containers should use the image defaults if command and args are blank [NodeConformance] [Conformance]": { + "average_duration": 3 + }, + "[sig-node] Containers should use the image defaults if command and args are blank [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-node] Downward API [Feature:PodLevelResources] [FeatureGate:PodLevelResources] [Beta] Downward API tests for pod level resources should provide default limits.cpu/memory from pod level resources": { + "average_duration": 6 + }, + "[sig-node] Downward API [Feature:PodLevelResources] [FeatureGate:PodLevelResources] [Beta] Downward API tests for pod level resources should provide default limits.cpu/memory from pod level resources [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-node] Downward API [Feature:PodLevelResources] [FeatureGate:PodLevelResources] [Beta] Downward API tests for pod level resources should provide default limits.cpu/memory from pod level resources or node allocatable": { + "average_duration": 6 + }, + "[sig-node] Downward API [Feature:PodLevelResources] [FeatureGate:PodLevelResources] [Beta] Downward API tests for pod level resources should provide default limits.cpu/memory from pod level resources or node allocatable [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-node] Downward API should provide container's limits.cpu/memory and requests.cpu/memory as env vars [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Downward API should provide container's limits.cpu/memory and requests.cpu/memory as env vars [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Downward API should provide default limits.cpu/memory from node allocatable [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Downward API should provide default limits.cpu/memory from node allocatable [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Downward API should provide host IP and pod IP as an env var if pod uses host network [LinuxOnly]": { + "average_duration": 4 + }, + "[sig-node] Downward API should provide host IP and pod IP as an env var if pod uses host network [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] Downward API should provide host IP as an env var [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Downward API should provide host IP as an env var [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Downward API should provide hostIPs as an env var [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Downward API should provide hostIPs as an env var [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Downward API should provide pod UID as env vars [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Downward API should provide pod UID as env vars [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Downward API should provide pod name, namespace and IP address as env vars [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Downward API should provide pod name, namespace and IP address as env vars [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Ephemeral Containers [NodeConformance] should update the ephemeral containers in an existing pod [Conformance]": { + "average_duration": 7 + }, + "[sig-node] Ephemeral Containers [NodeConformance] should update the ephemeral containers in an existing pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-node] Ephemeral Containers [NodeConformance] will start an ephemeral container in an existing pod [Conformance]": { + "average_duration": 7 + }, + "[sig-node] Ephemeral Containers [NodeConformance] will start an ephemeral container in an existing pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-node] Events should be sent by kubelets and the scheduler about pods scheduling and running ": { + "average_duration": 7 + }, + "[sig-node] Events should be sent by kubelets and the scheduler about pods scheduling and running [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-node] InitContainer [NodeConformance] should invoke init containers on a RestartAlways pod [Conformance]": { + "average_duration": 4 + }, + "[sig-node] InitContainer [NodeConformance] should invoke init containers on a RestartAlways pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] InitContainer [NodeConformance] should invoke init containers on a RestartNever pod [Conformance]": { + "average_duration": 5 + }, + "[sig-node] InitContainer [NodeConformance] should invoke init containers on a RestartNever pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-node] InitContainer [NodeConformance] should not start app containers and fail the pod if init containers fail on a RestartNever pod [Conformance]": { + "average_duration": 5 + }, + "[sig-node] InitContainer [NodeConformance] should not start app containers and fail the pod if init containers fail on a RestartNever pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] InitContainer [NodeConformance] should not start app containers if init containers fail on a RestartAlways pod [Conformance]": { + "average_duration": 41 + }, + "[sig-node] InitContainer [NodeConformance] should not start app containers if init containers fail on a RestartAlways pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 48 + }, + "[sig-node] Kubelet when scheduling a busybox command in a pod should print the output to logs [NodeConformance] [Conformance]": { + "average_duration": 3 + }, + "[sig-node] Kubelet when scheduling a busybox command in a pod should print the output to logs [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-node] Kubelet when scheduling a busybox command that always fails in a pod should be possible to delete [NodeConformance] [Conformance]": { + "average_duration": 1 + }, + "[sig-node] Kubelet when scheduling a busybox command that always fails in a pod should be possible to delete [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] Kubelet when scheduling a busybox command that always fails in a pod should have an terminated reason [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Kubelet when scheduling a busybox command that always fails in a pod should have an terminated reason [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] Kubelet when scheduling a read only busybox container should not write to root filesystem [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 3 + }, + "[sig-node] Kubelet when scheduling a read only busybox container should not write to root filesystem [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-node] Kubelet when scheduling an agnhost Pod with hostAliases should write entries to /etc/hosts [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Kubelet when scheduling an agnhost Pod with hostAliases should write entries to /etc/hosts [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Kubelet with pods in a privileged namespace when scheduling an agnhost Pod with hostAliases and hostNetwork should write entries to /etc/hosts when hostNetwork is enabled [NodeConformance]": { + "average_duration": 4 + }, + "[sig-node] Kubelet with pods in a privileged namespace when scheduling an agnhost Pod with hostAliases and hostNetwork should write entries to /etc/hosts when hostNetwork is enabled [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] KubeletManagedEtcHosts should test kubelet managed /etc/hosts file [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] KubeletManagedEtcHosts should test kubelet managed /etc/hosts file [NodeConformance] [Conformance]": { + "average_duration": 8 + }, + "[sig-node] KubeletManagedEtcHosts should test kubelet managed /etc/hosts file [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] Lease lease API should be available [Conformance]": { + "average_duration": 1 + }, + "[sig-node] Lease lease API should be available [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-node] Lifecycle Sleep Hook when create a pod with lifecycle hook using sleep action ignore terminated container": { + "average_duration": 7 + }, + "[sig-node] Lifecycle Sleep Hook when create a pod with lifecycle hook using sleep action ignore terminated container [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] Lifecycle Sleep Hook when create a pod with lifecycle hook using sleep action reduce GracePeriodSeconds during runtime": { + "average_duration": 34 + }, + "[sig-node] Lifecycle Sleep Hook when create a pod with lifecycle hook using sleep action reduce GracePeriodSeconds during runtime [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 37 + }, + "[sig-node] Lifecycle Sleep Hook when create a pod with lifecycle hook using sleep action valid prestop hook using sleep action": { + "average_duration": 52 + }, + "[sig-node] Lifecycle Sleep Hook when create a pod with lifecycle hook using sleep action valid prestop hook using sleep action [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 57 + }, + "[sig-node] Lifecycle sleep action zero value when create a pod with lifecycle hook using sleep action with a duration of zero seconds prestop hook using sleep action with zero duration": { + "average_duration": 6 + }, + "[sig-node] Lifecycle sleep action zero value when create a pod with lifecycle hook using sleep action with a duration of zero seconds prestop hook using sleep action with zero duration [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-node] Managed cluster record the number of nodes at the beginning of the tests [Early] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-node] Managed cluster should report ready nodes the entire duration of the test run [Late][apigroup:monitoring.coreos.com] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-node] Managed cluster should report ready nodes the entire duration of the test run [Late][apigroup:monitoring.coreos.com] [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-node] Managed cluster should verify that nodes have no unexpected reboots [Late] [Suite:openshift/conformance/parallel]": { + "average_duration": 26 + }, + "[sig-node] Mount propagation should propagate mounts within defined scopes": { + "average_duration": 27 + }, + "[sig-node] Mount propagation should propagate mounts within defined scopes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 36 + }, + "[sig-node] NoExecuteTaintManager Multiple Pods [Serial] only evicts pods without tolerations from tainted nodes": { + "average_duration": 126 + }, + "[sig-node] NoExecuteTaintManager Multiple Pods [Serial] only evicts pods without tolerations from tainted nodes [Skipped:SingleReplicaTopology] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 127 + }, + "[sig-node] NoExecuteTaintManager Multiple Pods [Serial] only evicts pods without tolerations from tainted nodes [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 126 + }, + "[sig-node] NoExecuteTaintManager Single Pod [Serial] doesn't evict pod with tolerations from tainted nodes": { + "average_duration": 126 + }, + "[sig-node] NoExecuteTaintManager Single Pod [Serial] doesn't evict pod with tolerations from tainted nodes [Skipped:SingleReplicaTopology] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 127 + }, + "[sig-node] NoExecuteTaintManager Single Pod [Serial] doesn't evict pod with tolerations from tainted nodes [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 126 + }, + "[sig-node] NoExecuteTaintManager Single Pod [Serial] eventually evict pod with finite tolerations from tainted nodes": { + "average_duration": 132 + }, + "[sig-node] NoExecuteTaintManager Single Pod [Serial] eventually evict pod with finite tolerations from tainted nodes [Skipped:SingleReplicaTopology] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 132 + }, + "[sig-node] NoExecuteTaintManager Single Pod [Serial] eventually evict pod with finite tolerations from tainted nodes [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 132 + }, + "[sig-node] NoExecuteTaintManager Single Pod [Serial] evicts pods from tainted nodes": { + "average_duration": 64 + }, + "[sig-node] NoExecuteTaintManager Single Pod [Serial] evicts pods from tainted nodes [Skipped:SingleReplicaTopology] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 64 + }, + "[sig-node] NoExecuteTaintManager Single Pod [Serial] evicts pods from tainted nodes [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 64 + }, + "[sig-node] NoExecuteTaintManager Single Pod [Serial] pods evicted from tainted nodes have pod disruption condition": { + "average_duration": 63 + }, + "[sig-node] NoExecuteTaintManager Single Pod [Serial] pods evicted from tainted nodes have pod disruption condition [Skipped:SingleReplicaTopology] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 63 + }, + "[sig-node] NoExecuteTaintManager Single Pod [Serial] pods evicted from tainted nodes have pod disruption condition [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 64 + }, + "[sig-node] Node Lifecycle should run through the lifecycle of a node [Conformance]": { + "average_duration": 1 + }, + "[sig-node] Node Lifecycle should run through the lifecycle of a node [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] NodeLease NodeLease should have OwnerReferences set": { + "average_duration": 1 + }, + "[sig-node] NodeLease NodeLease should have OwnerReferences set [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] NodeLease NodeLease the kubelet should create and update a lease in the kube-node-lease namespace": { + "average_duration": 10 + }, + "[sig-node] NodeLease NodeLease the kubelet should create and update a lease in the kube-node-lease namespace [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-node] NodeLease NodeLease the kubelet should report node status infrequently": { + "average_duration": 75 + }, + "[sig-node] NodeLease NodeLease the kubelet should report node status infrequently [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 96 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] BestEffort QoS pod - empty resize": { + "average_duration": 5 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] BestEffort QoS pod - empty resize [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] BestEffort pod - try requesting memory, expect error": { + "average_duration": 3 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] BestEffort pod - try requesting memory, expect error [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod with memory requests + limits - decrease memory limit": { + "average_duration": 16 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod with memory requests + limits - decrease memory limit [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, mixed containers - add limits": { + "average_duration": 15 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, mixed containers - add limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, mixed containers - add requests": { + "average_duration": 13 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, mixed containers - add requests [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, mixed containers - scale up cpu and memory": { + "average_duration": 14 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, mixed containers - scale up cpu and memory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container - decrease CPU (NotRequired) \u0026 memory (RestartContainer)": { + "average_duration": 22 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container - decrease CPU (NotRequired) \u0026 memory (RestartContainer) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container - decrease memory request (RestartContainer memory resize policy)": { + "average_duration": 14 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container - decrease memory request (RestartContainer memory resize policy) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container - increase memory request (NoRestart memory resize policy)": { + "average_duration": 11 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container - increase memory request (NoRestart memory resize policy) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with CPU requests + limits, cpu requests - remove memory requests": { + "average_duration": 4 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with CPU requests + limits, cpu requests - remove memory requests [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - decrease CPU limits only": { + "average_duration": 15 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - decrease CPU limits only [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - decrease CPU requests and increase CPU limits": { + "average_duration": 10 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - decrease CPU requests and increase CPU limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - decrease CPU requests and increase memory limits": { + "average_duration": 11 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - decrease CPU requests and increase memory limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - decrease CPU requests and limits": { + "average_duration": 11 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - decrease CPU requests and limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - decrease CPU requests only": { + "average_duration": 15 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - decrease CPU requests only [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - decrease memory requests and increase CPU limits": { + "average_duration": 10 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - decrease memory requests and increase CPU limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - decrease memory requests and increase memory limits": { + "average_duration": 11 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - decrease memory requests and increase memory limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - decrease memory requests only": { + "average_duration": 15 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - decrease memory requests only [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - increase CPU limits only": { + "average_duration": 11 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - increase CPU limits only [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - increase CPU requests and decrease CPU limits": { + "average_duration": 11 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - increase CPU requests and decrease CPU limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - increase CPU requests and limits": { + "average_duration": 11 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - increase CPU requests and limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - increase CPU requests only": { + "average_duration": 10 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - increase CPU requests only [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - increase memory limits only": { + "average_duration": 11 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - increase memory limits only [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - increase memory requests and decrease CPU limits": { + "average_duration": 11 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - increase memory requests and decrease CPU limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - increase memory requests and limits": { + "average_duration": 11 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - increase memory requests and limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - increase memory requests only": { + "average_duration": 11 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - increase memory requests only [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - remove CPU limits": { + "average_duration": 4 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - remove CPU limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - remove memory limits": { + "average_duration": 4 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests + limits - remove memory limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests - decrease memory request": { + "average_duration": 7 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests - decrease memory request [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests - increase cpu request": { + "average_duration": 7 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu \u0026 memory requests - increase cpu request [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu requests and limits - resize with equivalents": { + "average_duration": 19 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with cpu requests and limits - resize with equivalents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 24 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with memory requests + limits, cpu requests - remove CPU requests": { + "average_duration": 3 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container with memory requests + limits, cpu requests - remove CPU requests [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container, one restartable init container - decrease init container CPU only": { + "average_duration": 16 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container, one restartable init container - decrease init container CPU only [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container, one restartable init container - decrease init container memory requests only": { + "average_duration": 18 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container, one restartable init container - decrease init container memory requests only [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container, one restartable init container - increase init container CPU \u0026 memory": { + "average_duration": 16 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container, one restartable init container - increase init container CPU \u0026 memory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container, one restartable init container - increase init container CPU only": { + "average_duration": 15 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container, one restartable init container - increase init container CPU only [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container, one restartable init container - increase init container memory only": { + "average_duration": 17 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, one container, one restartable init container - increase init container memory only [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, three containers - decrease c1 resources, increase c2 resources, no change for c3 (net increase for pod)": { + "average_duration": 21 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, three containers - decrease c1 resources, increase c2 resources, no change for c3 (net increase for pod) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, three containers - increase c1 resources, no change for c2, decrease c3 resources (no net change for pod)": { + "average_duration": 19 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, three containers - increase c1 resources, no change for c2, decrease c3 resources (no net change for pod) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, three containers - no change for c1, increase c2 resources, decrease c3 (net decrease for pod)": { + "average_duration": 26 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, three containers - no change for c1, increase c2 resources, decrease c3 (net decrease for pod) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 30 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, two containers with cpu \u0026 memory requests + limits - reorder containers": { + "average_duration": 5 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Burstable QoS pod, two containers with cpu \u0026 memory requests + limits - reorder containers [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Guaranteed QoS pod, one container - decrease CPU only": { + "average_duration": 19 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Guaranteed QoS pod, one container - decrease CPU only [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Guaranteed QoS pod, one container - increase CPU \u0026 memory": { + "average_duration": 13 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Guaranteed QoS pod, one container - increase CPU \u0026 memory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Guaranteed QoS pod, one container - increase CPU \u0026 memory with an extended resource": { + "average_duration": 14 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Guaranteed QoS pod, one container - increase CPU \u0026 memory with an extended resource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Guaranteed QoS pod, one container - increase CPU (NotRequired) \u0026 memory (RestartContainer)": { + "average_duration": 26 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Guaranteed QoS pod, one container - increase CPU (NotRequired) \u0026 memory (RestartContainer) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Guaranteed QoS pod, one container, one restartable init container - decrease init container CPU": { + "average_duration": 20 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Guaranteed QoS pod, one container, one restartable init container - decrease init container CPU [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 24 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Guaranteed QoS pod, one restartable init container - decrease CPU \u0026 increase memory": { + "average_duration": 20 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Guaranteed QoS pod, one restartable init container - decrease CPU \u0026 increase memory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 24 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Guaranteed QoS pod, one restartable init container - increase CPU \u0026 memory": { + "average_duration": 19 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Guaranteed QoS pod, one restartable init container - increase CPU \u0026 memory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Guaranteed QoS pod, three containers (c1, c2, c3) - increase: CPU (c1,c3), memory (c2, c3) ; decrease: CPU (c2)": { + "average_duration": 23 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] Guaranteed QoS pod, three containers (c1, c2, c3) - increase: CPU (c1,c3), memory (c2, c3) ; decrease: CPU (c2) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 29 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] decrease memory limit below usage": { + "average_duration": 51 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] decrease memory limit below usage [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 55 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] pod-resize-limit-ranger-test": { + "average_duration": 8 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] pod-resize-limit-ranger-test [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] pod-resize-resource-quota-test": { + "average_duration": 9 + }, + "[sig-node] Pod InPlace Resize Container [FeatureGate:InPlacePodVerticalScaling] [Beta] pod-resize-resource-quota-test [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-node] Pod Level Resources [Serial] [Feature:PodLevelResources] [FeatureGate:PodLevelResources] [Beta] Burstable QoS pod with container resources": { + "average_duration": 17 + }, + "[sig-node] Pod Level Resources [Serial] [Feature:PodLevelResources] [FeatureGate:PodLevelResources] [Beta] Burstable QoS pod with container resources [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-node] Pod Level Resources [Serial] [Feature:PodLevelResources] [FeatureGate:PodLevelResources] [Beta] Burstable QoS pod, 1 container with resources": { + "average_duration": 17 + }, + "[sig-node] Pod Level Resources [Serial] [Feature:PodLevelResources] [FeatureGate:PodLevelResources] [Beta] Burstable QoS pod, 1 container with resources [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-node] Pod Level Resources [Serial] [Feature:PodLevelResources] [FeatureGate:PodLevelResources] [Beta] Burstable QoS pod, no container resources": { + "average_duration": 18 + }, + "[sig-node] Pod Level Resources [Serial] [Feature:PodLevelResources] [FeatureGate:PodLevelResources] [Beta] Burstable QoS pod, no container resources [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-node] Pod Level Resources [Serial] [Feature:PodLevelResources] [FeatureGate:PodLevelResources] [Beta] Guaranteed QoS pod with container resources": { + "average_duration": 20 + }, + "[sig-node] Pod Level Resources [Serial] [Feature:PodLevelResources] [FeatureGate:PodLevelResources] [Beta] Guaranteed QoS pod with container resources [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-node] Pod Level Resources [Serial] [Feature:PodLevelResources] [FeatureGate:PodLevelResources] [Beta] Guaranteed QoS pod, 1 container with resources": { + "average_duration": 18 + }, + "[sig-node] Pod Level Resources [Serial] [Feature:PodLevelResources] [FeatureGate:PodLevelResources] [Beta] Guaranteed QoS pod, 1 container with resources [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-node] Pod Level Resources [Serial] [Feature:PodLevelResources] [FeatureGate:PodLevelResources] [Beta] Guaranteed QoS pod, no container resources": { + "average_duration": 18 + }, + "[sig-node] Pod Level Resources [Serial] [Feature:PodLevelResources] [FeatureGate:PodLevelResources] [Beta] Guaranteed QoS pod, no container resources [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-node] PodOSRejection [NodeConformance] Kubelet [LinuxOnly] should reject pod when the node OS doesn't match pod's OS": { + "average_duration": 2 + }, + "[sig-node] PodOSRejection [NodeConformance] Kubelet [LinuxOnly] should reject pod when the node OS doesn't match pod's OS [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-node] PodOSRejection [NodeConformance] Kubelet should reject pod when the node OS doesn't match pod's OS [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-node] PodRejectionStatus Kubelet should reject pod when the node didn't have enough resource": { + "average_duration": 3 + }, + "[sig-node] PodRejectionStatus Kubelet should reject pod when the node didn't have enough resource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-node] PodTemplates should delete a collection of pod templates [Conformance]": { + "average_duration": 1 + }, + "[sig-node] PodTemplates should delete a collection of pod templates [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] PodTemplates should replace a pod template [Conformance]": { + "average_duration": 1 + }, + "[sig-node] PodTemplates should replace a pod template [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] PodTemplates should run the lifecycle of PodTemplates [Conformance]": { + "average_duration": 1 + }, + "[sig-node] PodTemplates should run the lifecycle of PodTemplates [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] Pods Extended (pod generation) [Feature:PodObservedGenerationTracking] [FeatureGate:PodObservedGenerationTracking] [Beta] Pod Generation custom-set generation on new pods and graceful delete": { + "average_duration": 3 + }, + "[sig-node] Pods Extended (pod generation) [Feature:PodObservedGenerationTracking] [FeatureGate:PodObservedGenerationTracking] [Beta] Pod Generation custom-set generation on new pods and graceful delete [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-node] Pods Extended (pod generation) [Feature:PodObservedGenerationTracking] [FeatureGate:PodObservedGenerationTracking] [Beta] Pod Generation issue 500 podspec updates and verify generation and observedGeneration eventually converge": { + "average_duration": 272 + }, + "[sig-node] Pods Extended (pod generation) [Feature:PodObservedGenerationTracking] [FeatureGate:PodObservedGenerationTracking] [Beta] Pod Generation issue 500 podspec updates and verify generation and observedGeneration eventually converge [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 300 + }, + "[sig-node] Pods Extended (pod generation) [Feature:PodObservedGenerationTracking] [FeatureGate:PodObservedGenerationTracking] [Beta] Pod Generation pod generation should start at 1 and increment per update": { + "average_duration": 13 + }, + "[sig-node] Pods Extended (pod generation) [Feature:PodObservedGenerationTracking] [FeatureGate:PodObservedGenerationTracking] [Beta] Pod Generation pod generation should start at 1 and increment per update [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-node] Pods Extended (pod generation) [Feature:PodObservedGenerationTracking] [FeatureGate:PodObservedGenerationTracking] [Beta] Pod Generation pod observedGeneration field set in pod conditions": { + "average_duration": 5 + }, + "[sig-node] Pods Extended (pod generation) [Feature:PodObservedGenerationTracking] [FeatureGate:PodObservedGenerationTracking] [Beta] Pod Generation pod observedGeneration field set in pod conditions [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] Pods Extended (pod generation) [Feature:PodObservedGenerationTracking] [FeatureGate:PodObservedGenerationTracking] [Beta] Pod Generation pod rejected by kubelet should have updated generation and observedGeneration": { + "average_duration": 3 + }, + "[sig-node] Pods Extended (pod generation) [Feature:PodObservedGenerationTracking] [FeatureGate:PodObservedGenerationTracking] [Beta] Pod Generation pod rejected by kubelet should have updated generation and observedGeneration [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-node] Pods Extended Delete Grace Period should be submitted and removed": { + "average_duration": 8 + }, + "[sig-node] Pods Extended Delete Grace Period should be submitted and removed [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-node] Pods Extended Pod Container Status should never report container start when an init container fails": { + "average_duration": 49 + }, + "[sig-node] Pods Extended Pod Container Status should never report container start when an init container fails [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 74 + }, + "[sig-node] Pods Extended Pod Container Status should never report success for a pending container": { + "average_duration": 50 + }, + "[sig-node] Pods Extended Pod Container Status should never report success for a pending container [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 74 + }, + "[sig-node] Pods Extended Pod Container lifecycle evicted pods should be terminal": { + "average_duration": 71 + }, + "[sig-node] Pods Extended Pod Container lifecycle evicted pods should be terminal [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 103 + }, + "[sig-node] Pods Extended Pod Container lifecycle should not create extra sandbox if all containers are done": { + "average_duration": 7 + }, + "[sig-node] Pods Extended Pod Container lifecycle should not create extra sandbox if all containers are done [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-node] Pods Extended Pod TerminationGracePeriodSeconds is negative pod with negative grace period": { + "average_duration": 1 + }, + "[sig-node] Pods Extended Pod TerminationGracePeriodSeconds is negative pod with negative grace period [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] Pods Extended Pods Set QOS Class should be set on Pods with matching resource requests and limits for memory and cpu [Conformance]": { + "average_duration": 1 + }, + "[sig-node] Pods Extended Pods Set QOS Class should be set on Pods with matching resource requests and limits for memory and cpu [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] Pods should allow activeDeadlineSeconds to be updated [NodeConformance] [Conformance]": { + "average_duration": 7 + }, + "[sig-node] Pods should allow activeDeadlineSeconds to be updated [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-node] Pods should be submitted and removed [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Pods should be submitted and removed [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-node] Pods should be updated [NodeConformance] [Conformance]": { + "average_duration": 3 + }, + "[sig-node] Pods should be updated [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] Pods should contain environment variables for services [NodeConformance] [Conformance]": { + "average_duration": 7 + }, + "[sig-node] Pods should contain environment variables for services [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-node] Pods should delete a collection of pods [Conformance]": { + "average_duration": 6 + }, + "[sig-node] Pods should delete a collection of pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-node] Pods should get a host IP [NodeConformance] [Conformance]": { + "average_duration": 3 + }, + "[sig-node] Pods should get a host IP [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-node] Pods should patch a pod status [Conformance]": { + "average_duration": 3 + }, + "[sig-node] Pods should patch a pod status [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-node] Pods should run through the lifecycle of Pods and PodStatus [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Pods should run through the lifecycle of Pods and PodStatus [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-node] Pods should support pod readiness gates [NodeConformance]": { + "average_duration": 14 + }, + "[sig-node] Pods should support pod readiness gates [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-node] Pods should support remote command execution over websockets [NodeConformance] [Conformance]": { + "average_duration": 3 + }, + "[sig-node] Pods should support remote command execution over websockets [NodeConformance] [Conformance] [Skipped:Proxy] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] Pods should support remote command execution over websockets [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-node] Pods should support retrieving logs from the container over websockets [NodeConformance] [Conformance]": { + "average_duration": 3 + }, + "[sig-node] Pods should support retrieving logs from the container over websockets [NodeConformance] [Conformance] [Skipped:Proxy] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] Pods should support retrieving logs from the container over websockets [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-node] PreStop graceful pod terminated should wait until preStop hook completes the process": { + "average_duration": 22 + }, + "[sig-node] PreStop graceful pod terminated should wait until preStop hook completes the process [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-node] PreStop should call prestop when killing a pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-node] PreStop should call prestop when killing a pod [Conformance]": { + "average_duration": 10 + }, + "[sig-node] PreStop should call prestop when killing a pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-node] PrivilegedPod [NodeConformance] should enable privileged commands [LinuxOnly]": { + "average_duration": 4 + }, + "[sig-node] PrivilegedPod [NodeConformance] should enable privileged commands [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Probing container should *not* be restarted by liveness probe because startup probe delays it": { + "average_duration": 225 + }, + "[sig-node] Probing container should *not* be restarted by liveness probe because startup probe delays it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 243 + }, + "[sig-node] Probing container should *not* be restarted with a /healthz http liveness probe [NodeConformance] [Conformance]": { + "average_duration": 225 + }, + "[sig-node] Probing container should *not* be restarted with a /healthz http liveness probe [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 243 + }, + "[sig-node] Probing container should *not* be restarted with a GRPC liveness probe [NodeConformance] [Conformance]": { + "average_duration": 225 + }, + "[sig-node] Probing container should *not* be restarted with a GRPC liveness probe [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 243 + }, + "[sig-node] Probing container should *not* be restarted with a GRPC liveness probe [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 254 + }, + "[sig-node] Probing container should *not* be restarted with a exec \"cat /tmp/health\" liveness probe [NodeConformance] [Conformance]": { + "average_duration": 225 + }, + "[sig-node] Probing container should *not* be restarted with a exec \"cat /tmp/health\" liveness probe [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 243 + }, + "[sig-node] Probing container should *not* be restarted with a non-local redirect http liveness probe": { + "average_duration": 225 + }, + "[sig-node] Probing container should *not* be restarted with a non-local redirect http liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 243 + }, + "[sig-node] Probing container should *not* be restarted with a tcp:8080 liveness probe [NodeConformance] [Conformance]": { + "average_duration": 226 + }, + "[sig-node] Probing container should *not* be restarted with a tcp:8080 liveness probe [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 243 + }, + "[sig-node] Probing container should be ready immediately after startupProbe succeeds": { + "average_duration": 35 + }, + "[sig-node] Probing container should be ready immediately after startupProbe succeeds [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-node] Probing container should be restarted by liveness probe after startup probe enables it": { + "average_duration": 58 + }, + "[sig-node] Probing container should be restarted by liveness probe after startup probe enables it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 64 + }, + "[sig-node] Probing container should be restarted startup probe fails": { + "average_duration": 68 + }, + "[sig-node] Probing container should be restarted startup probe fails [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 74 + }, + "[sig-node] Probing container should be restarted with a /healthz http liveness probe [NodeConformance] [Conformance]": { + "average_duration": 21 + }, + "[sig-node] Probing container should be restarted with a /healthz http liveness probe [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-node] Probing container should be restarted with a GRPC liveness probe [NodeConformance] [Conformance]": { + "average_duration": 68 + }, + "[sig-node] Probing container should be restarted with a GRPC liveness probe [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 76 + }, + "[sig-node] Probing container should be restarted with a GRPC liveness probe [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 82 + }, + "[sig-node] Probing container should be restarted with a exec \"cat /tmp/health\" liveness probe [NodeConformance] [Conformance]": { + "average_duration": 49 + }, + "[sig-node] Probing container should be restarted with a exec \"cat /tmp/health\" liveness probe [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 54 + }, + "[sig-node] Probing container should be restarted with a failing exec liveness probe that took longer than the timeout": { + "average_duration": 49 + }, + "[sig-node] Probing container should be restarted with a failing exec liveness probe that took longer than the timeout [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 37 + }, + "[sig-node] Probing container should be restarted with a local redirect http liveness probe": { + "average_duration": 21 + }, + "[sig-node] Probing container should be restarted with a local redirect http liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-node] Probing container should be restarted with an exec liveness probe with timeout [MinimumKubeletVersion:1.20] [NodeConformance]": { + "average_duration": 50 + }, + "[sig-node] Probing container should be restarted with an exec liveness probe with timeout [MinimumKubeletVersion:1.20] [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 56 + }, + "[sig-node] Probing container should have monotonically increasing restart count [NodeConformance] [Conformance]": { + "average_duration": 138 + }, + "[sig-node] Probing container should have monotonically increasing restart count [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 148 + }, + "[sig-node] Probing container should mark readiness on pods to false and disable liveness probes while pod is in progress of terminating": { + "average_duration": 85 + }, + "[sig-node] Probing container should mark readiness on pods to false and disable liveness probes while pod is in progress of terminating [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 94 + }, + "[sig-node] Probing container should mark readiness on pods to false while pod is in progress of terminating when a pod has a readiness probe": { + "average_duration": 36 + }, + "[sig-node] Probing container should mark readiness on pods to false while pod is in progress of terminating when a pod has a readiness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-node] Probing container should not be ready with an exec readiness probe timeout [MinimumKubeletVersion:1.20] [NodeConformance]": { + "average_duration": 58 + }, + "[sig-node] Probing container should not be ready with an exec readiness probe timeout [MinimumKubeletVersion:1.20] [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 64 + }, + "[sig-node] Probing container should override timeoutGracePeriodSeconds when LivenessProbe field is set [Feature:ProbeTerminationGracePeriod] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-node] Probing container should override timeoutGracePeriodSeconds when LivenessProbe field is set [NodeConformance]": { + "average_duration": 22 + }, + "[sig-node] Probing container should override timeoutGracePeriodSeconds when LivenessProbe field is set [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-node] Probing container should override timeoutGracePeriodSeconds when StartupProbe field is set [Feature:ProbeTerminationGracePeriod] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-node] Probing container should override timeoutGracePeriodSeconds when StartupProbe field is set [NodeConformance]": { + "average_duration": 22 + }, + "[sig-node] Probing container should override timeoutGracePeriodSeconds when StartupProbe field is set [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-node] Probing container with readiness probe should not be ready before initial delay and never restart [NodeConformance] [Conformance]": { + "average_duration": 23 + }, + "[sig-node] Probing container with readiness probe should not be ready before initial delay and never restart [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-node] Probing container with readiness probe that fails should never be ready and never restart [NodeConformance] [Conformance]": { + "average_duration": 56 + }, + "[sig-node] Probing container with readiness probe that fails should never be ready and never restart [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 60 + }, + "[sig-node] RuntimeClass should support RuntimeClasses API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-node] RuntimeClass should schedule a Pod requesting a RuntimeClass and initialize its Overhead [NodeConformance] [Conformance]": { + "average_duration": 1 + }, + "[sig-node] RuntimeClass should schedule a Pod requesting a RuntimeClass and initialize its Overhead [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-node] RuntimeClass should schedule a Pod requesting a RuntimeClass without PodOverhead [NodeConformance] [Conformance]": { + "average_duration": 1 + }, + "[sig-node] RuntimeClass should schedule a Pod requesting a RuntimeClass without PodOverhead [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-node] RuntimeClass should support RuntimeClasses API operations [Conformance]": { + "average_duration": 1 + }, + "[sig-node] RuntimeClass should support RuntimeClasses API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-node] Secrets should be consumable as environment variable names variable names with various prefixes [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Secrets should be consumable as environment variable names variable names with various prefixes [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] Secrets should be consumable as environment variable names when secret keys start with a digit [Feature:RelaxedEnvironmentVariableValidation] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Secrets should be consumable from pods in env vars [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Secrets should be consumable from pods in env vars [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-node] Secrets should be consumable via the environment [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Secrets should be consumable via the environment [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-node] Secrets should fail to create secret due to empty secret key [Conformance]": { + "average_duration": 1 + }, + "[sig-node] Secrets should fail to create secret due to empty secret key [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] Secrets should patch a secret [Conformance]": { + "average_duration": 1 + }, + "[sig-node] Secrets should patch a secret [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] Security Context SupplementalGroupsPolicy [LinuxOnly] [Feature:SupplementalGroupsPolicy] [FeatureGate:SupplementalGroupsPolicy] [Beta] when SupplementalGroupsPolicy nil in SecurityContext when if the container's primary UID belongs to some groups in the image when scheduled node does not support SupplementalGroupsPolicy it should add SupplementalGroups to them [LinuxOnly]": { + "average_duration": 3 + }, + "[sig-node] Security Context SupplementalGroupsPolicy [LinuxOnly] [Feature:SupplementalGroupsPolicy] [FeatureGate:SupplementalGroupsPolicy] [Beta] when SupplementalGroupsPolicy nil in SecurityContext when if the container's primary UID belongs to some groups in the image when scheduled node does not support SupplementalGroupsPolicy it should add SupplementalGroups to them [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-node] Security Context SupplementalGroupsPolicy [LinuxOnly] [Feature:SupplementalGroupsPolicy] [FeatureGate:SupplementalGroupsPolicy] [Beta] when SupplementalGroupsPolicy nil in SecurityContext when if the container's primary UID belongs to some groups in the image when scheduled node supports SupplementalGroupsPolicy it should add SupplementalGroups to them [LinuxOnly]": { + "average_duration": 3 + }, + "[sig-node] Security Context SupplementalGroupsPolicy [LinuxOnly] [Feature:SupplementalGroupsPolicy] [FeatureGate:SupplementalGroupsPolicy] [Beta] when SupplementalGroupsPolicy nil in SecurityContext when if the container's primary UID belongs to some groups in the image when scheduled node supports SupplementalGroupsPolicy it should add SupplementalGroups to them [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-node] Security Context SupplementalGroupsPolicy [LinuxOnly] [Feature:SupplementalGroupsPolicy] [FeatureGate:SupplementalGroupsPolicy] [Beta] when SupplementalGroupsPolicy was set to Merge in PodSpec when the container's primary UID belongs to some groups in the image when scheduled node does not support SupplementalGroupsPolicy it should add SupplementalGroups to them [LinuxOnly]": { + "average_duration": 3 + }, + "[sig-node] Security Context SupplementalGroupsPolicy [LinuxOnly] [Feature:SupplementalGroupsPolicy] [FeatureGate:SupplementalGroupsPolicy] [Beta] when SupplementalGroupsPolicy was set to Merge in PodSpec when the container's primary UID belongs to some groups in the image when scheduled node does not support SupplementalGroupsPolicy it should add SupplementalGroups to them [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-node] Security Context SupplementalGroupsPolicy [LinuxOnly] [Feature:SupplementalGroupsPolicy] [FeatureGate:SupplementalGroupsPolicy] [Beta] when SupplementalGroupsPolicy was set to Merge in PodSpec when the container's primary UID belongs to some groups in the image when scheduled node supports SupplementalGroupsPolicy it should add SupplementalGroups to them [LinuxOnly]": { + "average_duration": 3 + }, + "[sig-node] Security Context SupplementalGroupsPolicy [LinuxOnly] [Feature:SupplementalGroupsPolicy] [FeatureGate:SupplementalGroupsPolicy] [Beta] when SupplementalGroupsPolicy was set to Merge in PodSpec when the container's primary UID belongs to some groups in the image when scheduled node supports SupplementalGroupsPolicy it should add SupplementalGroups to them [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-node] Security Context SupplementalGroupsPolicy [LinuxOnly] [Feature:SupplementalGroupsPolicy] [FeatureGate:SupplementalGroupsPolicy] [Beta] when SupplementalGroupsPolicy was set to Strict in PodSpec when the container's primary UID belongs to some groups in the image when scheduled node does not support SupplementalGroupsPolicy it should reject the pod [LinuxOnly]": { + "average_duration": 1 + }, + "[sig-node] Security Context SupplementalGroupsPolicy [LinuxOnly] [Feature:SupplementalGroupsPolicy] [FeatureGate:SupplementalGroupsPolicy] [Beta] when SupplementalGroupsPolicy was set to Strict in PodSpec when the container's primary UID belongs to some groups in the image when scheduled node does not support SupplementalGroupsPolicy it should reject the pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] Security Context SupplementalGroupsPolicy [LinuxOnly] [Feature:SupplementalGroupsPolicy] [FeatureGate:SupplementalGroupsPolicy] [Beta] when SupplementalGroupsPolicy was set to Strict in PodSpec when the container's primary UID belongs to some groups in the image when scheduled node supports SupplementalGroupsPolicy it should NOT add SupplementalGroups to them [LinuxOnly]": { + "average_duration": 3 + }, + "[sig-node] Security Context SupplementalGroupsPolicy [LinuxOnly] [Feature:SupplementalGroupsPolicy] [FeatureGate:SupplementalGroupsPolicy] [Beta] when SupplementalGroupsPolicy was set to Strict in PodSpec when the container's primary UID belongs to some groups in the image when scheduled node supports SupplementalGroupsPolicy it should NOT add SupplementalGroups to them [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-node] Security Context When creating a container with runAsNonRoot should not run with an explicit root user ID [LinuxOnly]": { + "average_duration": 5 + }, + "[sig-node] Security Context When creating a container with runAsNonRoot should not run with an explicit root user ID [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-node] Security Context When creating a container with runAsNonRoot should not run without a specified user ID": { + "average_duration": 3 + }, + "[sig-node] Security Context When creating a container with runAsNonRoot should not run without a specified user ID [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-node] Security Context When creating a container with runAsNonRoot should run with an explicit non-root user ID [LinuxOnly]": { + "average_duration": 5 + }, + "[sig-node] Security Context When creating a container with runAsNonRoot should run with an explicit non-root user ID [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Security Context When creating a container with runAsNonRoot should run with an image specified user ID": { + "average_duration": 6 + }, + "[sig-node] Security Context When creating a container with runAsNonRoot should run with an image specified user ID [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-node] Security Context When creating a container with runAsUser should run the container with uid 0 [LinuxOnly] [NodeConformance]": { + "average_duration": 5 + }, + "[sig-node] Security Context When creating a container with runAsUser should run the container with uid 0 [LinuxOnly] [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Security Context When creating a container with runAsUser should run the container with uid 65534 [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Security Context When creating a container with runAsUser should run the container with uid 65534 [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Security Context When creating a pod with HostUsers metrics should report count of started and failed user namespaced pods [LinuxOnly] [Feature:UserNamespacesSupport] [FeatureGate:UserNamespacesSupport] [Beta]": { + "average_duration": 5 + }, + "[sig-node] Security Context When creating a pod with HostUsers metrics should report count of started and failed user namespaced pods [LinuxOnly] [Feature:UserNamespacesSupport] [FeatureGate:UserNamespacesSupport] [Beta] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] Security Context When creating a pod with HostUsers must create the user namespace if set to false [LinuxOnly] [Feature:UserNamespacesSupport] [FeatureGate:UserNamespacesSupport] [Beta]": { + "average_duration": 5 + }, + "[sig-node] Security Context When creating a pod with HostUsers must create the user namespace if set to false [LinuxOnly] [Feature:UserNamespacesSupport] [FeatureGate:UserNamespacesSupport] [Beta] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-node] Security Context When creating a pod with HostUsers must create the user namespace if set to false [LinuxOnly] [Feature:UserNamespacesSupport] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Security Context When creating a pod with HostUsers must create the user namespace in the configured hostUID/hostGID range [LinuxOnly] [Feature:UserNamespacesSupport] [FeatureGate:UserNamespacesSupport] [Beta]": { + "average_duration": 1 + }, + "[sig-node] Security Context When creating a pod with HostUsers must create the user namespace in the configured hostUID/hostGID range [LinuxOnly] [Feature:UserNamespacesSupport] [FeatureGate:UserNamespacesSupport] [Beta] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] Security Context When creating a pod with HostUsers must create the user namespace in the configured hostUID/hostGID range [LinuxOnly] [Feature:UserNamespacesSupport] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] Security Context When creating a pod with HostUsers must not create the user namespace if set to true [LinuxOnly] [Feature:UserNamespacesSupport] [FeatureGate:UserNamespacesSupport] [Beta]": { + "average_duration": 5 + }, + "[sig-node] Security Context When creating a pod with HostUsers must not create the user namespace if set to true [LinuxOnly] [Feature:UserNamespacesSupport] [FeatureGate:UserNamespacesSupport] [Beta] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] Security Context When creating a pod with HostUsers must not create the user namespace if set to true [LinuxOnly] [Feature:UserNamespacesSupport] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] Security Context When creating a pod with HostUsers should mount all volumes with proper permissions with hostUsers=false [LinuxOnly] [Feature:UserNamespacesSupport] [FeatureGate:UserNamespacesSupport] [Beta]": { + "average_duration": 5 + }, + "[sig-node] Security Context When creating a pod with HostUsers should mount all volumes with proper permissions with hostUsers=false [LinuxOnly] [Feature:UserNamespacesSupport] [FeatureGate:UserNamespacesSupport] [Beta] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Security Context When creating a pod with HostUsers should mount all volumes with proper permissions with hostUsers=false [LinuxOnly] [Feature:UserNamespacesSupport] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] Security Context When creating a pod with HostUsers should set FSGroup to user inside the container with hostUsers=false [LinuxOnly] [Feature:UserNamespacesSupport] [FeatureGate:UserNamespacesSupport] [Beta]": { + "average_duration": 5 + }, + "[sig-node] Security Context When creating a pod with HostUsers should set FSGroup to user inside the container with hostUsers=false [LinuxOnly] [Feature:UserNamespacesSupport] [FeatureGate:UserNamespacesSupport] [Beta] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Security Context When creating a pod with HostUsers should set FSGroup to user inside the container with hostUsers=false [LinuxOnly] [Feature:UserNamespacesSupport] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] Security Context When creating a pod with privileged should run the container as privileged when true [LinuxOnly] [Feature:HostAccess]": { + "average_duration": 5 + }, + "[sig-node] Security Context When creating a pod with privileged should run the container as privileged when true [LinuxOnly] [Feature:HostAccess] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] Security Context When creating a pod with privileged should run the container as privileged when true [LinuxOnly] [NodeFeature:HostAccess] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-node] Security Context When creating a pod with privileged should run the container as unprivileged when false [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Security Context When creating a pod with privileged should run the container as unprivileged when false [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Security Context When creating a pod with readOnlyRootFilesystem should run the container with readonly rootfs when readOnlyRootFilesystem=true [LinuxOnly] [NodeConformance]": { + "average_duration": 5 + }, + "[sig-node] Security Context When creating a pod with readOnlyRootFilesystem should run the container with readonly rootfs when readOnlyRootFilesystem=true [LinuxOnly] [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Security Context When creating a pod with readOnlyRootFilesystem should run the container with writable rootfs when readOnlyRootFilesystem=false [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Security Context When creating a pod with readOnlyRootFilesystem should run the container with writable rootfs when readOnlyRootFilesystem=false [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Security Context [sig-node] SupplementalGroupsPolicy [Feature:SupplementalGroupsPolicy] when SupplementalGroupsPolicy was not set if the container's primary UID belongs to some groups in the image, it should add SupplementalGroups to them [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] Security Context [sig-node] SupplementalGroupsPolicy [Feature:SupplementalGroupsPolicy] when SupplementalGroupsPolicy was set to Merge if the container's primary UID belongs to some groups in the image, it should add SupplementalGroups to them [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] Security Context [sig-node] SupplementalGroupsPolicy [Feature:SupplementalGroupsPolicy] when SupplementalGroupsPolicy was set to Strict even if the container's primary UID belongs to some groups in the image, it should not add SupplementalGroups to them [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] Security Context should support container.SecurityContext.RunAsUser And container.SecurityContext.RunAsGroup [LinuxOnly] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Security Context should support container.SecurityContext.RunAsUser And container.SecurityContext.RunAsGroup [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Security Context should support container.SecurityContext.RunAsUser [LinuxOnly]": { + "average_duration": 5 + }, + "[sig-node] Security Context should support container.SecurityContext.RunAsUser [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Security Context should support pod.Spec.SecurityContext.RunAsUser And pod.Spec.SecurityContext.RunAsGroup [LinuxOnly] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Security Context should support pod.Spec.SecurityContext.RunAsUser And pod.Spec.SecurityContext.RunAsGroup [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Security Context should support pod.Spec.SecurityContext.RunAsUser [LinuxOnly]": { + "average_duration": 5 + }, + "[sig-node] Security Context should support pod.Spec.SecurityContext.RunAsUser [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-node] Security Context should support pod.Spec.SecurityContext.SupplementalGroups [LinuxOnly]": { + "average_duration": 5 + }, + "[sig-node] Security Context should support pod.Spec.SecurityContext.SupplementalGroups [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Security Context should support seccomp default which is unconfined [LinuxOnly]": { + "average_duration": 5 + }, + "[sig-node] Security Context should support seccomp default which is unconfined [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Security Context should support seccomp runtime/default [LinuxOnly]": { + "average_duration": 5 + }, + "[sig-node] Security Context should support seccomp runtime/default [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Security Context should support seccomp unconfined on the container [LinuxOnly]": { + "average_duration": 5 + }, + "[sig-node] Security Context should support seccomp unconfined on the container [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Security Context should support seccomp unconfined on the pod [LinuxOnly]": { + "average_duration": 5 + }, + "[sig-node] Security Context should support seccomp unconfined on the pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when not explicitly set and uid != 0 [LinuxOnly] [NodeConformance]": { + "average_duration": 5 + }, + "[sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when not explicitly set and uid != 0 [LinuxOnly] [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when true [LinuxOnly] [NodeConformance]": { + "average_duration": 6 + }, + "[sig-node] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when true [LinuxOnly] [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-node] Security Context when creating containers with AllowPrivilegeEscalation should not allow privilege escalation when false [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 6 + }, + "[sig-node] Security Context when creating containers with AllowPrivilegeEscalation should not allow privilege escalation when false [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-node] Security Context when if the container's primary UID belongs to some groups in the image [LinuxOnly] should add pod.Spec.SecurityContext.SupplementalGroups to them [LinuxOnly] in resultant supplementary groups for the container processes": { + "average_duration": 5 + }, + "[sig-node] Security Context when if the container's primary UID belongs to some groups in the image [LinuxOnly] should add pod.Spec.SecurityContext.SupplementalGroups to them [LinuxOnly] in resultant supplementary groups for the container processes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Sysctls [LinuxOnly] [NodeConformance] should not launch unsafe, but not explicitly enabled sysctls on the node [MinimumKubeletVersion:1.21]": { + "average_duration": 2 + }, + "[sig-node] Sysctls [LinuxOnly] [NodeConformance] should not launch unsafe, but not explicitly enabled sysctls on the node [MinimumKubeletVersion:1.21] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-node] Sysctls [LinuxOnly] [NodeConformance] should reject invalid sysctls [MinimumKubeletVersion:1.21] [Conformance]": { + "average_duration": 1 + }, + "[sig-node] Sysctls [LinuxOnly] [NodeConformance] should reject invalid sysctls [MinimumKubeletVersion:1.21] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-node] Sysctls [LinuxOnly] [NodeConformance] should support sysctls [MinimumKubeletVersion:1.21] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-node] Sysctls [LinuxOnly] [NodeConformance] should support sysctls [MinimumKubeletVersion:1.21] [Environment:NotInUserNS] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Sysctls [LinuxOnly] [NodeConformance] should support sysctls [MinimumKubeletVersion:1.21] [Environment:NotInUserNS] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Sysctls [LinuxOnly] [NodeConformance] should support sysctls with slashes as separator [MinimumKubeletVersion:1.23] [Environment:NotInUserNS]": { + "average_duration": 5 + }, + "[sig-node] Sysctls [LinuxOnly] [NodeConformance] should support sysctls with slashes as separator [MinimumKubeletVersion:1.23] [Environment:NotInUserNS] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Sysctls [LinuxOnly] [NodeConformance] should support sysctls with slashes as separator [MinimumKubeletVersion:1.23] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-node] Test the NodeHasNoDiskPressure condition does not occur too often": { + "average_duration": 0 + }, + "[sig-node] Test the NodeHasSufficeintMemory condition does not occur too often": { + "average_duration": 0 + }, + "[sig-node] Test the NodeHasSufficientPID condition does not occur too often": { + "average_duration": 0 + }, + "[sig-node] User Namespaces for Pod Security Standards [LinuxOnly] with UserNamespacesSupport and UserNamespacesPodSecurityStandards enabled should allow pod [Feature:UserNamespacesPodSecurityStandards] [FeatureGate:UserNamespacesSupport] [Beta] [FeatureGate:UserNamespacesPodSecurityStandards] [Alpha] [Feature:OffByDefault]": { + "average_duration": 5 + }, + "[sig-node] User Namespaces for Pod Security Standards [LinuxOnly] with UserNamespacesSupport and UserNamespacesPodSecurityStandards enabled should allow pod [Feature:UserNamespacesPodSecurityStandards] [FeatureGate:UserNamespacesSupport] [Beta] [FeatureGate:UserNamespacesPodSecurityStandards] [Alpha] [Feature:OffByDefault] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] User Namespaces for Pod Security Standards [LinuxOnly] with UserNamespacesSupport and UserNamespacesPodSecurityStandards enabled should allow pod [Feature:UserNamespacesPodSecurityStandards] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] Variable Expansion allow almost all printable ASCII characters as environment variable names": { + "average_duration": 5 + }, + "[sig-node] Variable Expansion allow almost all printable ASCII characters as environment variable names [Feature:RelaxedEnvironmentVariableValidation] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Variable Expansion allow almost all printable ASCII characters as environment variable names [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-node] Variable Expansion should allow composing env vars into new env vars [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Variable Expansion should allow composing env vars into new env vars [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Variable Expansion should allow substituting values in a container's args [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Variable Expansion should allow substituting values in a container's args [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Variable Expansion should allow substituting values in a container's command [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Variable Expansion should allow substituting values in a container's command [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-node] Variable Expansion should allow substituting values in a volume subpath [Conformance]": { + "average_duration": 5 + }, + "[sig-node] Variable Expansion should allow substituting values in a volume subpath [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-node] Variable Expansion should fail substituting values in a volume subpath with absolute path [Conformance]": { + "average_duration": 6 + }, + "[sig-node] Variable Expansion should fail substituting values in a volume subpath with absolute path [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-node] Variable Expansion should fail substituting values in a volume subpath with backticks [Conformance]": { + "average_duration": 6 + }, + "[sig-node] Variable Expansion should fail substituting values in a volume subpath with backticks [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-node] Variable Expansion should succeed in writing subpaths in container [Conformance]": { + "average_duration": 35 + }, + "[sig-node] Variable Expansion should succeed in writing subpaths in container [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-node] [Conformance] Prevent openshift node labeling on update by the node TestOpenshiftNodeLabeling [Suite:openshift/conformance/parallel/minimal]": { + "average_duration": 14 + }, + "[sig-node] [DRA] ResourceSlice Controller creates slices [ConformanceCandidate]": { + "average_duration": 73 + }, + "[sig-node] [DRA] ResourceSlice Controller creates slices [ConformanceCandidate] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 83 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] must deallocate after use": { + "average_duration": 10 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] must deallocate after use [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] retries pod scheduling after creating device class": { + "average_duration": 12 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] retries pod scheduling after creating device class [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] retries pod scheduling after updating device class": { + "average_duration": 12 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] retries pod scheduling after updating device class [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] runs a pod without a generated resource claim": { + "average_duration": 14 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] runs a pod without a generated resource claim [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] supports claim and class parameters": { + "average_duration": 11 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] supports claim and class parameters [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] supports external claim referenced by multiple containers of multiple pods": { + "average_duration": 11 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] supports external claim referenced by multiple containers of multiple pods [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] supports external claim referenced by multiple pods": { + "average_duration": 11 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] supports external claim referenced by multiple pods [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] supports init containers": { + "average_duration": 11 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] supports init containers [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] supports inline claim referenced by multiple containers": { + "average_duration": 11 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] supports inline claim referenced by multiple containers [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] supports reusing resources": { + "average_duration": 23 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] supports reusing resources [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] supports sharing a claim concurrently": { + "average_duration": 11 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] supports sharing a claim concurrently [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] supports simple pod referencing external resource claim": { + "average_duration": 11 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] supports simple pod referencing external resource claim [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] supports simple pod referencing inline resource claim": { + "average_duration": 11 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] supports simple pod referencing inline resource claim [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] with different ResourceSlices keeps pod pending because of CEL runtime errors": { + "average_duration": 10 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] with different ResourceSlices keeps pod pending because of CEL runtime errors [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] with node-local resources uses all resources": { + "average_duration": 13 + }, + "[sig-node] [DRA] control plane [ConformanceCandidate] with node-local resources uses all resources [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-node] [DRA] control plane must apply per-node permission checks [ConformanceCandidate]": { + "average_duration": 10 + }, + "[sig-node] [DRA] control plane must apply per-node permission checks [ConformanceCandidate] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-node] [DRA] control plane must be possible for the driver to update the ResourceClaim.Status.Devices once allocated [FeatureGate:DRAResourceClaimDeviceStatus] [Beta]": { + "average_duration": 10 + }, + "[sig-node] [DRA] control plane must be possible for the driver to update the ResourceClaim.Status.Devices once allocated [FeatureGate:DRAResourceClaimDeviceStatus] [Beta] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-node] [DRA] control plane supports count/resourceclaims.resource.k8s.io ResourceQuota [ConformanceCandidate]": { + "average_duration": 8 + }, + "[sig-node] [DRA] control plane supports count/resourceclaims.resource.k8s.io ResourceQuota [ConformanceCandidate] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-node] [DRA] control plane truncates the name of a generated resource claim [ConformanceCandidate]": { + "average_duration": 10 + }, + "[sig-node] [DRA] control plane truncates the name of a generated resource claim [ConformanceCandidate] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-node] [DRA] control plane validate ResourceClaimTemplate and ResourceClaim for admin access [FeatureGate:DRAAdminAccess] [Beta]": { + "average_duration": 6 + }, + "[sig-node] [DRA] control plane validate ResourceClaimTemplate and ResourceClaim for admin access [FeatureGate:DRAAdminAccess] [Beta] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] DaemonSet with admin access [FeatureGate:DRAAdminAccess] [Beta]": { + "average_duration": 16 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] DaemonSet with admin access [FeatureGate:DRAAdminAccess] [Beta] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] [FeatureGate:DRAPrioritizedList] [Beta] chooses the correct subrequest subject to constraints": { + "average_duration": 83 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] [FeatureGate:DRAPrioritizedList] [Beta] chooses the correct subrequest subject to constraints [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 85 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] [FeatureGate:DRAPrioritizedList] [Beta] filters config correctly for multiple devices": { + "average_duration": 83 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] [FeatureGate:DRAPrioritizedList] [Beta] filters config correctly for multiple devices [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 85 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] [FeatureGate:DRAPrioritizedList] [Beta] selects the first subrequest that can be satisfied": { + "average_duration": 80 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] [FeatureGate:DRAPrioritizedList] [Beta] selects the first subrequest that can be satisfied [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 85 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] [FeatureGate:DRAPrioritizedList] [Beta] uses the config for the selected subrequest": { + "average_duration": 80 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] [FeatureGate:DRAPrioritizedList] [Beta] uses the config for the selected subrequest [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 85 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] blocks new pod after force-delete [KubeletMinVersion:1.34]": { + "average_duration": 92 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] blocks new pod after force-delete [KubeletMinVersion:1.34] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 99 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] deletes generated claims when pod is done": { + "average_duration": 45 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] deletes generated claims when pod is done [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 47 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] does not delete generated claims when pod is restarting": { + "average_duration": 63 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] does not delete generated claims when pod is restarting [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 67 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] failed update [KubeletMinVersion:1.33]": { + "average_duration": 52 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] failed update [KubeletMinVersion:1.33] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 58 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] must call NodePrepareResources even if not used by any container": { + "average_duration": 16 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] must call NodePrepareResources even if not used by any container [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] must manage ResourceSlices": { + "average_duration": 59 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] must manage ResourceSlices [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 62 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] must map configs and devices to the right containers": { + "average_duration": 20 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] must map configs and devices to the right containers [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] must not run a pod if a claim is not ready": { + "average_duration": 31 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] must not run a pod if a claim is not ready [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] must retry NodePrepareResources": { + "average_duration": 89 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] must retry NodePrepareResources [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 89 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] must unprepare resources for force-deleted pod": { + "average_duration": 17 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] must unprepare resources for force-deleted pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on multiple nodes with different ResourceSlices keeps pod pending because of CEL runtime errors": { + "average_duration": 40 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on multiple nodes with different ResourceSlices keeps pod pending because of CEL runtime errors [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 45 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on multiple nodes with node-local resources uses all resources": { + "average_duration": 48 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on multiple nodes with node-local resources uses all resources [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 51 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node must deallocate after use": { + "average_duration": 45 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node must deallocate after use [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 46 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node retries pod scheduling after creating device class": { + "average_duration": 45 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node retries pod scheduling after creating device class [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 48 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node retries pod scheduling after updating device class": { + "average_duration": 45 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node retries pod scheduling after updating device class [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node runs a pod without a generated resource claim": { + "average_duration": 44 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node runs a pod without a generated resource claim [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 45 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node supports claim and class parameters": { + "average_duration": 45 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node supports claim and class parameters [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 46 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node supports external claim referenced by multiple containers of multiple pods": { + "average_duration": 46 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node supports external claim referenced by multiple containers of multiple pods [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 51 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node supports external claim referenced by multiple pods": { + "average_duration": 45 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node supports external claim referenced by multiple pods [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 48 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node supports init containers": { + "average_duration": 45 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node supports init containers [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 48 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node supports inline claim referenced by multiple containers": { + "average_duration": 45 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node supports inline claim referenced by multiple containers [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node supports reusing resources": { + "average_duration": 65 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node supports reusing resources [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 71 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node supports sharing a claim concurrently": { + "average_duration": 45 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node supports sharing a claim concurrently [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node supports simple pod referencing external resource claim": { + "average_duration": 44 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node supports simple pod referencing external resource claim [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 47 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node supports simple pod referencing inline resource claim": { + "average_duration": 44 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] on single node supports simple pod referencing inline resource claim [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 46 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] registers plugin": { + "average_duration": 8 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] registers plugin [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] removes reservation from claim when pod is done": { + "average_duration": 44 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] removes reservation from claim when pod is done [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 47 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] rolling update [KubeletMinVersion:1.33]": { + "average_duration": 52 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] rolling update [KubeletMinVersion:1.33] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 56 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] runs pod after driver starts": { + "average_duration": 45 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] runs pod after driver starts [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 56 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] supports init containers with external claims": { + "average_duration": 47 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] supports init containers with external claims [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 51 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] with multiple drivers using drapbv1beta1 and drapbv1 work": { + "average_duration": 87 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] with multiple drivers using drapbv1beta1 and drapbv1 work [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 92 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] with multiple drivers using only drapbv1 [KubeletMinVersion:1.34] work": { + "average_duration": 88 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] with multiple drivers using only drapbv1 [KubeletMinVersion:1.34] work [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 94 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] with multiple drivers using only drapbv1beta1 work": { + "average_duration": 87 + }, + "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] with multiple drivers using only drapbv1beta1 work [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 95 + }, + "[sig-node] [Feature:ContainerStopSignals] when create a pod with a StopSignal lifecycle StopSignal defined with pod.OS [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-node] [Feature:Example] Downward API should create a pod that prints his name and namespace": { + "average_duration": 6 + }, + "[sig-node] [Feature:Example] Downward API should create a pod that prints his name and namespace [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-node] [Feature:Example] Liveness liveness pods should be automatically restarted": { + "average_duration": 68 + }, + "[sig-node] [Feature:Example] Liveness liveness pods should be automatically restarted [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 75 + }, + "[sig-node] [Feature:Example] Secret should create a pod that reads a secret": { + "average_duration": 6 + }, + "[sig-node] [Feature:Example] Secret should create a pod that reads a secret [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-node] [Feature:KubeletFineGrainedAuthz] when calling kubelet API check /healthz enpoint is accessible via nodes/healthz RBAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-node] [Feature:KubeletFineGrainedAuthz] when calling kubelet API check /healthz enpoint is accessible via nodes/proxy RBAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-node] [Feature:KubeletFineGrainedAuthz] when calling kubelet API check /healthz enpoint is not accessible via nodes/configz RBAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-node] [Feature:PodLifecycleSleepActionAllowZero] when create a pod with lifecycle hook using sleep action with a duration of zero seconds prestop hook using sleep action with zero duration [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-node] [Feature:PodLifecycleSleepAction] when create a pod with lifecycle hook using sleep action ignore terminated container [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-node] [Feature:PodLifecycleSleepAction] when create a pod with lifecycle hook using sleep action reduce GracePeriodSeconds during runtime [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should *not* be restarted by liveness probe because startup probe delays it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 242 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should *not* be restarted with a /healthz http liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 241 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should *not* be restarted with a GRPC liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 241 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should *not* be restarted with a exec \"cat /tmp/health\" liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 241 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should *not* be restarted with a non-local redirect http liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 241 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should *not* be restarted with a tcp:8080 liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 241 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should be ready immediately after startupProbe succeeds [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should be restarted by liveness probe after startup probe enables it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 63 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should be restarted startup probe fails [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 73 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should be restarted with a /healthz http liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should be restarted with a GRPC liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 74 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should be restarted with a exec \"cat /tmp/health\" liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 53 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should be restarted with a failing exec liveness probe that took longer than the timeout [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should be restarted with a local redirect http liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should be restarted with an exec liveness probe with timeout [MinimumKubeletVersion:1.20] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 54 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should have monotonically increasing restart count [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 147 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should mark readiness on pods to false and disable liveness probes while pod is in progress of terminating [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 92 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should mark readiness on pods to false while pod is in progress of terminating when a pod has a readiness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should not be ready with an exec readiness probe timeout [MinimumKubeletVersion:1.20] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 60 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should override timeoutGracePeriodSeconds when LivenessProbe field is set [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container should override timeoutGracePeriodSeconds when StartupProbe field is set [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container with readiness probe should not be ready before initial delay and never restart [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-node] [Feature:SidecarContainers] Probing restartable init container with readiness probe that fails should never be ready and never restart [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 60 + }, + "[sig-node] [Feature:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart exec hook properly [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-node] [Feature:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart http hook properly [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-node] [Feature:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart https hook properly [MinimumKubeletVersion:1.23] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-node] [Feature:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop exec hook properly [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-node] [Feature:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop http hook properly [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-node] [Feature:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop https hook properly [MinimumKubeletVersion:1.23] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should *not* be restarted by liveness probe because startup probe delays it": { + "average_duration": 225 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should *not* be restarted by liveness probe because startup probe delays it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 245 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should *not* be restarted with a /healthz http liveness probe": { + "average_duration": 225 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should *not* be restarted with a /healthz http liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 245 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should *not* be restarted with a GRPC liveness probe": { + "average_duration": 225 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should *not* be restarted with a GRPC liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 245 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should *not* be restarted with a exec \"cat /tmp/health\" liveness probe": { + "average_duration": 225 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should *not* be restarted with a exec \"cat /tmp/health\" liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 245 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should *not* be restarted with a non-local redirect http liveness probe": { + "average_duration": 225 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should *not* be restarted with a non-local redirect http liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 245 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should *not* be restarted with a tcp:8080 liveness probe": { + "average_duration": 225 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should *not* be restarted with a tcp:8080 liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 245 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should be ready immediately after startupProbe succeeds": { + "average_duration": 35 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should be ready immediately after startupProbe succeeds [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should be restarted by liveness probe after startup probe enables it": { + "average_duration": 58 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should be restarted by liveness probe after startup probe enables it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 64 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should be restarted startup probe fails": { + "average_duration": 68 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should be restarted startup probe fails [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 75 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should be restarted with a /healthz http liveness probe": { + "average_duration": 21 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should be restarted with a /healthz http liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 24 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should be restarted with a GRPC liveness probe": { + "average_duration": 68 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should be restarted with a GRPC liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 76 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should be restarted with a exec \"cat /tmp/health\" liveness probe": { + "average_duration": 49 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should be restarted with a exec \"cat /tmp/health\" liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 54 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should be restarted with a failing exec liveness probe that took longer than the timeout": { + "average_duration": 49 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should be restarted with a failing exec liveness probe that took longer than the timeout [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 54 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should be restarted with a local redirect http liveness probe": { + "average_duration": 21 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should be restarted with a local redirect http liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 24 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should be restarted with an exec liveness probe with timeout [MinimumKubeletVersion:1.20]": { + "average_duration": 50 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should be restarted with an exec liveness probe with timeout [MinimumKubeletVersion:1.20] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 55 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should have monotonically increasing restart count": { + "average_duration": 138 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should have monotonically increasing restart count [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 151 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should mark readiness on pods to false and disable liveness probes while pod is in progress of terminating": { + "average_duration": 85 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should mark readiness on pods to false and disable liveness probes while pod is in progress of terminating [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 94 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should mark readiness on pods to false while pod is in progress of terminating when a pod has a readiness probe": { + "average_duration": 36 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should mark readiness on pods to false while pod is in progress of terminating when a pod has a readiness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should not be ready with an exec readiness probe timeout [MinimumKubeletVersion:1.20]": { + "average_duration": 56 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should not be ready with an exec readiness probe timeout [MinimumKubeletVersion:1.20] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 61 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should override timeoutGracePeriodSeconds when LivenessProbe field is set": { + "average_duration": 22 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should override timeoutGracePeriodSeconds when LivenessProbe field is set [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should override timeoutGracePeriodSeconds when StartupProbe field is set": { + "average_duration": 22 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container should override timeoutGracePeriodSeconds when StartupProbe field is set [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container with readiness probe should not be ready before initial delay and never restart": { + "average_duration": 23 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container with readiness probe should not be ready before initial delay and never restart [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container with readiness probe that fails should never be ready and never restart": { + "average_duration": 56 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Probing restartable init container with readiness probe that fails should never be ready and never restart [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 61 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart exec hook properly": { + "average_duration": 10 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart exec hook properly [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart http hook properly": { + "average_duration": 9 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart http hook properly [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart https hook properly [MinimumKubeletVersion:1.23]": { + "average_duration": 9 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart https hook properly [MinimumKubeletVersion:1.23] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop exec hook properly": { + "average_duration": 9 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop exec hook properly [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop http hook properly": { + "average_duration": 9 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop http hook properly [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop https hook properly [MinimumKubeletVersion:1.23]": { + "average_duration": 9 + }, + "[sig-node] [Feature:SidecarContainers] [FeatureGate:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop https hook properly [MinimumKubeletVersion:1.23] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-node] [FeatureGate:ImageVolume] ImageVolume should fail when image does not exist [Suite:openshift/conformance/parallel]": { + "average_duration": 8 + }, + "[sig-node] [FeatureGate:ImageVolume] ImageVolume should handle multiple image volumes [Suite:openshift/conformance/parallel]": { + "average_duration": 10 + }, + "[sig-node] [FeatureGate:ImageVolume] ImageVolume should succeed if image volume is not existing but unused [Suite:openshift/conformance/parallel]": { + "average_duration": 10 + }, + "[sig-node] [FeatureGate:ImageVolume] ImageVolume should succeed with multiple pods and same image on the same node [Suite:openshift/conformance/parallel]": { + "average_duration": 16 + }, + "[sig-node] [FeatureGate:ImageVolume] ImageVolume should succeed with pod and pull policy of Always [Suite:openshift/conformance/parallel]": { + "average_duration": 10 + }, + "[sig-node] [FeatureGate:ImageVolume] ImageVolume when subPath is used should fail to mount image volume with invalid subPath [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-node] [FeatureGate:ImageVolume] ImageVolume when subPath is used should handle image volume with subPath [Suite:openshift/conformance/parallel]": { + "average_duration": 10 + }, + "[sig-node] [FeatureGate:KubeletFineGrainedAuthz] [Beta] when calling kubelet API check /healthz enpoint is accessible via nodes/healthz RBAC": { + "average_duration": 4 + }, + "[sig-node] [FeatureGate:KubeletFineGrainedAuthz] [Beta] when calling kubelet API check /healthz enpoint is accessible via nodes/healthz RBAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-node] [FeatureGate:KubeletFineGrainedAuthz] [Beta] when calling kubelet API check /healthz enpoint is accessible via nodes/proxy RBAC": { + "average_duration": 4 + }, + "[sig-node] [FeatureGate:KubeletFineGrainedAuthz] [Beta] when calling kubelet API check /healthz enpoint is accessible via nodes/proxy RBAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-node] [FeatureGate:KubeletFineGrainedAuthz] [Beta] when calling kubelet API check /healthz enpoint is not accessible via nodes/configz RBAC": { + "average_duration": 4 + }, + "[sig-node] [FeatureGate:KubeletFineGrainedAuthz] [Beta] when calling kubelet API check /healthz enpoint is not accessible via nodes/configz RBAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should *not* be restarted by liveness probe because startup probe delays it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 247 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should *not* be restarted with a /healthz http liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 247 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should *not* be restarted with a GRPC liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 247 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should *not* be restarted with a exec \"cat /tmp/health\" liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 247 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should *not* be restarted with a non-local redirect http liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 247 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should *not* be restarted with a tcp:8080 liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 247 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should be ready immediately after startupProbe succeeds [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should be restarted by liveness probe after startup probe enables it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 65 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should be restarted startup probe fails [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 76 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should be restarted with a /healthz http liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should be restarted with a GRPC liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 78 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should be restarted with a exec \"cat /tmp/health\" liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 55 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should be restarted with a failing exec liveness probe that took longer than the timeout [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 35 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should be restarted with a local redirect http liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should be restarted with an exec liveness probe with timeout [MinimumKubeletVersion:1.20] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 56 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should have monotonically increasing restart count [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 152 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should mark readiness on pods to false and disable liveness probes while pod is in progress of terminating [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 95 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should mark readiness on pods to false while pod is in progress of terminating when a pod has a readiness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should not be ready with an exec readiness probe timeout [MinimumKubeletVersion:1.20] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 62 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should override timeoutGracePeriodSeconds when LivenessProbe field is set [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 28 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should override timeoutGracePeriodSeconds when StartupProbe field is set [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 28 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container with readiness probe should not be ready before initial delay and never restart [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 24 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container with readiness probe that fails should never be ready and never restart [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 62 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart exec hook properly [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart http hook properly [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart https hook properly [MinimumKubeletVersion:1.23] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop exec hook properly [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop http hook properly [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-node] [NodeAlphaFeature:SidecarContainers] [Feature:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop https hook properly [MinimumKubeletVersion:1.23] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should *not* be restarted by liveness probe because startup probe delays it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 243 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should *not* be restarted with a /healthz http liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 243 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should *not* be restarted with a GRPC liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 242 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should *not* be restarted with a exec \"cat /tmp/health\" liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 243 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should *not* be restarted with a non-local redirect http liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 243 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should *not* be restarted with a tcp:8080 liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 243 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should be ready immediately after startupProbe succeeds [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should be restarted by liveness probe after startup probe enables it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 65 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should be restarted startup probe fails [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 74 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should be restarted with a /healthz http liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should be restarted with a GRPC liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 77 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should be restarted with a exec \"cat /tmp/health\" liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 55 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should be restarted with a failing exec liveness probe that took longer than the timeout [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 35 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should be restarted with a local redirect http liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should be restarted with an exec liveness probe with timeout [MinimumKubeletVersion:1.20] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 56 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should have monotonically increasing restart count [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 148 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should mark readiness on pods to false and disable liveness probes while pod is in progress of terminating [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 95 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should mark readiness on pods to false while pod is in progress of terminating when a pod has a readiness probe [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 43 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should not be ready with an exec readiness probe timeout [MinimumKubeletVersion:1.20] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 60 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should override timeoutGracePeriodSeconds when LivenessProbe field is set [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 28 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container should override timeoutGracePeriodSeconds when StartupProbe field is set [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 28 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container with readiness probe should not be ready before initial delay and never restart [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Probing restartable init container with readiness probe that fails should never be ready and never restart [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 60 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart exec hook properly [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart http hook properly [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart https hook properly [MinimumKubeletVersion:1.23] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop exec hook properly [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop http hook properly [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-node] [NodeFeature:SidecarContainers] [Feature:SidecarContainers] Restartable Init Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop https hook properly [MinimumKubeletVersion:1.23] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-node] [Serial] Pod InPlace Resize Container (scheduler-focused) [FeatureGate:InPlacePodVerticalScaling] [Beta] pod-resize-scheduler-tests": { + "average_duration": 14 + }, + "[sig-node] [Serial] Pod InPlace Resize Container (scheduler-focused) [FeatureGate:InPlacePodVerticalScaling] [Beta] pod-resize-scheduler-tests [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 80 + }, + "[sig-node] kubelet Clean up pods on node kubelet should be able to delete 10 pods per node in 1m0s.": { + "average_duration": 17 + }, + "[sig-node] kubelet Clean up pods on node kubelet should be able to delete 10 pods per node in 1m0s. [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-node] kubelet logs do not contain ErrImagePull unrecognized signature format": { + "average_duration": 0 + }, + "[sig-node] kubelet logs do not contain http client connection lost errors": { + "average_duration": 0 + }, + "[sig-node] kubelet logs do not contain late lease update errors": { + "average_duration": 0 + }, + "[sig-node] kubelet metrics endpoints should always be reachable": { + "average_duration": 0 + }, + "[sig-node] kubelet should be able to delete cgroups path": { + "average_duration": 0 + }, + "[sig-node] kubelet should not use an anonymous user": { + "average_duration": 0 + }, + "[sig-node] kubelet terminates kube-apiserver gracefully": { + "average_duration": 0 + }, + "[sig-node] kubelet-log-collector detected lease failures in backoff": { + "average_duration": 0 + }, + "[sig-node] kubelet-log-collector detects node failed to lease events in rapid succession": { + "average_duration": 0 + }, + "[sig-node] node-lifecycle detects unexpected not ready node": { + "average_duration": 0 + }, + "[sig-node] node-lifecycle detects unreachable state on node": { + "average_duration": 0 + }, + "[sig-node] nodes should not go unready after being upgraded and go unready only once": { + "average_duration": 0 + }, + "[sig-node] openshift-config-operator readiness probe should not fail due to timeout": { + "average_duration": 0 + }, + "[sig-node] openshift-config-operator should not get probe error on liveness probe due to timeout": { + "average_duration": 0 + }, + "[sig-node] openshift-config-operator should not get probe error on readiness probe due to timeout": { + "average_duration": 0 + }, + "[sig-node] overlapping apiserver process detected during kube-apiserver rollout": { + "average_duration": 0 + }, + "[sig-node] pathological event ErrorReconcilingNode condition does not occur too often": { + "average_duration": 0 + }, + "[sig-node] pathological event FailedScheduling condition does not occur too often": { + "average_duration": 0 + }, + "[sig-node] pathological event NodeHasNoDiskPressure condition does not occur too often": { + "average_duration": 0 + }, + "[sig-node] pathological event NodeHasSufficeintMemory condition does not occur too often": { + "average_duration": 0 + }, + "[sig-node] pathological event NodeHasSufficientPID condition does not occur too often": { + "average_duration": 0 + }, + "[sig-node] pathological event OperatorStatusChanged condition does not occur too often": { + "average_duration": 0 + }, + "[sig-node] pathological event openshift-config-operator readiness probe should not fail due to timeout": { + "average_duration": 0 + }, + "[sig-node] pathological event openshift-config-operator should not get probe error on liveness probe due to timeout": { + "average_duration": 0 + }, + "[sig-node] pathological event openshift-config-operator should not get probe error on readiness probe due to connection refused": { + "average_duration": 0 + }, + "[sig-node] pathological event openshift-config-operator should not get probe error on readiness probe due to timeout": { + "average_duration": 0 + }, + "[sig-node] pods should never transition back to pending": { + "average_duration": 0 + }, + "[sig-node] pods should not fail on systemd timeouts": { + "average_duration": 0 + }, + "[sig-node] should not encounter ErrImagePull QPS exceeded error in non-openshift namespace pods": { + "average_duration": 0 + }, + "[sig-node] should not encounter ErrImagePull QPS exceeded error in openshift namespace pods": { + "average_duration": 0 + }, + "[sig-node] should not encounter ErrImagePull in non-openshift namespace pods": { + "average_duration": 0 + }, + "[sig-node] should not encounter ErrImagePull in openshift namespace pods": { + "average_duration": 0 + }, + "[sig-node] should not encounter ErrImagePull manifest unknown error in non-openshift namespace pods": { + "average_duration": 0 + }, + "[sig-node] should not encounter ErrImagePull manifest unknown error in openshift namespace pods": { + "average_duration": 0 + }, + "[sig-node] should not encounter ErrImagePull read connection timeout in non-openshift namespace pods": { + "average_duration": 0 + }, + "[sig-node] should not encounter ErrImagePull read connection timeout in openshift namespace pods": { + "average_duration": 0 + }, + "[sig-node] should override timeoutGracePeriodSeconds when annotation is set [Suite:openshift/conformance/parallel]": { + "average_duration": 14 + }, + "[sig-node] static pods should start after being created": { + "average_duration": 0 + }, + "[sig-node] supplemental groups Ensure supplemental groups propagate to docker should propagate requested groups to the container [apigroup:security.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-node][Disruptive][Feature:KubeletGracefulShutdown] Kubelet with graceful shutdown configuration should respect pods termination grace period [Serial]": { + "average_duration": 234 + }, + "[sig-node][Disruptive][Feature:KubeletGracefulShutdown] Kubelet with graceful shutdown configuration should respect pods termination grace period [Serial]": { + "average_duration": 221 + }, + "[sig-node][Late] should not have pod creation failures due to systemd timeouts [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-node][Suite:openshift/nodes/realtime/latency][Disruptive] Real time kernel should meet latency requirements when tested with cyclictest [Serial]": { + "average_duration": 618 + }, + "[sig-node][Suite:openshift/nodes/realtime/latency][Disruptive] Real time kernel should meet latency requirements when tested with cyclictest [Serial]": { + "average_duration": 616 + }, + "[sig-node][Suite:openshift/nodes/realtime/latency][Disruptive] Real time kernel should meet latency requirements when tested with hwlatdetect [Serial]": { + "average_duration": 616 + }, + "[sig-node][Suite:openshift/nodes/realtime/latency][Disruptive] Real time kernel should meet latency requirements when tested with hwlatdetect [Serial]": { + "average_duration": 614 + }, + "[sig-node][Suite:openshift/nodes/realtime/latency][Disruptive] Real time kernel should meet latency requirements when tested with oslat [Serial]": { + "average_duration": 639 + }, + "[sig-node][Suite:openshift/nodes/realtime/latency][Disruptive] Real time kernel should meet latency requirements when tested with oslat [Serial]": { + "average_duration": 675 + }, + "[sig-node][Suite:openshift/nodes/realtime/latency][Disruptive] Real time kernel should meet latency requirements when tested with rteval [Serial]": { + "average_duration": 15 + }, + "[sig-node][Suite:openshift/nodes/realtime][Disruptive] Real time kernel should allow deadline_test to run successfully [Serial]": { + "average_duration": 25 + }, + "[sig-node][Suite:openshift/nodes/realtime][Disruptive] Real time kernel should allow deadline_test to run successfully [Serial]": { + "average_duration": 23 + }, + "[sig-node][Suite:openshift/nodes/realtime][Disruptive] Real time kernel should allow pi_stress to run successfully with the fifo algorithm [Serial]": { + "average_duration": 617 + }, + "[sig-node][Suite:openshift/nodes/realtime][Disruptive] Real time kernel should allow pi_stress to run successfully with the fifo algorithm [Serial]": { + "average_duration": 617 + }, + "[sig-node][Suite:openshift/nodes/realtime][Disruptive] Real time kernel should allow pi_stress to run successfully with the round robin algorithm [Serial]": { + "average_duration": 618 + }, + "[sig-node][Suite:openshift/nodes/realtime][Disruptive] Real time kernel should allow pi_stress to run successfully with the round robin algorithm [Serial]": { + "average_duration": 616 + }, + "[sig-node][apigroup:config.openshift.io] CPU Partitioning cluster infrastructure should be configured correctly [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-node][apigroup:config.openshift.io] CPU Partitioning cluster platform workloads should be annotated correctly for DaemonSets [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-node][apigroup:config.openshift.io] CPU Partitioning cluster platform workloads should be annotated correctly for Deployments [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-node][apigroup:config.openshift.io] CPU Partitioning cluster workloads in annotated namespaces should be modified if CPUPartitioningMode = AllNodes [Suite:openshift/conformance/parallel]": { + "average_duration": 7 + }, + "[sig-node][apigroup:config.openshift.io] CPU Partitioning cluster workloads in non-annotated namespaces should be allowed if CPUPartitioningMode = AllNodes with a warning annotation [Suite:openshift/conformance/parallel]": { + "average_duration": 6 + }, + "[sig-node][apigroup:config.openshift.io] CPU Partitioning cluster workloads in non-annotated namespaces should not be allowed if CPUPartitioningMode = AllNodes [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-node][apigroup:config.openshift.io] CPU Partitioning cluster workloads with limits should have resources modified if CPUPartitioningMode = AllNodes [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-node][apigroup:config.openshift.io] CPU Partitioning node validation should have correct cpuset and cpushare set in crio containers [Suite:openshift/conformance/parallel]": { + "average_duration": 22 + }, + "[sig-node][apigroup:config.openshift.io] expected Master and Arbiter node counts Should validate that there are Master and Arbiter nodes as specified in the cluster [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-node][apigroup:config.openshift.io] required pods on the Arbiter node Should verify that the correct number of pods are running on the Arbiter node [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-node][apigroup:config.openshift.io][OCPFeatureGate:DualReplica] Two Node with Fencing topology should have BareMetalHost operational status set to detached if they exist [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-node][apigroup:config.openshift.io][OCPFeatureGate:DualReplica] Two Node with Fencing topology should have infrastructure platform type set correctly [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-node][apigroup:config.openshift.io][OCPFeatureGate:DualReplica] Two Node with Fencing topology should only have two control plane nodes and no arbiter nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-node][apigroup:config.openshift.io][OCPFeatureGate:DualReplica][Suite:openshift/two-node] Two Node with Fencing topology Should validate the number of control-planes, arbiters as configured": { + "average_duration": 0 + }, + "[sig-node][apigroup:config.openshift.io][OCPFeatureGate:HighlyAvailableArbiter] expected Master and Arbiter node counts Should validate that there are Master and Arbiter nodes as specified in the cluster [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-node][apigroup:config.openshift.io][OCPFeatureGate:HighlyAvailableArbiter] required pods on the Arbiter node Should verify that the correct number of pods are running on the Arbiter node [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-node][invariant] alert/TargetDown should not be at or above info in ns/kube-system": { + "average_duration": 0 + }, + "[sig-olmv1] OLMv1 should pass a trivial sanity check": { + "average_duration": 0 + }, + "[sig-olmv1][Jira:OLM] cluster-olm-operator PolarionID:80078-[OTP]Downstream feature gate promotion mechanics": { + "average_duration": 6 + }, + "[sig-olmv1][Jira:OLM] clustercatalog PolarionID:69069-[OTP][Skipped:Disconnected]Replace pod-based image unpacker with an image registry client": { + "average_duration": 63 + }, + "[sig-olmv1][Jira:OLM] clustercatalog PolarionID:69123-[OTP][Skipped:Disconnected]Catalogd clustercatalog offer the operator content through http server": { + "average_duration": 27 + }, + "[sig-olmv1][Jira:OLM] clustercatalog PolarionID:69202-[OTP][Skipped:Disconnected][Skipped:Proxy]Catalogd clustercatalog offer the operator content through http server off cluster": { + "average_duration": 32 + }, + "[sig-olmv1][Jira:OLM] clustercatalog PolarionID:69242-[OTP][Skipped:Disconnected]Catalogd deprecated package bundlemetadata catalogmetadata from clustercatalog CR": { + "average_duration": 8 + }, + "[sig-olmv1][Jira:OLM] clustercatalog PolarionID:69242-[Skipped:Disconnected]Catalogd deprecated package/bundlemetadata/catalogmetadata from clustercatalog CR": { + "average_duration": 7 + }, + "[sig-olmv1][Jira:OLM] clustercatalog PolarionID:69869-[OTP][Skipped:Disconnected]Catalogd Add metrics to the Storage implementation": { + "average_duration": 43 + }, + "[sig-olmv1][Jira:OLM] clustercatalog PolarionID:73219-[OTP][Skipped:Disconnected]Fetch deprecation data from the catalogd http server": { + "average_duration": 38 + }, + "[sig-olmv1][Jira:OLM] clustercatalog PolarionID:73289-[OTP][Skipped:Disconnected]Check the deprecation conditions and messages": { + "average_duration": 194 + }, + "[sig-olmv1][Jira:OLM] clustercatalog PolarionID:74948-[OTP][Skipped:Disconnected]catalog offer the operator content through https server": { + "average_duration": 98 + }, + "[sig-olmv1][Jira:OLM] clustercatalog PolarionID:74978-[OTP][LEVEL0][Skipped:Disconnected]CRD upgrade will be prevented if the Scope is switched between Namespaced and Cluster": { + "average_duration": 156 + }, + "[sig-olmv1][Jira:OLM] clustercatalog PolarionID:75122-[OTP][Skipped:Disconnected]CRD upgrade check Removing an existing stored version and add a new CRD with no modifications to existing versions": { + "average_duration": 140 + }, + "[sig-olmv1][Jira:OLM] clustercatalog PolarionID:75123-[OTP][Skipped:Disconnected]CRD upgrade checks for changes in required field and field type": { + "average_duration": 158 + }, + "[sig-olmv1][Jira:OLM] clustercatalog PolarionID:75124-[OTP][Skipped:Disconnected]CRD upgrade checks for changes in default values": { + "average_duration": 126 + }, + "[sig-olmv1][Jira:OLM] clustercatalog PolarionID:75218-[OTP][Skipped:Disconnected]Disabling the CRD Upgrade Safety preflight checks": { + "average_duration": 181 + }, + "[sig-olmv1][Jira:OLM] clustercatalog PolarionID:75441-[OTP][Skipped:Disconnected]Catalogd supports compression and jsonlines format": { + "average_duration": 36 + }, + "[sig-olmv1][Jira:OLM] clustercatalog PolarionID:75515-[OTP][Skipped:Disconnected]CRD upgrade checks for changes in enumeration values": { + "average_duration": 142 + }, + "[sig-olmv1][Jira:OLM] clustercatalog PolarionID:75516-[OTP][Skipped:Disconnected][Skipped:SNO]CRD upgrade checks for the field maximum minimum changes": { + "average_duration": 216 + }, + "[sig-olmv1][Jira:OLM] clustercatalog PolarionID:80458-[OTP][Level0][Skipped:Disconnected]clustercatalog get x509 error since it cannot get the custom CA automatically [Serial]": { + "average_duration": 38 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:68936-[OTP][Skipped:Disconnected]cluster extension can not be installed with insufficient permission sa for operand": { + "average_duration": 140 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:68936-[OTP]cluster extension can not be installed with insufficient permission sa for operand": { + "average_duration": 151 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:68936-[Skipped:Disconnected]cluster extension can not be installed with insufficient permission sa for operand": { + "average_duration": 142 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:68937-[OTP][Skipped:Disconnected]cluster extension can not be installed with insufficient permission sa for operand rbac object": { + "average_duration": 148 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:68937-[OTP]cluster extension can not be installed with insufficient permission sa for operand rbac object": { + "average_duration": 152 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:68937-[Skipped:Disconnected]cluster extension can not be installed with insufficient permission sa for operand rbac object": { + "average_duration": 140 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:74618-[OTP]ClusterExtension supports simple registry vzero bundles only": { + "average_duration": 168 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:74618-[OTP][Skipped:Disconnected]ClusterExtension supports simple registry vzero bundles only": { + "average_duration": 169 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:74618-[Skipped:Disconnected]ClusterExtension supports simple registry vzero bundles only": { + "average_duration": 168 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:75492-[OTP][Level0][Skipped:Disconnected]cluster extension can not be installed with wrong sa or insufficient permission sa": { + "average_duration": 159 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:75492-[OTP][Level0]cluster extension can not be installed with wrong sa or insufficient permission sa": { + "average_duration": 158 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:75492-[Skipped:Disconnected]cluster extension can not be installed with wrong sa or insufficient permission sa": { + "average_duration": 150 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:75493-[OTP][Level0][Skipped:Disconnected]cluster extension can be installed with enough permission sa": { + "average_duration": 155 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:75493-[OTP][Level0]cluster extension can be installed with enough permission sa": { + "average_duration": 167 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:75493-[Skipped:Disconnected]cluster extension can be installed with enough permission sa": { + "average_duration": 154 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:76843-[OTP][Skipped:Disconnected]support disc with icsp[Timeout:30m] [Serial][Disruptive][Slow]": { + "average_duration": 983 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:76843-[Skipped:Disconnected]support disc with icsp[Timeout:30m] [Serial][Disruptive][Slow]": { + "average_duration": 989 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:76844-[OTP][Skipped:Disconnected]support disc with itms and idms[Timeout:30m] [Serial][Disruptive][Slow]": { + "average_duration": 1529 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:76844-[Skipped:Disconnected]support disc with itms and idms[Timeout:30m] [Serial][Disruptive][Slow]": { + "average_duration": 1501 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:76983-[OTP][Skipped:Disconnected]install index and bundle from private image[Slow]": { + "average_duration": 6 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:76983-[Skipped:Disconnected]install index and bundle from private image[Slow]": { + "average_duration": 6 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:76985-[OTP][Skipped:Disconnected]authfile is updated automatically[Timeout:30m] [Serial][Disruptive][Slow]": { + "average_duration": 431 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:76985-[Skipped:Disconnected]authfile is updated automatically[Timeout:30m] [Serial][Disruptive][Slow]": { + "average_duration": 427 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:78193-[OTP][Skipped:Disconnected]Runtime validation of container images using sigstore signatures [Serial][Disruptive][Slow]": { + "average_duration": 567 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:78193-[Skipped:Disconnected]Runtime validation of container images using sigstore signatures [Serial][Disruptive][Slow]": { + "average_duration": 555 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:78300-[OTP][Skipped:Disconnected]validation of container images using sigstore signatures with different policy [Serial][Disruptive][Slow]": { + "average_duration": 550 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:78300-[Skipped:Disconnected]validation of container images using sigstore signatures with different policy [Serial][Disruptive][Slow]": { + "average_duration": 538 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:81538-[OTP][Skipped:Disconnected]preflight check on permission on allns mode": { + "average_duration": 90 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:81538-[OTP]preflight check on permission on allns mode": { + "average_duration": 102 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:81538-[Skipped:Disconnected]preflight check on permission on allns mode": { + "average_duration": 55 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:81664-[OTP][Skipped:Disconnected]preflight check on permission on own ns mode": { + "average_duration": 93 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:81664-[OTP]preflight check on permission on own ns mode": { + "average_duration": 103 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:81664-[Skipped:Disconnected]preflight check on permission on own ns mode": { + "average_duration": 54 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:81696-[OTP][Skipped:Disconnected]preflight check on permission on single ns mode": { + "average_duration": 105 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:81696-[OTP]preflight check on permission on single ns mode": { + "average_duration": 125 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:81696-[Skipped:Disconnected]preflight check on permission on single ns mode": { + "average_duration": 61 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[OTP][Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource unknown change and refusing to determine that change is safe": { + "average_duration": 288 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:83069-[OTP]olmv1 static networkpolicy.": { + "average_duration": 7 + }, + "[sig-olmv1][Jira:OLM] clusterextension PolarionID:83069-olmv1 static networkpolicy.": { + "average_duration": 7 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMCatalogdAPIV1Metas][Skipped:Disconnected] OLMv1 openshift-certified-operators Catalog should serve FBC via the /v1/api/metas endpoint": { + "average_duration": 0 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMCatalogdAPIV1Metas][Skipped:Disconnected] OLMv1 openshift-certified-operators Catalog should serve FBC via the /v1/api/metas endpoint [Suite:openshift/conformance/parallel]": { + "average_duration": 29 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMCatalogdAPIV1Metas][Skipped:Disconnected] OLMv1 openshift-community-operators Catalog should serve FBC via the /v1/api/metas endpoint": { + "average_duration": 0 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMCatalogdAPIV1Metas][Skipped:Disconnected] OLMv1 openshift-community-operators Catalog should serve FBC via the /v1/api/metas endpoint [Suite:openshift/conformance/parallel]": { + "average_duration": 31 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMCatalogdAPIV1Metas][Skipped:Disconnected] OLMv1 openshift-redhat-marketplace Catalog should serve FBC via the /v1/api/metas endpoint": { + "average_duration": 0 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMCatalogdAPIV1Metas][Skipped:Disconnected] OLMv1 openshift-redhat-marketplace Catalog should serve FBC via the /v1/api/metas endpoint [Suite:openshift/conformance/parallel]": { + "average_duration": 30 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMCatalogdAPIV1Metas][Skipped:Disconnected] OLMv1 openshift-redhat-operators Catalog should serve FBC via the /v1/api/metas endpoint": { + "average_duration": 0 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMCatalogdAPIV1Metas][Skipped:Disconnected] OLMv1 openshift-redhat-operators Catalog should serve FBC via the /v1/api/metas endpoint [Suite:openshift/conformance/parallel]": { + "average_duration": 29 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMOwnSingleNamespace] OLMv1 operator installation should reject invalid watch namespace configuration and update the status conditions accordingly should fail to install the ClusterExtension when watch namespace is invalid": { + "average_duration": 63 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMOwnSingleNamespace] OLMv1 operator installation support for ownNamespace and single namespace watch mode with operator should install cluster extensions successfully in both watch modes": { + "average_duration": 300 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMOwnSingleNamespace] OLMv1 operator installation support for ownNamespace watch mode with operator should install a cluster extension successfully": { + "average_duration": 69 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMOwnSingleNamespace] OLMv1 operator installation support for singleNamespace watch mode with operator should install a cluster extension successfully": { + "average_duration": 78 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMOwnSingleNamespace][Serial] OLMv1 operator installation support for ownNamespace watch mode with an operator that does not support ownNamespace installation mode should fail to install a cluster extension successfully": { + "average_duration": 34 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMOwnSingleNamespace][Skipped:Disconnected][Serial] OLMv1 operator installation support for ownNamespace watch mode with an operator that does not support ownNamespace installation mode should fail to install a cluster extension successfully": { + "average_duration": 3 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMOwnSingleNamespace][Skipped:Disconnected][Serial] OLMv1 operator installation support for ownNamespace watch mode with quay-operator should install a cluster extension successfully": { + "average_duration": 4 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMOwnSingleNamespace][Skipped:Disconnected][Serial] OLMv1 operator installation support for singleNamespace watch mode with quay-operator should install a cluster extension successfully": { + "average_duration": 3 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMPreflightPermissionChecks][Skipped:Disconnected] OLMv1 operator preflight checks should report error when {ClusterRoleBindings} are not specified": { + "average_duration": 12 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMPreflightPermissionChecks][Skipped:Disconnected] OLMv1 operator preflight checks should report error when {ClusterRoleBindings} are not specified [Suite:openshift/conformance/parallel]": { + "average_duration": 13 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMPreflightPermissionChecks][Skipped:Disconnected] OLMv1 operator preflight checks should report error when {ConfigMap:resourceNames} are not all specified": { + "average_duration": 8 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMPreflightPermissionChecks][Skipped:Disconnected] OLMv1 operator preflight checks should report error when {ConfigMap:resourceNames} are not all specified [Suite:openshift/conformance/parallel]": { + "average_duration": 15 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMPreflightPermissionChecks][Skipped:Disconnected] OLMv1 operator preflight checks should report error when {clusterextension/finalizer} is not specified": { + "average_duration": 8 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMPreflightPermissionChecks][Skipped:Disconnected] OLMv1 operator preflight checks should report error when {clusterextension/finalizer} is not specified [Suite:openshift/conformance/parallel]": { + "average_duration": 15 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMPreflightPermissionChecks][Skipped:Disconnected] OLMv1 operator preflight checks should report error when {create} verb is not specified": { + "average_duration": 12 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMPreflightPermissionChecks][Skipped:Disconnected] OLMv1 operator preflight checks should report error when {create} verb is not specified [Suite:openshift/conformance/parallel]": { + "average_duration": 14 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMPreflightPermissionChecks][Skipped:Disconnected] OLMv1 operator preflight checks should report error when {escalate, bind} is not specified": { + "average_duration": 12 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMPreflightPermissionChecks][Skipped:Disconnected] OLMv1 operator preflight checks should report error when {escalate, bind} is not specified [Suite:openshift/conformance/parallel]": { + "average_duration": 14 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMPreflightPermissionChecks][Skipped:Disconnected] OLMv1 operator preflight checks should report error when {services} are not specified": { + "average_duration": 12 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMPreflightPermissionChecks][Skipped:Disconnected] OLMv1 operator preflight checks should report error when {services} are not specified [Suite:openshift/conformance/parallel]": { + "average_duration": 14 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMWebhookProviderOpenshiftServiceCA] OLMv1 operator with webhooks should be tolerant to tls secret deletion [Serial]": { + "average_duration": 57 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMWebhookProviderOpenshiftServiceCA] OLMv1 operator with webhooks should clean up webhooks when the extension is uninstalled [Serial]": { + "average_duration": 45 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMWebhookProviderOpenshiftServiceCA] OLMv1 operator with webhooks should have a working conversion webhook [Serial]": { + "average_duration": 63 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMWebhookProviderOpenshiftServiceCA] OLMv1 operator with webhooks should have a working mutating webhook [Serial]": { + "average_duration": 57 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMWebhookProviderOpenshiftServiceCA] OLMv1 operator with webhooks should have a working validating webhook": { + "average_duration": 182 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMWebhookProviderOpenshiftServiceCA][Skipped:Disconnected][Serial] OLMv1 operator with webhooks should be tolerant to tls secret deletion": { + "average_duration": 35 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMWebhookProviderOpenshiftServiceCA][Skipped:Disconnected][Serial] OLMv1 operator with webhooks should have a working conversion webhook": { + "average_duration": 34 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMWebhookProviderOpenshiftServiceCA][Skipped:Disconnected][Serial] OLMv1 operator with webhooks should have a working mutating webhook": { + "average_duration": 31 + }, + "[sig-olmv1][OCPFeatureGate:NewOLMWebhookProviderOpenshiftServiceCA][Skipped:Disconnected][Serial] OLMv1 operator with webhooks should have a working validating webhook": { + "average_duration": 32 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM] OLMv1 CRDs should be installed": { + "average_duration": 0 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM] OLMv1 CRDs should be installed [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM] OLMv1 operator installation should block cluster upgrades if an incompatible operator is installed": { + "average_duration": 57 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM] OLMv1 operator installation should fail to install a non-existing cluster extension": { + "average_duration": 55 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM] OLMv1 operator installation should install a cluster extension": { + "average_duration": 56 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1 Catalogs should be installed": { + "average_duration": 0 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1 Catalogs should be installed [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1 New Catalog Install should fail to install if it has an invalid reference": { + "average_duration": 30 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1 New Catalog Install should fail to install if it has an invalid reference [Suite:openshift/conformance/parallel]": { + "average_duration": 29 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1 openshift-certified-operators Catalog should serve FBC via the /v1/api/all endpoint": { + "average_duration": 0 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1 openshift-certified-operators Catalog should serve FBC via the /v1/api/all endpoint [Suite:openshift/conformance/parallel]": { + "average_duration": 35 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1 openshift-community-operators Catalog should serve FBC via the /v1/api/all endpoint": { + "average_duration": 0 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1 openshift-community-operators Catalog should serve FBC via the /v1/api/all endpoint [Suite:openshift/conformance/parallel]": { + "average_duration": 35 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1 openshift-redhat-marketplace Catalog should serve FBC via the /v1/api/all endpoint": { + "average_duration": 0 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1 openshift-redhat-marketplace Catalog should serve FBC via the /v1/api/all endpoint [Suite:openshift/conformance/parallel]": { + "average_duration": 34 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1 openshift-redhat-operators Catalog should serve FBC via the /v1/api/all endpoint": { + "average_duration": 0 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1 openshift-redhat-operators Catalog should serve FBC via the /v1/api/all endpoint [Suite:openshift/conformance/parallel]": { + "average_duration": 35 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1 operator installation should block cluster upgrades if an incompatible operator is installed": { + "average_duration": 63 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1 operator installation should block cluster upgrades if an incompatible operator is installed [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1 operator installation should fail to install a non-existing cluster extension": { + "average_duration": 5 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1 operator installation should fail to install a non-existing cluster extension [Suite:openshift/conformance/parallel]": { + "average_duration": 9 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1 operator installation should install a cluster extension": { + "average_duration": 10 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1 operator installation should install a cluster extension [Suite:openshift/conformance/parallel]": { + "average_duration": 14 + }, + "[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1 operator installation should install an openshift catalog cluster extension": { + "average_duration": 24 + }, + "[sig-operator] OLM should Implement packages API server and list packagemanifest info with namespace not NULL [apigroup:packages.operators.coreos.com] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-operator] OLM should Implement packages API server and list packagemanifest info with namespace not NULL [apigroup:packages.operators.coreos.com] [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-operator] OLM should be installed with catalogsources at version v1alpha1 [apigroup:operators.coreos.com] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-operator] OLM should be installed with catalogsources at version v1alpha1 [apigroup:operators.coreos.com] [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-operator] OLM should be installed with clusterserviceversions at version v1alpha1 [apigroup:operators.coreos.com] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-operator] OLM should be installed with clusterserviceversions at version v1alpha1 [apigroup:operators.coreos.com] [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-operator] OLM should be installed with installplans at version v1alpha1 [apigroup:operators.coreos.com] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-operator] OLM should be installed with installplans at version v1alpha1 [apigroup:operators.coreos.com] [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-operator] OLM should be installed with operatorgroups at version v1 [apigroup:operators.coreos.com] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-operator] OLM should be installed with operatorgroups at version v1 [apigroup:operators.coreos.com] [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-operator] OLM should be installed with packagemanifests at version v1 [apigroup:packages.operators.coreos.com] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-operator] OLM should be installed with packagemanifests at version v1 [apigroup:packages.operators.coreos.com] [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-operator] OLM should be installed with subscriptions at version v1alpha1 [apigroup:operators.coreos.com] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-operator] OLM should be installed with subscriptions at version v1alpha1 [apigroup:operators.coreos.com] [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-operator] OLM should have imagePullPolicy:IfNotPresent on thier deployments [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-operator] OLM should have imagePullPolicy:IfNotPresent on thier deployments [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-operator] OLM should have imagePullPolicy:IfNotPresent on thier deployments [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-operator] an end user can use OLM Report Upgradeable in OLM ClusterOperators status [apigroup:config.openshift.io] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-operator] an end user can use OLM Report Upgradeable in OLM ClusterOperators status [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-operator] an end user can use OLM can subscribe to the operator [apigroup:config.openshift.io] [Skipped:Disconnected] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel]": { + "average_duration": 48 + }, + "[sig-operator] an end user can use OLM can subscribe to the operator [apigroup:config.openshift.io] [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 119 + }, + "[sig-operator] an end user can use OLM can subscribe to the operator [apigroup:config.openshift.io] [Suite:openshift/conformance/parallel]": { + "average_duration": 35 + }, + "[sig-operator][Jira:OLM] OLMv0 on hypershift mgmt PolarionID:45381-[OTP][Skipped:Disconnected]Support custom catalogs in hypershift": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 on hypershift mgmt PolarionID:45381-[Skipped:Disconnected]Support custom catalogs in hypershift": { + "average_duration": 9 + }, + "[sig-operator][Jira:OLM] OLMv0 on hypershift mgmt PolarionID:45408-[OTP][Skipped:Disconnected]Eliminate use of imagestreams in catalog management": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 on hypershift mgmt PolarionID:45408-[Skipped:Disconnected]Eliminate use of imagestreams in catalog management": { + "average_duration": 9 + }, + "[sig-operator][Jira:OLM] OLMv0 on hypershift mgmt PolarionID:45543-[OTP][Skipped:Disconnected]Enable hypershift to deploy OperatorLifecycleManager resources": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 on microshift PolarionID:69867-[OTP][Skipped:Disconnected]deployed in microshift and install one operator with single mode.": { + "average_duration": 5 + }, + "[sig-operator][Jira:OLM] OLMv0 on microshift PolarionID:69867-[Skipped:Disconnected]deployed in microshift and install one operator with single mode.": { + "average_duration": 5 + }, + "[sig-operator][Jira:OLM] OLMv0 on microshift PolarionID:69868-[OTP][Skipped:Disconnected]olm microshift install operator with all mode muilt og error and delete one og to get it installed.": { + "average_duration": 5 + }, + "[sig-operator][Jira:OLM] OLMv0 on microshift PolarionID:69868-[Skipped:Disconnected]olm microshift install operator with all mode, muilt og error and delete one og to get it installed.": { + "average_duration": 5 + }, + "[sig-operator][Jira:OLM] OLMv0 on microshift PolarionID:83581-[OTP][Skipped:Disconnected]olmv0 networkpolicy on microshift.": { + "average_duration": 5 + }, + "[sig-operator][Jira:OLM] OLMv0 on microshift PolarionID:83581-[Skipped:Disconnected]olmv0 networkpolicy on microshift.": { + "average_duration": 5 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:34016-[OTP]opm can prune operators from catalog": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:34016-opm can prune operators from catalog": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:43171-[OTP][Skipped:Disconnected] opm render blob from bundle db based index dc based index db file and directory": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:43171-[Skipped:Disconnected] opm render blob from bundle, db based index, dc based index, db file and directory": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:43180-[OTP]opm init dc configuration package": { + "average_duration": 7 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:43180-opm init dc configuration package": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:43185-DC based opm subcommands out of alpha": { + "average_duration": 10 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:43185-[OTP]DC based opm subcommands out of alpha": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:43248-Support ignoring files when loading declarative configs": { + "average_duration": 10 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:43248-[OTP]Support ignoring files when loading declarative configs": { + "average_duration": 9 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:43409-[OTP][Skipped:Disconnected] opm can list catalog contents": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:43409-[Skipped:Disconnected] opm can list catalog contents": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:43768-Improve formatting of opm validate": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:43768-[OTP]Improve formatting of opm validate": { + "average_duration": 10 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:45401-[OTP]opm validate should detect cycles in channels": { + "average_duration": 10 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:45401-opm validate should detect cycles in channels": { + "average_duration": 10 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:45402-[OTP][Skipped:Disconnected] opm render should automatically pulling in the images used in the deployments": { + "average_duration": 10 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:45402-[Skipped:Disconnected] opm render should automatically pulling in the image(s) used in the deployments": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:45407-[OTP]opm and oc should print sqlite deprecation warnings": { + "average_duration": 9 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:45407-opm and oc should print sqlite deprecation warnings": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:48438-[OTP][Skipped:Disconnected] opm render should support olm.constraint which is defined in dependencies": { + "average_duration": 9 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:48438-[Skipped:Disconnected] opm render should support olm.constraint which is defined in dependencies": { + "average_duration": 11 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:53869-[OTP][Skipped:Disconnected] opm supports creating a catalog using basic veneer": { + "average_duration": 9 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:53869-[Skipped:Disconnected] opm supports creating a catalog using basic veneer": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:53871-PolarionID:53915-PolarionID:53996-[OTP][Skipped:Disconnected][Slow] opm supports creating a catalog using semver veneer [Slow]": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:53871-PolarionID:53915-PolarionID:53996-[Skipped:Disconnected][Slow] opm supports creating a catalog using semver veneer [Slow]": { + "average_duration": 9 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:53917-[OTP][Skipped:Disconnected] opm can visualize the update graph for a given Operator from an arbitrary version": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:53917-[Skipped:Disconnected] opm can visualize the update graph for a given Operator from an arbitrary version": { + "average_duration": 11 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:54168-[OTP][Skipped:Disconnected] opm support '--use-http' global flag": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:54168-[Skipped:Disconnected] opm support '--use-http' global flag": { + "average_duration": 11 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:60573-[OTP][Skipped:Disconnected] opm exclude bundles with olm.deprecated property when rendering": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:60573-[Skipped:Disconnected] opm exclude bundles with olm.deprecated property when rendering": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:70013-[OTP][Skipped:Disconnected] opm support deprecated channel": { + "average_duration": 9 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:70013-[Skipped:Disconnected] opm support deprecated channel": { + "average_duration": 11 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:73218-[OTP][Skipped:Disconnected] opm alpha render-graph indicate deprecated graph content": { + "average_duration": 10 + }, + "[sig-operator][Jira:OLM] OLMv0 opm should PolarionID:73218-[Skipped:Disconnected] opm alpha render-graph indicate deprecated graph content": { + "average_duration": 11 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:20981-[OTP]-Medium-20981-contain the source commit id": { + "average_duration": 7 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:21126-[OTP]-Medium-21126-OLM Subscription status says CSV is installed when it is not": { + "average_duration": 7 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:21548-[OTP]-High-21548-aggregates CR roles to standard admin view edit": { + "average_duration": 17 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:22070-[OTP]-[Skipped:Disconnected]Critical-22070-support grpc sourcetype [Serial]": { + "average_duration": 810 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:24028-[OTP]-High-24028-need to set priorityClassName as system-cluster-critical": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:25922-[OTP]-Medium-25922-Support spec.config.volumes and volumemount in Subscription": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:25966-[OTP]-High-25966-offline mirroring support": { + "average_duration": 11 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:32559-[OTP]-High-32559-catalog operator crashed": { + "average_duration": 80 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:33450-[OTP]-[Skipped:Disconnected]Medium-33450-Operator upgrades can delete existing CSV before completion": { + "average_duration": 267 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:33902-[OTP]-[Skipped:Disconnected]Medium-33902-Catalog Weighting": { + "average_duration": 243 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:35631-[OTP]-Medium-35631-Remove OperatorSource API": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:37260-[OTP]-[Skipped:Disconnected]High-37260-should allow to create the default CatalogSource [Serial][Disruptive]": { + "average_duration": 346 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:37442-[OTP]-High-37442-create a Conditions CR for each Operator it installs": { + "average_duration": 7 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:37631-[OTP]-Medium-37631-Allow cluster admin to overwrite the OperatorCondition": { + "average_duration": 9 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:37710-[OTP]-[Skipped:Disconnected]Medium-37710-supports the Upgradeable Supported Condition": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:37826-[OTP]-[Skipped:Disconnected]High-37826-use an PullSecret for the private Catalog Source image [Serial]": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:43101-[OTP]-[Skipped:Disconnected]High-43101-OLM blocks minor OpenShift upgrades when incompatible optional operators are installed": { + "average_duration": 332 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:43271-[OTP]-Medium-43191-Medium-43271-Bundle Content Compression": { + "average_duration": 7 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:43487-[OTP]-High-43487-3rd party Operator Catalog references change during an OCP Upgrade": { + "average_duration": 47 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:43803-[OTP]-Medium-43803-Only one of multiple subscriptions to the same package is honored": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:43977-[OTP]-Medium-43977-OPENSHIFT_VERSIONS in assisted operator subscription does not propagate [Serial]": { + "average_duration": 747 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:43978-[OTP]-Medium-43978-Catalog pods don't report termination logs to catalog-operator": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:45411-[OTP]-High-45411-packageserver isn't following the OpenShift HA conventions": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:46964-[OTP]-[Skipped:Disconnected]High-46964-Disable Copied CSVs Toggle [Serial]": { + "average_duration": 740 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:48980-[OTP]-[Skipped:Disconnected]High-48980-oc adm catalog mirror image to local": { + "average_duration": 34 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:49167-[OTP]-High-49167-fatal error": { + "average_duration": 9 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:49352-[OTP]-Medium-49352-SNO Leader election conventions for cluster topology": { + "average_duration": 7 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:49687-[OTP]-Medium-49687-Make the marketplace operator optional": { + "average_duration": 7 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:53740-[OTP]-Medium-53740-CatalogSource incorrect parsing validation": { + "average_duration": 35 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:53758-[OTP]-[Skipped:Disconnected]High-53758-failed to recreate SA for the CatalogSource that without poll Interval": { + "average_duration": 59 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:53759-[OTP]-Medium-53759-Opeatorhub status shows errors after disabling default catalogSources [Serial][Disruptive]": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:53914-[OTP]-Medium-53914-OLM controller plug-in for openshift-* namespace labelling [Serial]": { + "average_duration": 749 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:59413-[OTP]-[Skipped:Disconnected]High-59413-Default CatalogSource aren't created in restricted mode [Serial]": { + "average_duration": 10 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:59416-[OTP]-[Skipped:Disconnected]High-59416-Revert Catalog PSA decisions for 4.12 [Serial]": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:59422-[OTP]-High-59422-package-server-manager does not stomp on changes made to packgeserver CSV": { + "average_duration": 72 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:68679-[OTP]-[Skipped:Disconnected]Low-68679-catalogsource with invalid name is created": { + "average_duration": 64 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:68679-[OTP][Skipped:Disconnected]catalogsource with invalid name is created": { + "average_duration": 72 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:68679-[Skipped:Disconnected]catalogsource with invalid name is created": { + "average_duration": 63 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:68681-[OTP]-[Skipped:Disconnected]Medium-68681-pods with no 'controller: true' ownerReferences": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:70162-[OTP]-High-70162-Leverage Composable OpenShift feature to make OperatorLifecycleManager optional": { + "average_duration": 7 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:71996-[OTP]-High-71996-package-server-manager forbidden securityContext.seLinuxOptions [Serial]": { + "average_duration": 20 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:72013-[OTP]-High-72013-Creating an OperatorGroup with 'Name: cluster' breaks the whole cluster": { + "average_duration": 11 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:72017-[OTP]-Medium-72017-pod panics when EnsureSecretOwnershipAnnotations runs": { + "average_duration": 19 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:72192-[OTP]-Critical-72192-is not correctly refreshing operator catalogs due to IfNotPresent imagePullPolicy": { + "average_duration": 22 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:73201-[OTP]-[Skipped:Disconnected]High-73201-catalog pods do not recover from node failure [Disruptive][Serial]": { + "average_duration": 198 + }, + "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:83027-[OTP]-High-83027-Unnecessary churn with operatorgroup clusterrole management[Serial]": { + "average_duration": 739 + }, + "[sig-operator][Jira:OLM] OLMv0 should PolarionID:21825-[OTP][Skipped:Disconnected]Certs for packageserver can be rotated successfully [Serial]": { + "average_duration": 24 + }, + "[sig-operator][Jira:OLM] OLMv0 should PolarionID:22259-[OTP][Skipped:Disconnected]marketplace operator CR status on a running cluster[Serial]": { + "average_duration": 26 + }, + "[sig-operator][Jira:OLM] OLMv0 should PolarionID:22259-[Skipped:Disconnected]marketplace operator CR status on a running cluster[Serial]": { + "average_duration": 27 + }, + "[sig-operator][Jira:OLM] OLMv0 should PolarionID:24076-[OTP]check the version of olm operator is appropriate in ClusterOperator": { + "average_duration": 14 + }, + "[sig-operator][Jira:OLM] OLMv0 should PolarionID:29775-PolarionID:29786-[OTP][Skipped:Disconnected]as oc user on linux to mirror catalog image[Slow][Timeout:30m]": { + "average_duration": 139 + }, + "[sig-operator][Jira:OLM] OLMv0 should PolarionID:33452-[OTP][Skipped:Disconnected]oc adm catalog mirror does not mirror the index image itself": { + "average_duration": 11 + }, + "[sig-operator][Jira:OLM] OLMv0 should PolarionID:73695-[OTP][Skipped:Disconnected]PO is disable": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 should PolarionID:73695-[Skipped:Disconnected]PO is disable": { + "average_duration": 9 + }, + "[sig-operator][Jira:OLM] OLMv0 should PolarionID:83105-[OTP][Skipped:Disconnected]olmv0 static networkpolicy on ocp": { + "average_duration": 10 + }, + "[sig-operator][Jira:OLM] OLMv0 should PolarionID:83583-[OTP][Skipped:Disconnected]olmv0 networkpolicy on hosted hypershift": { + "average_duration": 7 + }, + "[sig-operator][Jira:OLM] OLMv0 should pass a trivial sanity check": { + "average_duration": 0 + }, + "[sig-operator][Jira:OLM] OLMv0 with multi ns PolarionID:22226-[OTP][Skipped:Disconnected]the csv without support MultiNamespace fails for og with MultiNamespace": { + "average_duration": 106 + }, + "[sig-operator][Jira:OLM] OLMv0 with multi ns PolarionID:22226-[Skipped:Disconnected]the csv without support MultiNamespace fails for og with MultiNamespace": { + "average_duration": 79 + }, + "[sig-operator][Jira:OLM] OLMv0 with multi ns PolarionID:29275-[OTP][Skipped:Disconnected]label to target namespace of operator group with multi namespace": { + "average_duration": 55 + }, + "[sig-operator][Jira:OLM] OLMv0 with multi ns PolarionID:71119-[OTP][Skipped:Disconnected]pod does not start for installing operator of multi-ns mode when og is in one of the ns[Serial]": { + "average_duration": 253 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:20979-[OTP][Skipped:Disconnected]only one IP is generated": { + "average_duration": 156 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:20979-[OTP]only one IP is generated": { + "average_duration": 141 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:21404-[OTP][Skipped:Disconnected]csv will be RequirementsNotMet after sa is delete": { + "average_duration": 223 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:22200-[OTP][Skipped:Disconnected]add minimum kube version to CSV [Slow]": { + "average_duration": 383 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:23170-[OTP]API labels should be hash": { + "average_duration": 155 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:23170-[OTP][Skipped:Disconnected]API labels should be hash": { + "average_duration": 148 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:23473-[OTP][Skipped:Disconnected]permit z-stream releases skipping during operator updates": { + "average_duration": 191 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:24027-[OTP][Skipped:Disconnected]can create and delete catalogsource and sub repeatedly": { + "average_duration": 308 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:24382-[OTP][Skipped:Disconnected]Should restrict CRD update if schema changes[Serial]": { + "average_duration": 235 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:24438-[OTP][Skipped:Disconnected]check subscription CatalogSource Status": { + "average_duration": 125 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:24513-[OTP]Operator config support env only": { + "average_duration": 147 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:24513-[OTP][Skipped:Disconnected]Operator config support env only": { + "average_duration": 146 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:24870-[OTP][Skipped:Disconnected]can not create csv without operator group": { + "average_duration": 153 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:24870-[Skipped:Disconnected]can not create csv without operator group": { + "average_duration": 129 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:25757-PolarionID:22656-[OTP][Skipped:Disconnected]manual approval strategy apply to subsequent releases": { + "average_duration": 197 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:25760-[OTP]Operator upgrades does not fail after change the channel": { + "average_duration": 139 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:25760-[OTP][Skipped:Disconnected]Operator upgrades does not fail after change the channel": { + "average_duration": 130 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:25855-[OTP][Skipped:Disconnected][Serial]Add the channel field to subscription_sync_count": { + "average_duration": 116 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:27683-[OTP]InstallPlans can install from extracted bundles": { + "average_duration": 170 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:27683-[OTP][Skipped:Disconnected]InstallPlans can install from extracted bundles": { + "average_duration": 160 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:29231-PolarionID:29277-[OTP]label to target namespace of group": { + "average_duration": 63 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:29723-[OTP]As cluster admin find abnormal status condition via components of operator resource": { + "average_duration": 149 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:29723-[OTP][Skipped:Disconnected]As cluster admin find abnormal status condition via components of operator resource": { + "average_duration": 112 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:30762-[OTP][Skipped:Disconnected]installs bundles with v1 CRDs": { + "average_duration": 160 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:30762-[OTP]installs bundles with v1 CRDs": { + "average_duration": 162 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:32863-[OTP][Skipped:Disconnected]Support resources required for SAP Gardener Control Plane Operator[Serial][Disruptive]": { + "average_duration": 121 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:33176-[OTP][Skipped:Disconnected]Enable generated operator component adoption for operators with single ns mode[Slow][Serial]": { + "average_duration": 193 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:34472-[OTP][Skipped:Disconnected]olm label dependency": { + "average_duration": 118 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:35895-[OTP][Skipped:Disconnected]can't install a CSV with duplicate roles": { + "average_duration": 98 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:37263-[OTP][Skipped:Disconnected][Skipped:Proxy]Subscription stays in UpgradePending but InstallPlan not installing [Slow]": { + "average_duration": 339 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:37263-[Skipped:Disconnected][Skipped:Proxy]Subscription stays in UpgradePending but InstallPlan not installing [Slow]": { + "average_duration": 282 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:39897-[OTP][Skipped:Disconnected]operator objects should not be recreated after all other associated resources have been deleted[Serial]": { + "average_duration": 103 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:39897-[OTP]operator objects should not be recreated after all other associated resources have been deleted[Serial]": { + "average_duration": 109 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:40958-[OTP][Skipped:Disconnected]Indicate invalid OperatorGroup on InstallPlan status": { + "average_duration": 96 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:50135-[OTP][Skipped:Disconnected]automatic upgrade for failed operator installation og created correctly": { + "average_duration": 58 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:50136-[OTP][Skipped:Disconnected]automatic upgrade for failed operator installation csv fails[Slow][Timeout:30m]": { + "average_duration": 802 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:50138-[OTP][Skipped:Disconnected]automatic upgrade for failed operator installation ip fails": { + "average_duration": 277 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:60114-[OTP][Skipped:Disconnected]olm serves an api to discover all versions of an operator[Slow]": { + "average_duration": 230 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:62973-[OTP][Skipped:Disconnected]dedicated way collect profiles cronjob pod missing target.workload.openshift.io management annotation[Serial][Disruptive][Slow]": { + "average_duration": 6 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:62973-[OTP]general way collect profiles cronjob pod missing target.workload.openshift.io management annotation": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 within a namespace PolarionID:62974-[OTP]olm sets invalid scc label on its namespaces": { + "average_duration": 8 + }, + "[sig-operator][Jira:OLM] OLMv0 within all namespace PolarionID:21418-PolarionID:25679-[OTP]Cluster resource created and deleted correctly [Serial]": { + "average_duration": 97 + }, + "[sig-operator][Jira:OLM] OLMv0 within all namespace PolarionID:21418-PolarionID:25679-[OTP][Skipped:Disconnected]Cluster resource created and deleted correctly [Serial]": { + "average_duration": 101 + }, + "[sig-operator][Jira:OLM] OLMv0 within all namespace PolarionID:21418-PolarionID:25679-[Skipped:Disconnected]Cluster resource created and deleted correctly [Serial]": { + "average_duration": 98 + }, + "[sig-operator][Jira:OLM] OLMv0 within all namespace PolarionID:21484-PolarionID:21532-[OTP][Skipped:Disconnected]watch special or all namespace by operator group": { + "average_duration": 165 + }, + "[sig-operator][Jira:OLM] OLMv0 within all namespace PolarionID:21484-PolarionID:21532-[OTP]watch special or all namespace by operator group": { + "average_duration": 146 + }, + "[sig-operator][Jira:OLM] OLMv0 within all namespace PolarionID:22226-[OTP][Skipped:Disconnected]the csv without support AllNamespaces fails for og with allnamespace": { + "average_duration": 112 + }, + "[sig-operator][Jira:OLM] OLMv0 within all namespace PolarionID:24906-[OTP]Operators requesting cluster-scoped permission can trigger kube GC bug[Serial]": { + "average_duration": 98 + }, + "[sig-operator][Jira:OLM] OLMv0 within all namespace PolarionID:24906-[OTP][Skipped:Disconnected]Operators requesting cluster-scoped permission can trigger kube GC bug[Serial]": { + "average_duration": 84 + }, + "[sig-operator][Jira:OLM] OLMv0 within all namespace PolarionID:25783-[OTP][Skipped:Disconnected]Subscriptions are not getting processed taking very long to get processed[Serial]": { + "average_duration": 87 + }, + "[sig-operator][Jira:OLM] OLMv0 within all namespace PolarionID:33241-[OTP][Skipped:Disconnected]Enable generated operator component adoption for operators with all ns mode[Serial]": { + "average_duration": 101 + }, + "[sig-operators] OLM on microshift Author:kuiwang-MicroShiftOnly-ConnectedOnly-Medium-83581-olmv0 networkpolicy on microshift.": { + "average_duration": 4 + }, + "[sig-operators] OLM on microshift MicroShiftOnly-ConnectedOnly-Author:kuiwang-Medium-69867-deployed in microshift and install one operator with single mode.": { + "average_duration": 75 + }, + "[sig-operators] OLM on microshift MicroShiftOnly-ConnectedOnly-Author:kuiwang-Medium-69868-olm microshift install operator with all mode, muilt og error and delete one og to get it installed.": { + "average_duration": 88 + }, + "[sig-scheduling] LimitRange should create a LimitRange with defaults and ensure pod has those defaults applied. [Conformance]": { + "average_duration": 8 + }, + "[sig-scheduling] LimitRange should create a LimitRange with defaults and ensure pod has those defaults applied. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-scheduling] LimitRange should list, patch and delete a LimitRange by collection [Conformance]": { + "average_duration": 2 + }, + "[sig-scheduling] LimitRange should list, patch and delete a LimitRange by collection [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-scheduling] Multi-AZ Clusters should spread the pods of a service across zones [Serial]": { + "average_duration": 31 + }, + "[sig-scheduling] Multi-AZ Clusters should spread the pods of a service across zones [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 37 + }, + "[sig-scheduling] SchedulerPredicates [Serial] PodTopologySpread Filtering validates 4 pods with MaxSkew=1 are evenly distributed into 2 nodes": { + "average_duration": 8 + }, + "[sig-scheduling] SchedulerPredicates [Serial] PodTopologySpread Filtering validates 4 pods with MaxSkew=1 are evenly distributed into 2 nodes [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates Pods with non-empty schedulingGates are blocked on scheduling": { + "average_duration": 5 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates Pods with non-empty schedulingGates are blocked on scheduling [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates local ephemeral storage resource limits of pods that are allowed to run": { + "average_duration": 9 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates local ephemeral storage resource limits of pods that are allowed to run [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates pod overhead is considered along with resource limits of pods that are allowed to run verify pod overhead is accounted for": { + "average_duration": 14 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates pod overhead is considered along with resource limits of pods that are allowed to run verify pod overhead is accounted for [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates resource limits of pods that are allowed to run [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates resource limits of pods that are allowed to run [Conformance]": { + "average_duration": 6 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates resource limits of pods that are allowed to run [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates that NodeAffinity is respected if not matching": { + "average_duration": 3 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates that NodeAffinity is respected if not matching [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates that NodeSelector is respected if matching [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates that NodeSelector is respected if matching [Conformance]": { + "average_duration": 6 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates that NodeSelector is respected if matching [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates that NodeSelector is respected if not matching [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates that NodeSelector is respected if not matching [Conformance]": { + "average_duration": 2 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates that NodeSelector is respected if not matching [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates that required NodeAffinity setting is respected if matching": { + "average_duration": 6 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates that required NodeAffinity setting is respected if matching [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates that taints-tolerations is respected if matching": { + "average_duration": 6 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates that taints-tolerations is respected if matching [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates that taints-tolerations is respected if not matching": { + "average_duration": 6 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates that taints-tolerations is respected if not matching [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates that there is no conflict between pods with same hostPort but different hostIP and protocol": { + "average_duration": 11 + }, + "[sig-scheduling] SchedulerPredicates [Serial] validates that there is no conflict between pods with same hostPort but different hostIP and protocol [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-scheduling] SchedulerPredicates [Serial] when PVC has node-affinity to non-existent/illegal nodes, the pod should be scheduled normally if suitable nodes exist": { + "average_duration": 13 + }, + "[sig-scheduling] SchedulerPredicates [Serial] when PVC has node-affinity to non-existent/illegal nodes, the pod should be scheduled normally if suitable nodes exist [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-scheduling] SchedulerPreemption [Serial] PodTopologySpread Preemption validates proper pods are preempted": { + "average_duration": 78 + }, + "[sig-scheduling] SchedulerPreemption [Serial] PodTopologySpread Preemption validates proper pods are preempted [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 79 + }, + "[sig-scheduling] SchedulerPreemption [Serial] PreemptionExecutionPath runs ReplicaSets to verify preemption running path [Conformance]": { + "average_duration": 81 + }, + "[sig-scheduling] SchedulerPreemption [Serial] PreemptionExecutionPath runs ReplicaSets to verify preemption running path [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 81 + }, + "[sig-scheduling] SchedulerPreemption [Serial] PriorityClass endpoints verify PriorityClass endpoints can be operated with different HTTP methods [Conformance]": { + "average_duration": 62 + }, + "[sig-scheduling] SchedulerPreemption [Serial] PriorityClass endpoints verify PriorityClass endpoints can be operated with different HTTP methods [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 62 + }, + "[sig-scheduling] SchedulerPreemption [Serial] validates basic preemption works [Conformance]": { + "average_duration": 68 + }, + "[sig-scheduling] SchedulerPreemption [Serial] validates basic preemption works [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 69 + }, + "[sig-scheduling] SchedulerPreemption [Serial] validates lower priority pod preemption by critical pod [Conformance]": { + "average_duration": 68 + }, + "[sig-scheduling] SchedulerPreemption [Serial] validates lower priority pod preemption by critical pod [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 69 + }, + "[sig-scheduling] SchedulerPreemption [Serial] validates pod disruption condition is added to the preempted pod [Conformance]": { + "average_duration": 65 + }, + "[sig-scheduling] SchedulerPreemption [Serial] validates pod disruption condition is added to the preempted pod [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 65 + }, + "[sig-scheduling] SchedulerPreemption [Serial] validates pod disruption condition is added to the preempted pod [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 67 + }, + "[sig-scheduling] SchedulerPreemption [Serial] validates various priority Pods preempt expectedly with the async preemption [Feature:SchedulerAsyncPreemption] [FeatureGate:SchedulerAsyncPreemption] [Beta] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 127 + }, + "[sig-scheduling] SchedulerPriorities [Serial] Pod should be preferably scheduled to nodes pod can tolerate": { + "average_duration": 77 + }, + "[sig-scheduling] SchedulerPriorities [Serial] Pod should be preferably scheduled to nodes pod can tolerate [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 77 + }, + "[sig-scheduling] SchedulerPriorities [Serial] Pod should be scheduled to node that don't match the PodAntiAffinity terms": { + "average_duration": 72 + }, + "[sig-scheduling] SchedulerPriorities [Serial] Pod should be scheduled to node that don't match the PodAntiAffinity terms [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-scheduling] SchedulerPriorities [Serial] PodTopologySpread Scoring validates pod should be preferably scheduled to node which makes the matching pods more evenly distributed": { + "average_duration": 77 + }, + "[sig-scheduling] SchedulerPriorities [Serial] PodTopologySpread Scoring validates pod should be preferably scheduled to node which makes the matching pods more evenly distributed [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 77 + }, + "[sig-scheduling][Early] The HAProxy router pods [apigroup:route.openshift.io] should be scheduled on different nodes [Skipped:SingleReplicaTopology] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-scheduling][Early] The HAProxy router pods [apigroup:route.openshift.io] should be scheduled on different nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-scheduling][Early] The openshift-apiserver pods [apigroup:apps.openshift.io][apigroup:authorization.openshift.io][apigroup:build.openshift.io][apigroup:image.openshift.io][apigroup:project.openshift.io][apigroup:quota.openshift.io][apigroup:route.openshift.io][apigroup:security.openshift.io][apigroup:template.openshift.io] should be scheduled on different nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 5 + }, + "[sig-scheduling][Early] The openshift-apiserver pods [apigroup:authorization.openshift.io][apigroup:build.openshift.io][apigroup:image.openshift.io][apigroup:project.openshift.io][apigroup:quota.openshift.io][apigroup:route.openshift.io][apigroup:security.openshift.io][apigroup:template.openshift.io] should be scheduled on different nodes [Skipped:SingleReplicaTopology] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-scheduling][Early] The openshift-apiserver pods [apigroup:authorization.openshift.io][apigroup:build.openshift.io][apigroup:image.openshift.io][apigroup:project.openshift.io][apigroup:quota.openshift.io][apigroup:route.openshift.io][apigroup:security.openshift.io][apigroup:template.openshift.io] should be scheduled on different nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-scheduling][Early] The openshift-authentication pods [apigroup:oauth.openshift.io] should be scheduled on different nodes [Skipped:SingleReplicaTopology] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-scheduling][Early] The openshift-authentication pods [apigroup:oauth.openshift.io] should be scheduled on different nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-scheduling][Early] The openshift-console console pods [apigroup:console.openshift.io] should be scheduled on different nodes [Skipped:SingleReplicaTopology] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-scheduling][Early] The openshift-console console pods [apigroup:console.openshift.io] should be scheduled on different nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-scheduling][Early] The openshift-console downloads pods [apigroup:console.openshift.io] should be scheduled on different nodes [Skipped:SingleReplicaTopology] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-scheduling][Early] The openshift-console downloads pods [apigroup:console.openshift.io] should be scheduled on different nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-scheduling][Early] The openshift-etcd pods [apigroup:operator.openshift.io] should be scheduled on different nodes [Skipped:SingleReplicaTopology] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-scheduling][Early] The openshift-etcd pods [apigroup:operator.openshift.io] should be scheduled on different nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-scheduling][Early] The openshift-image-registry pods [apigroup:imageregistry.operator.openshift.io] should be scheduled on different nodes [Skipped:SingleReplicaTopology] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-scheduling][Early] The openshift-image-registry pods [apigroup:imageregistry.operator.openshift.io] should be scheduled on different nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-scheduling][Early] The openshift-monitoring prometheus-adapter pods [apigroup:monitoring.coreos.com] should be scheduled on different nodes [Skipped:SingleReplicaTopology] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-scheduling][Early] The openshift-monitoring prometheus-adapter pods [apigroup:monitoring.coreos.com] should be scheduled on different nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-scheduling][Early] The openshift-monitoring thanos-querier pods [apigroup:monitoring.coreos.com] should be scheduled on different nodes [Skipped:SingleReplicaTopology] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-scheduling][Early] The openshift-monitoring thanos-querier pods [apigroup:monitoring.coreos.com] should be scheduled on different nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-scheduling][Early] The openshift-oauth-apiserver pods [apigroup:oauth.openshift.io][apigroup:user.openshift.io] should be scheduled on different nodes [Skipped:SingleReplicaTopology] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-scheduling][Early] The openshift-oauth-apiserver pods [apigroup:oauth.openshift.io][apigroup:user.openshift.io] should be scheduled on different nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-scheduling][Early] The openshift-operator-lifecycle-manager pods [apigroup:packages.operators.coreos.com] should be scheduled on different nodes [Skipped:SingleReplicaTopology] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-scheduling][Early] The openshift-operator-lifecycle-manager pods [apigroup:packages.operators.coreos.com] should be scheduled on different nodes [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-storage] CSI Mock fsgroup as mount option Delegate FSGroup to CSI driver [LinuxOnly] should not pass FSGroup to CSI driver if it is set in pod and driver supports VOLUME_MOUNT_GROUP": { + "average_duration": 94 + }, + "[sig-storage] CSI Mock fsgroup as mount option Delegate FSGroup to CSI driver [LinuxOnly] should not pass FSGroup to CSI driver if it is set in pod and driver supports VOLUME_MOUNT_GROUP [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 102 + }, + "[sig-storage] CSI Mock fsgroup as mount option Delegate FSGroup to CSI driver [LinuxOnly] should pass FSGroup to CSI driver if it is set in pod and driver supports VOLUME_MOUNT_GROUP": { + "average_duration": 94 + }, + "[sig-storage] CSI Mock fsgroup as mount option Delegate FSGroup to CSI driver [LinuxOnly] should pass FSGroup to CSI driver if it is set in pod and driver supports VOLUME_MOUNT_GROUP [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 102 + }, + "[sig-storage] CSI Mock honor pv reclaim policy CSI honor pv reclaim policy changes using mock driver should honor pv reclaim policy after it is changed from deleted to retain": { + "average_duration": 30 + }, + "[sig-storage] CSI Mock honor pv reclaim policy CSI honor pv reclaim policy changes using mock driver should honor pv reclaim policy after it is changed from deleted to retain [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 28 + }, + "[sig-storage] CSI Mock honor pv reclaim policy CSI honor pv reclaim policy changes using mock driver should honor pv reclaim policy after it is changed from retain to deleted": { + "average_duration": 86 + }, + "[sig-storage] CSI Mock honor pv reclaim policy CSI honor pv reclaim policy changes using mock driver should honor pv reclaim policy after it is changed from retain to deleted [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 88 + }, + "[sig-storage] CSI Mock honor pv reclaim policy CSI honor pv reclaim policy using mock driver Dynamic provisioning should honor pv delete reclaim policy when deleting pv then pvc": { + "average_duration": 30 + }, + "[sig-storage] CSI Mock honor pv reclaim policy CSI honor pv reclaim policy using mock driver Dynamic provisioning should honor pv delete reclaim policy when deleting pv then pvc [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 28 + }, + "[sig-storage] CSI Mock honor pv reclaim policy CSI honor pv reclaim policy using mock driver Dynamic provisioning should honor pv delete reclaim policy when deleting pvc": { + "average_duration": 30 + }, + "[sig-storage] CSI Mock honor pv reclaim policy CSI honor pv reclaim policy using mock driver Dynamic provisioning should honor pv delete reclaim policy when deleting pvc [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 28 + }, + "[sig-storage] CSI Mock honor pv reclaim policy CSI honor pv reclaim policy using mock driver Dynamic provisioning should honor pv retain reclaim policy when deleting pv then pvc": { + "average_duration": 85 + }, + "[sig-storage] CSI Mock honor pv reclaim policy CSI honor pv reclaim policy using mock driver Dynamic provisioning should honor pv retain reclaim policy when deleting pv then pvc [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 87 + }, + "[sig-storage] CSI Mock honor pv reclaim policy CSI honor pv reclaim policy using mock driver Dynamic provisioning should honor pv retain reclaim policy when deleting pvc then pv": { + "average_duration": 86 + }, + "[sig-storage] CSI Mock honor pv reclaim policy CSI honor pv reclaim policy using mock driver Dynamic provisioning should honor pv retain reclaim policy when deleting pvc then pv [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 87 + }, + "[sig-storage] CSI Mock honor pv reclaim policy CSI honor pv reclaim policy using mock driver Static provisioning should honor pv delete reclaim policy when deleting pv then pvc": { + "average_duration": 33 + }, + "[sig-storage] CSI Mock honor pv reclaim policy CSI honor pv reclaim policy using mock driver Static provisioning should honor pv delete reclaim policy when deleting pv then pvc [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] CSI Mock honor pv reclaim policy CSI honor pv reclaim policy using mock driver Static provisioning should honor pv delete reclaim policy when deleting pvc": { + "average_duration": 34 + }, + "[sig-storage] CSI Mock honor pv reclaim policy CSI honor pv reclaim policy using mock driver Static provisioning should honor pv delete reclaim policy when deleting pvc [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] CSI Mock honor pv reclaim policy CSI honor pv reclaim policy using mock driver Static provisioning should honor pv retain reclaim policy when deleting pv then pvc": { + "average_duration": 89 + }, + "[sig-storage] CSI Mock honor pv reclaim policy CSI honor pv reclaim policy using mock driver Static provisioning should honor pv retain reclaim policy when deleting pv then pvc [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 90 + }, + "[sig-storage] CSI Mock honor pv reclaim policy CSI honor pv reclaim policy using mock driver Static provisioning should honor pv retain reclaim policy when deleting pvc then pv": { + "average_duration": 89 + }, + "[sig-storage] CSI Mock honor pv reclaim policy CSI honor pv reclaim policy using mock driver Static provisioning should honor pv retain reclaim policy when deleting pvc then pv [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 91 + }, + "[sig-storage] CSI Mock honor pv reclaim policy [Feature:HonorPVReclaimPolicy] [FeatureGate:HonorPVReclaimPolicy] [Beta] CSI honor pv reclaim policy using mock driver Dynamic provisioning should honor pv delete reclaim policy [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 36 + }, + "[sig-storage] CSI Mock honor pv reclaim policy [Feature:HonorPVReclaimPolicy] [FeatureGate:HonorPVReclaimPolicy] [Beta] CSI honor pv reclaim policy using mock driver Dynamic provisioning should honor pv retain reclaim policy [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 329 + }, + "[sig-storage] CSI Mock honor pv reclaim policy [Feature:HonorPVReclaimPolicy] [FeatureGate:HonorPVReclaimPolicy] [Beta] CSI honor pv reclaim policy using mock driver Static provisioning should honor pv delete reclaim policy [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-storage] CSI Mock honor pv reclaim policy [Feature:HonorPVReclaimPolicy] [FeatureGate:HonorPVReclaimPolicy] [Beta] CSI honor pv reclaim policy using mock driver Static provisioning should honor pv retain reclaim policy [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 332 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should add SELinux mount option to existing mount options [FeatureGate:SELinuxMountReadWriteOncePod] [Beta]": { + "average_duration": 68 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should add SELinux mount option to existing mount options [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should add SELinux mount option to existing mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 74 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should not pass SELinux mount option for CSI driver that does not support SELinux mount [FeatureGate:SELinuxMountReadWriteOncePod] [Beta]": { + "average_duration": 69 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should not pass SELinux mount option for CSI driver that does not support SELinux mount [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should not pass SELinux mount option for CSI driver that does not support SELinux mount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 75 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should not pass SELinux mount option for Pod without SELinux context [FeatureGate:SELinuxMountReadWriteOncePod] [Beta]": { + "average_duration": 68 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should not pass SELinux mount option for Pod without SELinux context [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should not pass SELinux mount option for Pod without SELinux context [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 74 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should not pass SELinux mount option for RWO volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 74 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should not pass SELinux mount option for RWO volume with SELinuxMount disabled [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [Feature:SELinuxMountReadWriteOncePodOnly]": { + "average_duration": 68 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should not pass SELinux mount option for RWO volume with SELinuxMount disabled [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [Feature:SELinuxMountReadWriteOncePodOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should not pass SELinux mount option for RWO volume with SELinuxMount disabled and Recursive policy [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 78 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should not pass SELinux mount option for RWO volume with SELinuxMount disabled and Recursive policy [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 73 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should not pass SELinux mount option for RWO volume with only SELinuxChangePolicy enabled [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [Feature:SELinuxMountReadWriteOncePodOnly] [FeatureGate:SELinuxChangePolicy] [Beta]": { + "average_duration": 68 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should not pass SELinux mount option for RWO volume with only SELinuxChangePolicy enabled [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [Feature:SELinuxMountReadWriteOncePodOnly] [FeatureGate:SELinuxChangePolicy] [Beta] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 70 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should not unstage RWO volume when starting a second pod with the same SELinux context [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxMount] [Alpha] [Disabled:Alpha] [Suite:k8s]": { + "average_duration": 77 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should not unstage RWO volume when starting a second pod with the same SELinux context [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 77 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should not unstage RWO volume when starting a second pod with the same SELinux context [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 76 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should not unstage RWOP volume when starting a second pod with the same SELinux context [FeatureGate:SELinuxMountReadWriteOncePod] [Beta]": { + "average_duration": 74 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should not unstage RWOP volume when starting a second pod with the same SELinux context [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 78 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should not unstage volume when starting a second pod with the same SELinux context [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 80 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should pass SELinux mount option for RWO volume with SELinuxMount enabled [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxMount] [Alpha] [Disabled:Alpha] [Suite:k8s]": { + "average_duration": 74 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should pass SELinux mount option for RWO volume with SELinuxMount enabled and MountOption policy [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 75 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should pass SELinux mount option for RWO volume with SELinuxMount enabled and MountOption policy [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 73 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should pass SELinux mount option for RWO volume with SELinuxMount enabled and nil policy [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 77 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should pass SELinux mount option for RWO volume with SELinuxMount enabled and nil policy [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 73 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should pass SELinux mount option for RWOP volume and Pod with SELinux context set [FeatureGate:SELinuxMountReadWriteOncePod] [Beta]": { + "average_duration": 68 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should pass SELinux mount option for RWOP volume and Pod with SELinux context set [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 73 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should pass SELinux mount option for RWOP volume and Pod with SELinux context set [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 74 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should unstage RWO volume when starting a second pod with different SELinux context [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxMount] [Alpha] [Disabled:Alpha] [Suite:k8s]": { + "average_duration": 82 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should unstage RWO volume when starting a second pod with different SELinux context [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 94 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should unstage RWO volume when starting a second pod with different SELinux context [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 91 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should unstage RWO volume when starting a second pod with different policy (MountOption -\u003e Recursive) [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 93 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should unstage RWO volume when starting a second pod with different policy (MountOption -\u003e Recursive) [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 92 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should unstage RWO volume when starting a second pod with different policy (Recursive -\u003e MountOption) [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 92 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should unstage RWO volume when starting a second pod with different policy (Recursive -\u003e MountOption) [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 91 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should unstage RWOP volume when starting a second pod with different SELinux context [FeatureGate:SELinuxMountReadWriteOncePod] [Beta]": { + "average_duration": 86 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should unstage RWOP volume when starting a second pod with different SELinux context [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 91 + }, + "[sig-storage] CSI Mock selinux on mount SELinuxMount [LinuxOnly] [Feature:SELinux] should unstage volume when starting a second pod with different SELinux context [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 93 + }, + "[sig-storage] CSI Mock selinux on mount metrics SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Feature:SELinuxMountReadWriteOncePod] [Serial] error is bumped on two Pods with a different context on RWOP volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 85 + }, + "[sig-storage] CSI Mock selinux on mount metrics SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Feature:SELinuxMountReadWriteOncePod] [Serial] warning is bumped on two Pods with a different context on RWO volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 85 + }, + "[sig-storage] CSI Mock selinux on mount metrics SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Feature:SELinuxMountReadWriteOncePod] [Serial] warning is not bumped on two Pods with the same context on RWO volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 85 + }, + "[sig-storage] CSI Mock selinux on mount metrics SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on two Pods with a different context on RWO volume and SELinuxMount enabled [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxMount] [Alpha] [Disabled:Alpha] [Suite:k8s]": { + "average_duration": 71 + }, + "[sig-storage] CSI Mock selinux on mount metrics SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on two Pods with a different context on RWOP volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 83 + }, + "[sig-storage] CSI Mock selinux on mount metrics SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on two Pods with a different context on RWX volume and SELinuxMount enabled [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxMount] [Alpha] [Disabled:Alpha] [Suite:k8s]": { + "average_duration": 71 + }, + "[sig-storage] CSI Mock selinux on mount metrics SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is not bumped on two Pods with the same context on RWO volume and SELinuxMount enabled [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxMount] [Alpha] [Disabled:Alpha] [Suite:k8s]": { + "average_duration": 71 + }, + "[sig-storage] CSI Mock selinux on mount metrics SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] warning is bumped on two Pods with a different context on RWO volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [Feature:SELinuxMountReadWriteOncePodOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 84 + }, + "[sig-storage] CSI Mock selinux on mount metrics SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] warning is not bumped on two Pods with the same context on RWO volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [Feature:SELinuxMountReadWriteOncePodOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 84 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on a privileged and unprivileged Pod with given SELinux with MountOption policy [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 70 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on a privileged and unprivileged Pod with given SELinux with MountOption policy [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 71 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on an unprivileged and privileged Pod with given SELinux with MountOption policy [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 70 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on an unprivileged and privileged Pod with given SELinux with MountOption policy [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 70 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on two Pods with MountOption policy and a different context on RWOP volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 69 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on two Pods with MountOption policy and a different context on RWOP volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on two Pods with a different context on RWO volume and SELinuxMount enabled [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 70 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on two Pods with a different context on RWO volume and SELinuxMount enabled [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 71 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on two Pods with a different context on RWOP volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMountReadWriteOncePod] [Beta]": { + "average_duration": 74 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on two Pods with a different context on RWOP volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 73 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on two Pods with a different context on RWX volume and SELinuxMount enabled [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 69 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on two Pods with a different context on RWX volume and SELinuxMount enabled [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on two Pods with a different policy on RWO volume and SELinuxMount enabled (Recursive + MountOption) [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 70 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on two Pods with a different policy on RWO volume and SELinuxMount enabled (Recursive + MountOption) [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 71 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on two Pods with a different policy on RWO volume and SELinuxMount enabled (Recursive + nil) [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 73 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on two Pods with a different policy on RWO volume and SELinuxMount enabled (Recursive + nil) [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on two Pods with a different policy on RWO volume and SELinuxMount enabled (nil + Recursive) [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 71 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is bumped on two Pods with a different policy on RWO volume and SELinuxMount enabled (nil + Recursive) [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 71 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is not bumped on a privileged and unprivileged Pod with given SELinux context and recursive policy [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 72 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is not bumped on a privileged and unprivileged Pod with given SELinux context and recursive policy [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is not bumped on two Pods with Recursive policy and a different context on RWX volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 69 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is not bumped on two Pods with Recursive policy and a different context on RWX volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is not bumped on two Pods with the same context on RWO volume and SELinuxMount enabled [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 75 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is not bumped on two Pods with the same context on RWO volume and SELinuxMount enabled [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is not bumped on two Pods with the same policy RWX volume (MountOption + MountOption) [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 70 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is not bumped on two Pods with the same policy RWX volume (MountOption + MountOption) [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 73 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is not bumped on two Pods with the same policy RWX volume (nil + MountOption) [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 74 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is not bumped on two Pods with the same policy RWX volume (nil + MountOption) [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 73 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is not bumped on two privileged Pods with mount policy RWO volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 75 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is not bumped on two privileged Pods with mount policy RWO volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is not bumped on two privileged Pods with recursive policy RWO volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault]": { + "average_duration": 72 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] error is not bumped on two privileged Pods with recursive policy RWO volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxMount] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 73 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] warning is bumped on two Pods with a different context on RWO volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [Feature:SELinuxMountReadWriteOncePodOnly]": { + "average_duration": 77 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] warning is bumped on two Pods with a different context on RWO volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [Feature:SELinuxMountReadWriteOncePodOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 74 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] warning is bumped on two Pods with different policies on RWO volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [Feature:SELinuxMountReadWriteOncePodOnly]": { + "average_duration": 78 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] warning is bumped on two Pods with different policies on RWO volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [Feature:SELinuxMountReadWriteOncePodOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 74 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] warning is not bumped on two Pods with Recursive policy and a different context on RWO volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [Feature:SELinuxMountReadWriteOncePodOnly]": { + "average_duration": 75 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] warning is not bumped on two Pods with Recursive policy and a different context on RWO volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [Feature:SELinuxMountReadWriteOncePodOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 75 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] warning is not bumped on two Pods with the same context on RWO volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [Feature:SELinuxMountReadWriteOncePodOnly]": { + "average_duration": 76 + }, + "[sig-storage] CSI Mock selinux on mount metrics and SELinuxWarningController SELinuxMount metrics [LinuxOnly] [Feature:SELinux] [Serial] warning is not bumped on two Pods with the same context on RWO volume [FeatureGate:SELinuxMountReadWriteOncePod] [Beta] [FeatureGate:SELinuxChangePolicy] [Beta] [Feature:SELinuxMountReadWriteOncePodOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 75 + }, + "[sig-storage] CSI Mock volume attach CSI attach test using mock driver should not require VolumeAttach for drivers without attachment": { + "average_duration": 35 + }, + "[sig-storage] CSI Mock volume attach CSI attach test using mock driver should not require VolumeAttach for drivers without attachment [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-storage] CSI Mock volume attach CSI attach test using mock driver should preserve attachment policy when no CSIDriver present": { + "average_duration": 45 + }, + "[sig-storage] CSI Mock volume attach CSI attach test using mock driver should preserve attachment policy when no CSIDriver present [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-storage] CSI Mock volume attach CSI attach test using mock driver should require VolumeAttach for drivers with attachment": { + "average_duration": 45 + }, + "[sig-storage] CSI Mock volume attach CSI attach test using mock driver should require VolumeAttach for drivers with attachment [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-storage] CSI Mock volume attach CSI attach test using mock driver should require VolumeAttach for ephemermal volume and drivers with attachment": { + "average_duration": 38 + }, + "[sig-storage] CSI Mock volume attach CSI attach test using mock driver should require VolumeAttach for ephemermal volume and drivers with attachment [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-storage] CSI Mock volume expansion CSI Volume expansion should expand volume by restarting pod if attach=off, nodeExpansion=on": { + "average_duration": 75 + }, + "[sig-storage] CSI Mock volume expansion CSI Volume expansion should expand volume by restarting pod if attach=off, nodeExpansion=on [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 80 + }, + "[sig-storage] CSI Mock volume expansion CSI Volume expansion should expand volume by restarting pod if attach=on, nodeExpansion=on": { + "average_duration": 88 + }, + "[sig-storage] CSI Mock volume expansion CSI Volume expansion should expand volume by restarting pod if attach=on, nodeExpansion=on [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 93 + }, + "[sig-storage] CSI Mock volume expansion CSI Volume expansion should expand volume without restarting pod if nodeExpansion=off": { + "average_duration": 80 + }, + "[sig-storage] CSI Mock volume expansion CSI Volume expansion should expand volume without restarting pod if nodeExpansion=off [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 85 + }, + "[sig-storage] CSI Mock volume expansion CSI Volume expansion should not expand volume if resizingOnDriver=off, resizingOnSC=on": { + "average_duration": 193 + }, + "[sig-storage] CSI Mock volume expansion CSI Volume expansion should not expand volume if resizingOnDriver=off, resizingOnSC=on [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 203 + }, + "[sig-storage] CSI Mock volume expansion CSI Volume expansion should not have staging_path missing in node expand volume pod if attach=on, nodeExpansion=on": { + "average_duration": 88 + }, + "[sig-storage] CSI Mock volume expansion CSI Volume expansion should not have staging_path missing in node expand volume pod if attach=on, nodeExpansion=on [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 92 + }, + "[sig-storage] CSI Mock volume expansion CSI online volume expansion should expand volume without restarting pod if attach=off, nodeExpansion=on": { + "average_duration": 55 + }, + "[sig-storage] CSI Mock volume expansion CSI online volume expansion should expand volume without restarting pod if attach=off, nodeExpansion=on [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 63 + }, + "[sig-storage] CSI Mock volume expansion CSI online volume expansion should expand volume without restarting pod if attach=on, nodeExpansion=on": { + "average_duration": 83 + }, + "[sig-storage] CSI Mock volume expansion CSI online volume expansion should expand volume without restarting pod if attach=on, nodeExpansion=on [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 88 + }, + "[sig-storage] CSI Mock volume expansion CSI online volume expansion with secret should expand volume without restarting pod if attach=on, nodeExpansion=on, csiNodeExpandSecret=on": { + "average_duration": 85 + }, + "[sig-storage] CSI Mock volume expansion CSI online volume expansion with secret should expand volume without restarting pod if attach=on, nodeExpansion=on, csiNodeExpandSecret=on [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 91 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery [Feature:RecoverVolumeExpansionFailure] [FeatureGate:RecoverVolumeExpansionFailure] [Beta] recovery should be possible for node-only expanded volumes with final error [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 128 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery [Feature:RecoverVolumeExpansionFailure] [FeatureGate:RecoverVolumeExpansionFailure] [Beta] recovery should be possible for node-only expanded volumes with infeasible error [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 130 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery [Feature:RecoverVolumeExpansionFailure] [FeatureGate:RecoverVolumeExpansionFailure] [Beta] recovery should not be possible in partially expanded volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 126 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery [Feature:RecoverVolumeExpansionFailure] [FeatureGate:RecoverVolumeExpansionFailure] [Beta] should allow recovery if controller expansion fails with final error [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 83 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery [Feature:RecoverVolumeExpansionFailure] [FeatureGate:RecoverVolumeExpansionFailure] [Beta] should allow recovery if controller expansion fails with infeasible error [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 159 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery [Feature:RecoverVolumeExpansionFailure] [FeatureGate:RecoverVolumeExpansionFailure] [Beta] should record target size in allocated resources [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 85 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery [Feature:RecoverVolumeExpansionFailure] recovery should be possible for node-only expanded volumes with final error [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 132 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery [Feature:RecoverVolumeExpansionFailure] recovery should be possible for node-only expanded volumes with infeasible error [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 130 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery [Feature:RecoverVolumeExpansionFailure] recovery should not be possible in partially expanded volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 125 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery [Feature:RecoverVolumeExpansionFailure] should allow recovery if controller expansion fails with final error [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 86 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery [Feature:RecoverVolumeExpansionFailure] should allow recovery if controller expansion fails with infeasible error [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 161 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery [Feature:RecoverVolumeExpansionFailure] should record target size in allocated resources [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 90 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery recovery should be possible for node-only expanded volumes with final error": { + "average_duration": 125 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery recovery should be possible for node-only expanded volumes with final error [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 138 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery recovery should be possible for node-only expanded volumes with infeasible error": { + "average_duration": 126 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery recovery should be possible for node-only expanded volumes with infeasible error [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 136 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery recovery should not be possible in partially expanded volumes": { + "average_duration": 120 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery recovery should not be possible in partially expanded volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 130 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery should allow recovery if controller expansion fails with final error": { + "average_duration": 83 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery should allow recovery if controller expansion fails with final error [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 88 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery should allow recovery if controller expansion fails with infeasible error": { + "average_duration": 151 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery should allow recovery if controller expansion fails with infeasible error [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 166 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery should record target size in allocated resources": { + "average_duration": 86 + }, + "[sig-storage] CSI Mock volume expansion Expansion with recovery should record target size in allocated resources [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 90 + }, + "[sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy Update [LinuxOnly] should not update fsGroup if update from File to None": { + "average_duration": 101 + }, + "[sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy Update [LinuxOnly] should not update fsGroup if update from File to None [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 107 + }, + "[sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy Update [LinuxOnly] should not update fsGroup if update from detault to None": { + "average_duration": 101 + }, + "[sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy Update [LinuxOnly] should not update fsGroup if update from detault to None [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 107 + }, + "[sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy Update [LinuxOnly] should update fsGroup if update from File to default": { + "average_duration": 101 + }, + "[sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy Update [LinuxOnly] should update fsGroup if update from File to default [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 107 + }, + "[sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy Update [LinuxOnly] should update fsGroup if update from None to File": { + "average_duration": 101 + }, + "[sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy Update [LinuxOnly] should update fsGroup if update from None to File [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 107 + }, + "[sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy Update [LinuxOnly] should update fsGroup if update from None to default": { + "average_duration": 100 + }, + "[sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy Update [LinuxOnly] should update fsGroup if update from None to default [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 107 + }, + "[sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy Update [LinuxOnly] should update fsGroup if update from detault to File": { + "average_duration": 100 + }, + "[sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy Update [LinuxOnly] should update fsGroup if update from detault to File [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 107 + }, + "[sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy [LinuxOnly] should modify fsGroup if fsGroupPolicy=File": { + "average_duration": 63 + }, + "[sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy [LinuxOnly] should modify fsGroup if fsGroupPolicy=File [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 69 + }, + "[sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy [LinuxOnly] should modify fsGroup if fsGroupPolicy=default": { + "average_duration": 63 + }, + "[sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy [LinuxOnly] should modify fsGroup if fsGroupPolicy=default [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 69 + }, + "[sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy [LinuxOnly] should not modify fsGroup if fsGroupPolicy=None": { + "average_duration": 65 + }, + "[sig-storage] CSI Mock volume fsgroup policies CSI FSGroupPolicy [LinuxOnly] should not modify fsGroup if fsGroupPolicy=None [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 68 + }, + "[sig-storage] CSI Mock volume service account token CSIServiceAccountToken token should be plumbed down when csiServiceAccountTokenEnabled=true": { + "average_duration": 45 + }, + "[sig-storage] CSI Mock volume service account token CSIServiceAccountToken token should be plumbed down when csiServiceAccountTokenEnabled=true [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-storage] CSI Mock volume service account token CSIServiceAccountToken token should not be plumbed down when CSIDriver is not deployed": { + "average_duration": 45 + }, + "[sig-storage] CSI Mock volume service account token CSIServiceAccountToken token should not be plumbed down when CSIDriver is not deployed [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-storage] CSI Mock volume service account token CSIServiceAccountToken token should not be plumbed down when csiServiceAccountTokenEnabled=false": { + "average_duration": 44 + }, + "[sig-storage] CSI Mock volume service account token CSIServiceAccountToken token should not be plumbed down when csiServiceAccountTokenEnabled=false [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-storage] CSI Mock volume snapshot CSI Snapshot Controller metrics [Feature:VolumeSnapshotDataSource] snapshot controller should emit dynamic CreateSnapshot, CreateSnapshotAndReady, and DeleteSnapshot metrics": { + "average_duration": 29 + }, + "[sig-storage] CSI Mock volume snapshot CSI Snapshot Controller metrics [Feature:VolumeSnapshotDataSource] snapshot controller should emit dynamic CreateSnapshot, CreateSnapshotAndReady, and DeleteSnapshot metrics [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] CSI Mock volume snapshot CSI Snapshot Controller metrics [Feature:VolumeSnapshotDataSource] snapshot controller should emit dynamic CreateSnapshot, CreateSnapshotAndReady, and DeleteSnapshot metrics [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 24 + }, + "[sig-storage] CSI Mock volume snapshot CSI Snapshot Controller metrics [Feature:VolumeSnapshotDataSource] snapshot controller should emit pre-provisioned CreateSnapshot, CreateSnapshotAndReady, and DeleteSnapshot metrics": { + "average_duration": 31 + }, + "[sig-storage] CSI Mock volume snapshot CSI Snapshot Controller metrics [Feature:VolumeSnapshotDataSource] snapshot controller should emit pre-provisioned CreateSnapshot, CreateSnapshotAndReady, and DeleteSnapshot metrics [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] CSI Mock volume snapshot CSI Snapshot Controller metrics [Feature:VolumeSnapshotDataSource] snapshot controller should emit pre-provisioned CreateSnapshot, CreateSnapshotAndReady, and DeleteSnapshot metrics [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 24 + }, + "[sig-storage] CSI Mock volume snapshot CSI Volume Snapshots [Feature:VolumeSnapshotDataSource] volumesnapshotcontent and pvc in Bound state with deletion timestamp set should not get deleted while snapshot finalizer exists": { + "average_duration": 182 + }, + "[sig-storage] CSI Mock volume snapshot CSI Volume Snapshots [Feature:VolumeSnapshotDataSource] volumesnapshotcontent and pvc in Bound state with deletion timestamp set should not get deleted while snapshot finalizer exists [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 189 + }, + "[sig-storage] CSI Mock volume snapshot CSI Volume Snapshots [Feature:VolumeSnapshotDataSource] volumesnapshotcontent and pvc in Bound state with deletion timestamp set should not get deleted while snapshot finalizer exists [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 192 + }, + "[sig-storage] CSI Mock volume snapshot CSI Volume Snapshots secrets [Feature:VolumeSnapshotDataSource] volume snapshot create/delete with secrets": { + "average_duration": 180 + }, + "[sig-storage] CSI Mock volume snapshot CSI Volume Snapshots secrets [Feature:VolumeSnapshotDataSource] volume snapshot create/delete with secrets [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 186 + }, + "[sig-storage] CSI Mock volume snapshot CSI Volume Snapshots secrets [Feature:VolumeSnapshotDataSource] volume snapshot create/delete with secrets [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 189 + }, + "[sig-storage] CSI Mock volume storage capacity CSIStorageCapacity CSIStorageCapacity disabled": { + "average_duration": 49 + }, + "[sig-storage] CSI Mock volume storage capacity CSIStorageCapacity CSIStorageCapacity disabled [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 53 + }, + "[sig-storage] CSI Mock volume storage capacity CSIStorageCapacity CSIStorageCapacity unused": { + "average_duration": 49 + }, + "[sig-storage] CSI Mock volume storage capacity CSIStorageCapacity CSIStorageCapacity unused [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 54 + }, + "[sig-storage] CSI Mock volume storage capacity CSIStorageCapacity CSIStorageCapacity used, have capacity": { + "average_duration": 49 + }, + "[sig-storage] CSI Mock volume storage capacity CSIStorageCapacity CSIStorageCapacity used, have capacity [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 53 + }, + "[sig-storage] CSI Mock volume storage capacity CSIStorageCapacity CSIStorageCapacity used, insufficient capacity": { + "average_duration": 31 + }, + "[sig-storage] CSI Mock volume storage capacity CSIStorageCapacity CSIStorageCapacity used, insufficient capacity [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 34 + }, + "[sig-storage] CSI Mock volume storage capacity CSIStorageCapacity CSIStorageCapacity used, no capacity": { + "average_duration": 31 + }, + "[sig-storage] CSI Mock volume storage capacity CSIStorageCapacity CSIStorageCapacity used, no capacity [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 34 + }, + "[sig-storage] CSI Mock volume storage capacity storage capacity exhausted, immediate binding": { + "average_duration": 68 + }, + "[sig-storage] CSI Mock volume storage capacity storage capacity exhausted, immediate binding [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-storage] CSI Mock volume storage capacity storage capacity exhausted, late binding, no topology": { + "average_duration": 68 + }, + "[sig-storage] CSI Mock volume storage capacity storage capacity exhausted, late binding, no topology [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-storage] CSI Mock volume storage capacity storage capacity exhausted, late binding, with topology": { + "average_duration": 68 + }, + "[sig-storage] CSI Mock volume storage capacity storage capacity exhausted, late binding, with topology [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 73 + }, + "[sig-storage] CSI Mock volume storage capacity storage capacity unlimited": { + "average_duration": 34 + }, + "[sig-storage] CSI Mock volume storage capacity storage capacity unlimited [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 37 + }, + "[sig-storage] CSI Mock workload info CSI PodInfoOnMount Update should be passed when update from false to true": { + "average_duration": 58 + }, + "[sig-storage] CSI Mock workload info CSI PodInfoOnMount Update should be passed when update from false to true [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 59 + }, + "[sig-storage] CSI Mock workload info CSI PodInfoOnMount Update should not be passed when update from true to false": { + "average_duration": 56 + }, + "[sig-storage] CSI Mock workload info CSI PodInfoOnMount Update should not be passed when update from true to false [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 61 + }, + "[sig-storage] CSI Mock workload info CSI workload information using mock driver contain ephemeral=true when using inline volume": { + "average_duration": 32 + }, + "[sig-storage] CSI Mock workload info CSI workload information using mock driver contain ephemeral=true when using inline volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-storage] CSI Mock workload info CSI workload information using mock driver should be passed when podInfoOnMount=true": { + "average_duration": 46 + }, + "[sig-storage] CSI Mock workload info CSI workload information using mock driver should be passed when podInfoOnMount=true [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 55 + }, + "[sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when CSIDriver does not exist": { + "average_duration": 45 + }, + "[sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when CSIDriver does not exist [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when podInfoOnMount=false": { + "average_duration": 45 + }, + "[sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when podInfoOnMount=false [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when podInfoOnMount=nil [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 51 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 31 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 61 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 30 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 61 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 30 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 61 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 35 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 97 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 50 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 50 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 59 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 54 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 50 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 52 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 78 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 85 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 84 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 64 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 78 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 71 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 63 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 74 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 63 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 40 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 66 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 50 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 100 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 95 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 98 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 41 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 42 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 41 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 38 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 45 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 56 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 63 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 61 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 50 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 59 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 54 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 50 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 51 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 76 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 90 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 84 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 52 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 63 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 58 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 66 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 78 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 67 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 74 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 71 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 62 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 74 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 63 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node": { + "average_duration": 46 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes": { + "average_duration": 49 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 56 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] read-write-once-pod[MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 52 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] read-write-once-pod[MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 65 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 41 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 48 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 44 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 48 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 57 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 52 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 42 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 48 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 44 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 40 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 47 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 43 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 59 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 68 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 63 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 40 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 48 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 43 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 42 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 44 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 42 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 48 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 44 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 40 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 66 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 50 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 99 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 95 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 98 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 41 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 42 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 41 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 56 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 62 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 61 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 46 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 77 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 54 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 28 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 40 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 44 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 96 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 107 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 99 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 106 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 97 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 108 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 101 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 107 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 72 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 83 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 74 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 83 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 73 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 84 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 75 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 84 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 40 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 79 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 47 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 76 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 122 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 89 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 38 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 79 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 47 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 50 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 133 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 66 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 37 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 80 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 48 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 37 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 79 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 47 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 77 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 118 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 89 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 49 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 134 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 66 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 37 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 78 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 47 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 38 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 78 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 47 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 77 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 119 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 88 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 38 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 78 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 47 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 49 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 133 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 66 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 93 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 96 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 107 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 99 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 106 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 100 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 108 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 100 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 108 + }, + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] read-write-once-pod[MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] read-write-once-pod[MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io][Serial] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable[Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSI mock volume CSI FSGroupPolicy [LinuxOnly] should modify fsGroup if fsGroupPolicy=File [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 78 + }, + "[sig-storage] CSI mock volume CSI FSGroupPolicy [LinuxOnly] should modify fsGroup if fsGroupPolicy=File [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 70 + }, + "[sig-storage] CSI mock volume CSI FSGroupPolicy [LinuxOnly] should modify fsGroup if fsGroupPolicy=default [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 78 + }, + "[sig-storage] CSI mock volume CSI FSGroupPolicy [LinuxOnly] should modify fsGroup if fsGroupPolicy=default [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 70 + }, + "[sig-storage] CSI mock volume CSI FSGroupPolicy [LinuxOnly] should not modify fsGroup if fsGroupPolicy=None [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 77 + }, + "[sig-storage] CSI mock volume CSI FSGroupPolicy [LinuxOnly] should not modify fsGroup if fsGroupPolicy=None [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 70 + }, + "[sig-storage] CSI mock volume CSI Snapshot Controller metrics [Feature:VolumeSnapshotDataSource] snapshot controller should emit dynamic CreateSnapshot, CreateSnapshotAndReady, and DeleteSnapshot metrics [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] CSI mock volume CSI Snapshot Controller metrics [Feature:VolumeSnapshotDataSource] snapshot controller should emit pre-provisioned CreateSnapshot, CreateSnapshotAndReady, and DeleteSnapshot metrics [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] CSI mock volume CSI Volume Snapshots [Feature:VolumeSnapshotDataSource] volumesnapshotcontent and pvc in Bound state with deletion timestamp set should not get deleted while snapshot finalizer exists [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 216 + }, + "[sig-storage] CSI mock volume CSI Volume Snapshots secrets [Feature:VolumeSnapshotDataSource] volume snapshot create/delete with secrets [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 208 + }, + "[sig-storage] CSI mock volume CSI Volume expansion should expand volume by restarting pod if attach=off, nodeExpansion=on [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 48 + }, + "[sig-storage] CSI mock volume CSI Volume expansion should expand volume by restarting pod if attach=off, nodeExpansion=on [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-storage] CSI mock volume CSI Volume expansion should expand volume by restarting pod if attach=on, nodeExpansion=on [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 59 + }, + "[sig-storage] CSI mock volume CSI Volume expansion should expand volume by restarting pod if attach=on, nodeExpansion=on [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 57 + }, + "[sig-storage] CSI mock volume CSI Volume expansion should expand volume without restarting pod if nodeExpansion=off [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 86 + }, + "[sig-storage] CSI mock volume CSI Volume expansion should expand volume without restarting pod if nodeExpansion=off [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 90 + }, + "[sig-storage] CSI mock volume CSI Volume expansion should not expand volume if resizingOnDriver=off, resizingOnSC=on [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 170 + }, + "[sig-storage] CSI mock volume CSI Volume expansion should not expand volume if resizingOnDriver=off, resizingOnSC=on [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 169 + }, + "[sig-storage] CSI mock volume CSI attach test using mock driver should not require VolumeAttach for drivers without attachment [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-storage] CSI mock volume CSI attach test using mock driver should not require VolumeAttach for drivers without attachment [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 34 + }, + "[sig-storage] CSI mock volume CSI attach test using mock driver should preserve attachment policy when no CSIDriver present [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-storage] CSI mock volume CSI attach test using mock driver should preserve attachment policy when no CSIDriver present [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 45 + }, + "[sig-storage] CSI mock volume CSI attach test using mock driver should require VolumeAttach for drivers with attachment [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-storage] CSI mock volume CSI attach test using mock driver should require VolumeAttach for drivers with attachment [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 46 + }, + "[sig-storage] CSI mock volume CSI attach test using mock driver should require VolumeAttach for ephemermal volume and drivers with attachment [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] CSI mock volume CSI attach test using mock driver should require VolumeAttach for ephemermal volume and drivers with attachment [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-storage] CSI mock volume CSI online volume expansion should expand volume without restarting pod if attach=off, nodeExpansion=on [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 76 + }, + "[sig-storage] CSI mock volume CSI online volume expansion should expand volume without restarting pod if attach=off, nodeExpansion=on [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 73 + }, + "[sig-storage] CSI mock volume CSI online volume expansion should expand volume without restarting pod if attach=on, nodeExpansion=on [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 85 + }, + "[sig-storage] CSI mock volume CSI online volume expansion should expand volume without restarting pod if attach=on, nodeExpansion=on [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 86 + }, + "[sig-storage] CSI mock volume CSI workload information using mock driver contain ephemeral=true when using inline volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 149 + }, + "[sig-storage] CSI mock volume CSI workload information using mock driver contain ephemeral=true when using inline volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 153 + }, + "[sig-storage] CSI mock volume CSI workload information using mock driver should be passed when podInfoOnMount=true [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 166 + }, + "[sig-storage] CSI mock volume CSI workload information using mock driver should be passed when podInfoOnMount=true [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 165 + }, + "[sig-storage] CSI mock volume CSI workload information using mock driver should not be passed when CSIDriver does not exist [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 48 + }, + "[sig-storage] CSI mock volume CSI workload information using mock driver should not be passed when CSIDriver does not exist [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 46 + }, + "[sig-storage] CSI mock volume CSI workload information using mock driver should not be passed when podInfoOnMount=false [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-storage] CSI mock volume CSI workload information using mock driver should not be passed when podInfoOnMount=false [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 46 + }, + "[sig-storage] CSI mock volume CSI workload information using mock driver should not be passed when podInfoOnMount=nil [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-storage] CSI mock volume CSI workload information using mock driver should not be passed when podInfoOnMount=nil [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 45 + }, + "[sig-storage] CSI mock volume CSIServiceAccountToken token should be plumbed down when csiServiceAccountTokenEnabled=true [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 53 + }, + "[sig-storage] CSI mock volume CSIServiceAccountToken token should be plumbed down when csiServiceAccountTokenEnabled=true [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 47 + }, + "[sig-storage] CSI mock volume CSIServiceAccountToken token should not be plumbed down when CSIDriver is not deployed [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 48 + }, + "[sig-storage] CSI mock volume CSIServiceAccountToken token should not be plumbed down when CSIDriver is not deployed [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 46 + }, + "[sig-storage] CSI mock volume CSIServiceAccountToken token should not be plumbed down when csiServiceAccountTokenEnabled=false [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-storage] CSI mock volume CSIServiceAccountToken token should not be plumbed down when csiServiceAccountTokenEnabled=false [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 46 + }, + "[sig-storage] CSI mock volume CSIStorageCapacity CSIStorageCapacity disabled [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 54 + }, + "[sig-storage] CSI mock volume CSIStorageCapacity CSIStorageCapacity disabled [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 50 + }, + "[sig-storage] CSI mock volume CSIStorageCapacity CSIStorageCapacity unused [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 54 + }, + "[sig-storage] CSI mock volume CSIStorageCapacity CSIStorageCapacity unused [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 51 + }, + "[sig-storage] CSI mock volume CSIStorageCapacity CSIStorageCapacity used, have capacity [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 53 + }, + "[sig-storage] CSI mock volume CSIStorageCapacity CSIStorageCapacity used, have capacity [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 51 + }, + "[sig-storage] CSI mock volume CSIStorageCapacity CSIStorageCapacity used, insufficient capacity [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-storage] CSI mock volume CSIStorageCapacity CSIStorageCapacity used, insufficient capacity [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 30 + }, + "[sig-storage] CSI mock volume CSIStorageCapacity CSIStorageCapacity used, no capacity [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-storage] CSI mock volume CSIStorageCapacity CSIStorageCapacity used, no capacity [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 30 + }, + "[sig-storage] CSI mock volume Delegate FSGroup to CSI driver [LinuxOnly] should not pass FSGroup to CSI driver if it is set in pod and driver supports VOLUME_MOUNT_GROUP [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 118 + }, + "[sig-storage] CSI mock volume Delegate FSGroup to CSI driver [LinuxOnly] should not pass FSGroup to CSI driver if it is set in pod and driver supports VOLUME_MOUNT_GROUP [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 105 + }, + "[sig-storage] CSI mock volume Delegate FSGroup to CSI driver [LinuxOnly] should pass FSGroup to CSI driver if it is set in pod and driver supports VOLUME_MOUNT_GROUP [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 121 + }, + "[sig-storage] CSI mock volume Delegate FSGroup to CSI driver [LinuxOnly] should pass FSGroup to CSI driver if it is set in pod and driver supports VOLUME_MOUNT_GROUP [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 105 + }, + "[sig-storage] CSI mock volume storage capacity exhausted, immediate binding [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 88 + }, + "[sig-storage] CSI mock volume storage capacity exhausted, immediate binding [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 74 + }, + "[sig-storage] CSI mock volume storage capacity exhausted, late binding, no topology [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 90 + }, + "[sig-storage] CSI mock volume storage capacity exhausted, late binding, no topology [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 74 + }, + "[sig-storage] CSI mock volume storage capacity exhausted, late binding, with topology [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 90 + }, + "[sig-storage] CSI mock volume storage capacity exhausted, late binding, with topology [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 76 + }, + "[sig-storage] CSI mock volume storage capacity unlimited [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 43 + }, + "[sig-storage] CSI mock volume storage capacity unlimited [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-storage] CSIInlineVolumes should run through the lifecycle of a CSIDriver [Conformance]": { + "average_duration": 1 + }, + "[sig-storage] CSIInlineVolumes should run through the lifecycle of a CSIDriver [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSIInlineVolumes should support CSIVolumeSource in Pod API [Conformance]": { + "average_duration": 1 + }, + "[sig-storage] CSIInlineVolumes should support CSIVolumeSource in Pod API [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSIInlineVolumes should support CSIVolumeSource in Pod API [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] CSIInlineVolumes should support ephemeral VolumeLifecycleMode in CSIDriver API [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] CSIInlineVolumes should support ephemeral VolumeLifecycleMode in CSIDriver API [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode [Conformance]": { + "average_duration": 1 + }, + "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] CSIStorageCapacity should support CSIStorageCapacities API operations [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] CSIStorageCapacity should support CSIStorageCapacities API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] CSIStorageCapacity should support CSIStorageCapacities API operations [Conformance]": { + "average_duration": 1 + }, + "[sig-storage] CSIStorageCapacity should support CSIStorageCapacities API operations [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] ConfigMap binary data should be reflected in volume [NodeConformance] [Conformance]": { + "average_duration": 4 + }, + "[sig-storage] ConfigMap binary data should be reflected in volume [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap binary data should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] ConfigMap optional updates should be reflected in volume [NodeConformance] [Conformance]": { + "average_duration": 27 + }, + "[sig-storage] ConfigMap optional updates should be reflected in volume [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-storage] ConfigMap optional updates should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume as non-root [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume as non-root [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume as non-root [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeFeature:FSGroup] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume with mappings [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume with mappings [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume with mappings [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] ConfigMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] ConfigMap should be immutable if `immutable` field is set [Conformance]": { + "average_duration": 1 + }, + "[sig-storage] ConfigMap should be immutable if `immutable` field is set [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] ConfigMap should be immutable if `immutable` field is set [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] ConfigMap updates should be reflected in volume [NodeConformance] [Conformance]": { + "average_duration": 21 + }, + "[sig-storage] ConfigMap updates should be reflected in volume [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 34 + }, + "[sig-storage] ConfigMap updates should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-storage] Downward API volume should provide container's cpu limit [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should provide container's cpu limit [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Downward API volume should provide container's cpu limit [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should provide container's cpu request [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should provide container's cpu request [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Downward API volume should provide container's cpu request [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should provide container's memory limit [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should provide container's memory limit [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Downward API volume should provide container's memory limit [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should provide container's memory request [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should provide container's memory request [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Downward API volume should provide container's memory request [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Downward API volume should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Downward API volume should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should provide podname as non-root with fsgroup [LinuxOnly]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should provide podname as non-root with fsgroup [LinuxOnly] [NodeFeature:FSGroup] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Downward API volume should provide podname as non-root with fsgroup [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should provide podname as non-root with fsgroup [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should provide podname as non-root with fsgroup and defaultMode [LinuxOnly]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [NodeFeature:FSGroup] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Downward API volume should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should provide podname only [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should provide podname only [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Downward API volume should provide podname only [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Downward API volume should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should set mode on item file [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should set mode on item file [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Downward API volume should set mode on item file [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Downward API volume should update annotations on modification [NodeConformance] [Conformance]": { + "average_duration": 6 + }, + "[sig-storage] Downward API volume should update annotations on modification [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] Downward API volume should update annotations on modification [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Downward API volume should update labels on modification [NodeConformance] [Conformance]": { + "average_duration": 6 + }, + "[sig-storage] Downward API volume should update labels on modification [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] Downward API volume should update labels on modification [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes pod should support memory backed volumes of specified size": { + "average_duration": 3 + }, + "[sig-storage] EmptyDir volumes pod should support memory backed volumes of specified size [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes pod should support memory backed volumes of specified size [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] EmptyDir volumes pod should support shared volumes between containers [Conformance]": { + "average_duration": 3 + }, + "[sig-storage] EmptyDir volumes pod should support shared volumes between containers [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes pod should support shared volumes between containers [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] EmptyDir volumes should support (non-root,0644,default) [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (non-root,0644,default) [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes should support (non-root,0644,default) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (non-root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (non-root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes should support (non-root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (non-root,0666,default) [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (non-root,0666,default) [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes should support (non-root,0666,default) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (non-root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (non-root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes should support (non-root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (non-root,0777,default) [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (non-root,0777,default) [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes should support (non-root,0777,default) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (non-root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (non-root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes should support (non-root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (root,0644,default) [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (root,0644,default) [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes should support (root,0644,default) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes should support (root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (root,0666,default) [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (root,0666,default) [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes should support (root,0666,default) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes should support (root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (root,0777,default) [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (root,0777,default) [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes should support (root,0777,default) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes should support (root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes should support (root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes volume on default medium should have the correct mode [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes volume on default medium should have the correct mode [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes volume on default medium should have the correct mode [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes volume on tmpfs should have the correct mode [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes volume on tmpfs should have the correct mode [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes volume on tmpfs should have the correct mode [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] files with FSGroup ownership should support (root,0644,tmpfs) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] files with FSGroup ownership should support (root,0644,tmpfs) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] new files should be created with FSGroup ownership when container is non-root [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] new files should be created with FSGroup ownership when container is non-root [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] new files should be created with FSGroup ownership when container is root [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] new files should be created with FSGroup ownership when container is root [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] nonexistent volume subPath should have the correct mode and owner using FSGroup [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] nonexistent volume subPath should have the correct mode and owner using FSGroup [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] volume on default medium should have the correct mode using FSGroup [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] volume on default medium should have the correct mode using FSGroup [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] volume on tmpfs should have the correct mode using FSGroup [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] volume on tmpfs should have the correct mode using FSGroup [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] files with FSGroup ownership should support (root,0644,tmpfs)": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] files with FSGroup ownership should support (root,0644,tmpfs) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] new files should be created with FSGroup ownership when container is non-root": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] new files should be created with FSGroup ownership when container is non-root [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] new files should be created with FSGroup ownership when container is root": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] new files should be created with FSGroup ownership when container is root [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] nonexistent volume subPath should have the correct mode and owner using FSGroup": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] nonexistent volume subPath should have the correct mode and owner using FSGroup [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] volume on default medium should have the correct mode using FSGroup": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] volume on default medium should have the correct mode using FSGroup [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] volume on tmpfs should have the correct mode using FSGroup": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] volume on tmpfs should have the correct mode using FSGroup [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir wrapper volumes should not cause race condition when used for configmaps [Serial] [Conformance]": { + "average_duration": 25 + }, + "[sig-storage] EmptyDir wrapper volumes should not cause race condition when used for configmaps [Serial] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-storage] EmptyDir wrapper volumes should not cause race condition when used for configmaps [Serial] [Conformance] [Suite:openshift/conformance/serial/minimal] [Suite:k8s]": { + "average_duration": 24 + }, + "[sig-storage] EmptyDir wrapper volumes should not conflict [Conformance]": { + "average_duration": 3 + }, + "[sig-storage] EmptyDir wrapper volumes should not conflict [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] EmptyDir wrapper volumes should not conflict [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : configmap": { + "average_duration": 31 + }, + "[sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : configmap [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 128 + }, + "[sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : configmap [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : projected": { + "average_duration": 30 + }, + "[sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : projected [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 128 + }, + "[sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : projected [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : secret": { + "average_duration": 30 + }, + "[sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : secret [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 128 + }, + "[sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : secret [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-storage] Flexvolumes should be mountable when attachable [Feature:Flexvolumes]": { + "average_duration": 1 + }, + "[sig-storage] Flexvolumes should be mountable when attachable [Feature:Flexvolumes] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] Flexvolumes should be mountable when attachable [Feature:Flexvolumes] [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] Flexvolumes should be mountable when attachable [Feature:Flexvolumes] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] Flexvolumes should be mountable when non-attachable": { + "average_duration": 1 + }, + "[sig-storage] Flexvolumes should be mountable when non-attachable [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] Flexvolumes should be mountable when non-attachable [Skipped:gce] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] Flexvolumes should be mountable when non-attachable [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] GKE local SSD [Feature:GKELocalSSD] should write and read from node local SSD [Feature:GKELocalSSD] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] GKE local SSD [Feature:GKELocalSSD] should write and read from node local SSD [Feature:GKELocalSSD] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] HostPath should give a volume the correct mode [LinuxOnly] [NodeConformance]": { + "average_duration": 5 + }, + "[sig-storage] HostPath should give a volume the correct mode [LinuxOnly] [NodeConformance] [Skipped:NoOptionalCapabilities] [Skipped:ibmroks] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] HostPath should give a volume the correct mode [LinuxOnly] [NodeConformance] [Skipped:ibmroks] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] HostPath should give a volume the correct mode [LinuxOnly] [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] HostPath should support r/w [NodeConformance]": { + "average_duration": 5 + }, + "[sig-storage] HostPath should support r/w [NodeConformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] HostPath should support r/w [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] HostPath should support subPath [NodeConformance]": { + "average_duration": 5 + }, + "[sig-storage] HostPath should support subPath [NodeConformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] HostPath should support subPath [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 50 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 24 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 34 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 34 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 59 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 65 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 59 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 14 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 14 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 14 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 12 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 14 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 12 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Skipped:azure] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:azure] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 16 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Skipped:azure] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:azure] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 13 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 36 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 12 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 12 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-disk] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 6 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 5 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 8 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 7 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 5 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 34 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: azure-file] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 7 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 7 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 5 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 24 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 28 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 5 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 7 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 7 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 5 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 67 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 65 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 115 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 117 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 58 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 59 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 67 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 67 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 118 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 119 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 52 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 52 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 51 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 51 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 53 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 52 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 53 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 53 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 51 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 52 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 53 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 54 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 62 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 63 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 57 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 55 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 51 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 53 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 57 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 60 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 36 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 59 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 55 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 65 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 59 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 58 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 54 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 30 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 30 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 47 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 73 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 75 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 150 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 156 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 77 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 85 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 141 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 142 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 73 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 76 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 74 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 80 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 151 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 157 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 142 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 148 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 76 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 73 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 73 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 73 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 150 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 149 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 78 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 86 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 140 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 158 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 29 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 29 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 50 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 47 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 58 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 57 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 30 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 50 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 48 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 28 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 28 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 59 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 59 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 36 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 53 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 55 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 51 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 48 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 73 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 63 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 57 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 55 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 30 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 29 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 13 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 34 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 13 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 27 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 29 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 13 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 28 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 29 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 13 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 15 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 27 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 30 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 24 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 35 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 31 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 24 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 36 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 38 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 31 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 16 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 34 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 37 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 16 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 30 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 16 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 34 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 37 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 16 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 30 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 16 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 34 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 37 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 16 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 30 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 16 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 35 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 37 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 29 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 35 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 37 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 16 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 16 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 30 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local] [LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 28 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 35 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs] [Serial] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 31 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 35 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 24 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 25 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 28 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 37 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 33 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 36 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 26 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 24 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 34 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 26 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 29 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 40 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 46 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 30 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs3] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 31 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 45 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 37 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 36 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 25 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 36 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 29 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 30 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 38 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 49 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 30 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 22 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 19 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 29 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 34 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 35 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 21 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 62 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 61 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 23 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 111 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 18 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 60 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 60 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 9 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 17 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 61 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 24 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 112 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 29 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 36 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 41 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 45 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 44 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 28 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 36 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 42 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 48 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 45 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 30 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 35 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: vsphere] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)(allowExpansion)][Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Dynamic PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Inline-volume (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] In-tree Volumes [Driver: windows-gcepd] [Testpattern: Pre-provisioned PV (ntfs)][Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] Managed cluster should have no crashlooping recycler pods over four minutes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel]": { + "average_duration": 242 + }, + "[sig-storage] Managed cluster should have no crashlooping recycler pods over four minutes [Suite:openshift/conformance/parallel]": { + "average_duration": 231 + }, + "[sig-storage] Mounted volume expand [Feature:StorageProvider] Should verify mounted devices can be resized [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 18 + }, + "[sig-storage] Mounted volume expand [Feature:StorageProvider] Should verify mounted devices can be resized [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] Multi-AZ Cluster Volumes should schedule pods in the same zones as statically provisioned PVs [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] Multi-AZ Cluster Volumes should schedule pods in the same zones as statically provisioned PVs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] MutableCSINodeAllocatableCount [FeatureGate:MutableCSINodeAllocatableCount] [Beta] [Feature:OffByDefault] Attach Limit Exceeded should transition pod to failed state when attachment limit exceeded": { + "average_duration": 195 + }, + "[sig-storage] MutableCSINodeAllocatableCount [FeatureGate:MutableCSINodeAllocatableCount] [Beta] [Feature:OffByDefault] Attach Limit Exceeded should transition pod to failed state when attachment limit exceeded [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 202 + }, + "[sig-storage] MutableCSINodeAllocatableCount [FeatureGate:MutableCSINodeAllocatableCount] [Beta] [Feature:OffByDefault] Dynamic Allocatable Count should observe dynamic changes in CSINode allocatable count": { + "average_duration": 71 + }, + "[sig-storage] MutableCSINodeAllocatableCount [FeatureGate:MutableCSINodeAllocatableCount] [Beta] [Feature:OffByDefault] Dynamic Allocatable Count should observe dynamic changes in CSINode allocatable count [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 68 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod": { + "average_duration": 193 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 197 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 36 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 34 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 26 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 34 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 30 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 34 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 30 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 54 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 56 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 56 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 52 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 101 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 85 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source": { + "average_duration": 65 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 58 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 79 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 64 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 35 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 45 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 99 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 96 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 99 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 41 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 37 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 41 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 41 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] volumes should store data": { + "average_duration": 51 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 61 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works": { + "average_duration": 55 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 56 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 41 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 52 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 99 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 87 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] capacity provides storage capacity information [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (Always)[LinuxOnly], rwop pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, new pod fsgroup applied to volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with different fsgroup applied to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] fsgroupchangepolicy (OnRootMismatch)[LinuxOnly], pod created with an initial fsgroup, volume contents ownership changed via chgrp in first pod, new pod with same fsgroup skips ownership changes to the volume contents [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 46 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 59 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 74 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source": { + "average_duration": 57 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 66 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 79 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 65 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node": { + "average_duration": 43 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should block a second pod from using an in-use ReadWriteOncePod volume on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 51 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes": { + "average_duration": 45 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] read-write-once-pod [MinimumKubeletVersion:1.27] should preempt lower priority pods using ReadWriteOncePod volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 55 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 35 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 45 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 45 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 54 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory": { + "average_duration": 46 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 46 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 41 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 45 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 61 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 65 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path": { + "average_duration": 37 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 45 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 42 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 46 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 43 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 46 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 44 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 45 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 100 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 92 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 98 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 40 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 40 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 43 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 43 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 41 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] volumes should store data": { + "average_duration": 57 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 62 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (delayed binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (delayed binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 52 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 25 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 28 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 35 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 41 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (immediate binding)] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (immediate binding)] topology should provision a volume and schedule a pod with AllowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited and the pod is re-created on the same node after controller resize is finished [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)(allowExpansion)] [Feature:Windows] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should mount multiple PV pointing to the same storage on the same node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision correct filesystem size when restoring snapshot to larger size pvc [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with any volume data source [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode)": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source (ROX mode) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source (ROX mode) [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should be protected by vac-protection finalizer [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should create a volume with VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume that already has a VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should modify volume with no VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should be protected by vac-protection finalizer [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should create a volume with VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume that already has a VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volume-modify [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] should modify volume with no VAC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 96 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 113 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 102 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 106 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 114 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 103 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Dynamic Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 77 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 89 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Ephemeral Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 76 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 73 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 89 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Ephemeral Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 77 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 36 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 116 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 86 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 41 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 48 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 55 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 36 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 34 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 122 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 80 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 50 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 54 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume": { + "average_duration": 38 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume": { + "average_duration": 38 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs": { + "average_duration": 104 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 81 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes": { + "average_duration": 40 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 42 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition": { + "average_duration": 47 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 54 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should support volume limits [Serial] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Generic Ephemeral-volume (default fs)] volumeLimits should verify that all csinodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Inline-volume (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned PV (ntfs)] [Feature:Windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 97 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 112 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 102 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned Snapshot (delete policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent)": { + "average_duration": 111 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 113 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works after modifying source data, check deletion (persistent) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 103 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral)": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] OCP CSI Volumes [Driver: csi-hostpath-groupsnapshot] [OCPFeatureGate:VolumeGroupSnapshot] [Testpattern: Pre-provisioned Snapshot (retain policy)] snapshottable [Feature:VolumeSnapshotDataSource] volume snapshot controller should check snapshot fields, check restore correctly works, check deletion (ephemeral) [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] PV Protection Verify \"immediate\" deletion of a PV that is not bound to a PVC": { + "average_duration": 2 + }, + "[sig-storage] PV Protection Verify \"immediate\" deletion of a PV that is not bound to a PVC [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] PV Protection Verify \"immediate\" deletion of a PV that is not bound to a PVC [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] PV Protection Verify that PV bound to a PVC is not removed immediately": { + "average_duration": 4 + }, + "[sig-storage] PV Protection Verify that PV bound to a PVC is not removed immediately [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] PV Protection Verify that PV bound to a PVC is not removed immediately [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] PVC Protection Verify \"immediate\" deletion of a PVC that is not in active use by a pod": { + "average_duration": 16 + }, + "[sig-storage] PVC Protection Verify \"immediate\" deletion of a PVC that is not in active use by a pod [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] PVC Protection Verify \"immediate\" deletion of a PVC that is not in active use by a pod [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-storage] PVC Protection Verify that PVC in active use by a pod is not removed immediately": { + "average_duration": 16 + }, + "[sig-storage] PVC Protection Verify that PVC in active use by a pod is not removed immediately [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 20 + }, + "[sig-storage] PVC Protection Verify that PVC in active use by a pod is not removed immediately [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-storage] PVC Protection Verify that scheduling of a pod that uses PVC that is being deleted fails and the pod becomes Unschedulable": { + "average_duration": 16 + }, + "[sig-storage] PVC Protection Verify that scheduling of a pod that uses PVC that is being deleted fails and the pod becomes Unschedulable [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] PVC Protection Verify that scheduling of a pod that uses PVC that is being deleted fails and the pod becomes Unschedulable [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-storage] PersistentVolumes CSI Conformance should apply changes to a pv/pvc status [Conformance]": { + "average_duration": 1 + }, + "[sig-storage] PersistentVolumes CSI Conformance should apply changes to a pv/pvc status [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] PersistentVolumes CSI Conformance should run through the lifecycle of a PV and a PVC [Conformance]": { + "average_duration": 4 + }, + "[sig-storage] PersistentVolumes CSI Conformance should run through the lifecycle of a PV and a PVC [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] PersistentVolumes GCEPD [Feature:StorageProvider] should test that deleting a PVC before the pod does not cause pod deletion to fail on PD detach [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] PersistentVolumes GCEPD [Feature:StorageProvider] should test that deleting the Namespace of a PVC and Pod causes the successful detach of Persistent Disk [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] PersistentVolumes GCEPD [Feature:StorageProvider] should test that deleting the PV before the pod does not cause pod deletion to fail on PD detach [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] PersistentVolumes NFS when invoking the Recycle reclaim policy should test that a PV becomes Available and is clean after the PVC is deleted.": { + "average_duration": 32 + }, + "[sig-storage] PersistentVolumes NFS when invoking the Recycle reclaim policy should test that a PV becomes Available and is clean after the PVC is deleted. [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 67 + }, + "[sig-storage] PersistentVolumes NFS when invoking the Recycle reclaim policy should test that a PV becomes Available and is clean after the PVC is deleted. [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 34 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PV and a pre-bound PVC: test phase transition timestamp is set": { + "average_duration": 21 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PV and a pre-bound PVC: test phase transition timestamp is set [Feature:PersistentVolumeLastPhaseTransitionTime] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PV and a pre-bound PVC: test phase transition timestamp is set [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PV and a pre-bound PVC: test phase transition timestamp multiple updates": { + "average_duration": 23 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PV and a pre-bound PVC: test phase transition timestamp multiple updates [Feature:PersistentVolumeLastPhaseTransitionTime] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 24 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PV and a pre-bound PVC: test phase transition timestamp multiple updates [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PV and a pre-bound PVC: test write access": { + "average_duration": 23 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PV and a pre-bound PVC: test write access [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 34 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PV and a pre-bound PVC: test write access [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PV: test phase transition timestamp is set and phase is Available": { + "average_duration": 10 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PV: test phase transition timestamp is set and phase is Available [Feature:PersistentVolumeLastPhaseTransitionTime] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PV: test phase transition timestamp is set and phase is Available [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PVC and a pre-bound PV: test write access": { + "average_duration": 23 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PVC and a pre-bound PV: test write access [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 36 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PVC and a pre-bound PV: test write access [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PVC and non-pre-bound PV: test write access": { + "average_duration": 22 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PVC and non-pre-bound PV: test write access [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 35 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PVC and non-pre-bound PV: test write access [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs should create a non-pre-bound PV and PVC: test write access ": { + "average_duration": 17 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs should create a non-pre-bound PV and PVC: test write access [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 29 + }, + "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs should create a non-pre-bound PV and PVC: test write access [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] PersistentVolumes NFS with multiple PVs and PVCs all in same ns should create 2 PVs and 4 PVCs: test write access": { + "average_duration": 20 + }, + "[sig-storage] PersistentVolumes NFS with multiple PVs and PVCs all in same ns should create 2 PVs and 4 PVCs: test write access [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 47 + }, + "[sig-storage] PersistentVolumes NFS with multiple PVs and PVCs all in same ns should create 2 PVs and 4 PVCs: test write access [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] PersistentVolumes NFS with multiple PVs and PVCs all in same ns should create 3 PVs and 3 PVCs: test write access": { + "average_duration": 28 + }, + "[sig-storage] PersistentVolumes NFS with multiple PVs and PVCs all in same ns should create 3 PVs and 3 PVCs: test write access [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 68 + }, + "[sig-storage] PersistentVolumes NFS with multiple PVs and PVCs all in same ns should create 3 PVs and 3 PVCs: test write access [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 30 + }, + "[sig-storage] PersistentVolumes-expansion loopback local block volume should support online expansion on node [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 75 + }, + "[sig-storage] PersistentVolumes-expansion loopback local block volume should support online expansion on node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 70 + }, + "[sig-storage] PersistentVolumes-expansion loopback local block volume should support online expansion on node": { + "average_duration": 59 + }, + "[sig-storage] PersistentVolumes-expansion loopback local block volume should support online expansion on node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 63 + }, + "[sig-storage] PersistentVolumes-local Pod with node different from PV's NodeAffinity should fail scheduling due to different NodeAffinity [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] PersistentVolumes-local Pod with node different from PV's NodeAffinity should fail scheduling due to different NodeAffinity [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] PersistentVolumes-local Pod with node different from PV's NodeAffinity should fail scheduling due to different NodeSelector [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] PersistentVolumes-local Pod with node different from PV's NodeAffinity should fail scheduling due to different NodeSelector [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] PersistentVolumes-local Pods sharing a single local PV [Serial] all pods should be running [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] PersistentVolumes-local Pods sharing a single local PV [Serial] all pods should be running [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] PersistentVolumes-local Stress with local volumes [Serial] should be able to process many pods and reuse local volumes [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 114 + }, + "[sig-storage] PersistentVolumes-local Stress with local volumes [Serial] should be able to process many pods and reuse local volumes [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 76 + }, + "[sig-storage] PersistentVolumes-local [Volume type: block] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: block] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: block] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: block] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: block] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] PersistentVolumes-local [Volume type: block] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] PersistentVolumes-local [Volume type: block] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] PersistentVolumes-local [Volume type: block] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 16 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Skipped:NoOptionalCapabilities] [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 4 + }, + "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 15 + }, + "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] PersistentVolumes-local Pod with node different from PV's NodeAffinity should fail scheduling due to different NodeAffinity": { + "average_duration": 6 + }, + "[sig-storage] PersistentVolumes-local Pod with node different from PV's NodeAffinity should fail scheduling due to different NodeAffinity [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] PersistentVolumes-local Pod with node different from PV's NodeAffinity should fail scheduling due to different NodeSelector": { + "average_duration": 6 + }, + "[sig-storage] PersistentVolumes-local Pod with node different from PV's NodeAffinity should fail scheduling due to different NodeSelector [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] PersistentVolumes-local Stress with local volumes [Serial] should be able to process many pods and reuse local volumes": { + "average_duration": 70 + }, + "[sig-storage] PersistentVolumes-local Stress with local volumes [Serial] should be able to process many pods and reuse local volumes [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 68 + }, + "[sig-storage] PersistentVolumes-local [Volume type: block] One pod requesting one prebound PVC should be able to mount volume and read from pod1": { + "average_duration": 10 + }, + "[sig-storage] PersistentVolumes-local [Volume type: block] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] PersistentVolumes-local [Volume type: block] One pod requesting one prebound PVC should be able to mount volume and write from pod1": { + "average_duration": 10 + }, + "[sig-storage] PersistentVolumes-local [Volume type: block] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] PersistentVolumes-local [Volume type: block] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2": { + "average_duration": 13 + }, + "[sig-storage] PersistentVolumes-local [Volume type: block] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-storage] PersistentVolumes-local [Volume type: block] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: block] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] One pod requesting one prebound PVC should be able to mount volume and read from pod1": { + "average_duration": 10 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] One pod requesting one prebound PVC should be able to mount volume and write from pod1": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2": { + "average_duration": 13 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2": { + "average_duration": 13 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] One pod requesting one prebound PVC should be able to mount volume and read from pod1": { + "average_duration": 10 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] One pod requesting one prebound PVC should be able to mount volume and write from pod1": { + "average_duration": 10 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2": { + "average_duration": 13 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] One pod requesting one prebound PVC should be able to mount volume and read from pod1": { + "average_duration": 9 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] One pod requesting one prebound PVC should be able to mount volume and write from pod1": { + "average_duration": 9 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] One pod requesting one prebound PVC should be able to mount volume and read from pod1": { + "average_duration": 9 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] One pod requesting one prebound PVC should be able to mount volume and write from pod1": { + "average_duration": 9 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link] One pod requesting one prebound PVC should be able to mount volume and read from pod1": { + "average_duration": 9 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link] One pod requesting one prebound PVC should be able to mount volume and write from pod1": { + "average_duration": 9 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir-link] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir] One pod requesting one prebound PVC should be able to mount volume and read from pod1": { + "average_duration": 9 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir] One pod requesting one prebound PVC should be able to mount volume and write from pod1": { + "average_duration": 9 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2": { + "average_duration": 11 + }, + "[sig-storage] PersistentVolumes-local [Volume type: dir] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] One pod requesting one prebound PVC should be able to mount volume and read from pod1": { + "average_duration": 3 + }, + "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] One pod requesting one prebound PVC should be able to mount volume and write from pod1": { + "average_duration": 3 + }, + "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2": { + "average_duration": 3 + }, + "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2": { + "average_duration": 3 + }, + "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Skipped:gce] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 3 + }, + "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] One pod requesting one prebound PVC should be able to mount volume and read from pod1": { + "average_duration": 9 + }, + "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] One pod requesting one prebound PVC should be able to mount volume and write from pod1": { + "average_duration": 9 + }, + "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2": { + "average_duration": 12 + }, + "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 12 + }, + "[sig-storage] Pod Disks [Feature:StorageProvider] [Serial] attach on previously attached volumes should work [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] Pod Disks [Feature:StorageProvider] should be able to delete a non-existent PD without error [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] Projected combined should project all components that make up the projection API [Projection] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected combined should project all components that make up the projection API [Projection] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected combined should project all components that make up the projection API [Projection][NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected combined should project all components that make up the projection API [Projection][NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected configMap optional updates should be reflected in volume [NodeConformance] [Conformance]": { + "average_duration": 27 + }, + "[sig-storage] Projected configMap optional updates should be reflected in volume [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 44 + }, + "[sig-storage] Projected configMap optional updates should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume as non-root [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume as non-root [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume as non-root [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeFeature:FSGroup] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume with mappings [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume with mappings [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume with mappings [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected configMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected configMap updates should be reflected in volume [NodeConformance] [Conformance]": { + "average_duration": 22 + }, + "[sig-storage] Projected configMap updates should be reflected in volume [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 39 + }, + "[sig-storage] Projected configMap updates should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 28 + }, + "[sig-storage] Projected downwardAPI should provide container's cpu limit [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should provide container's cpu limit [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected downwardAPI should provide container's cpu limit [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should provide container's cpu request [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should provide container's cpu request [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected downwardAPI should provide container's cpu request [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should provide container's memory limit [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should provide container's memory limit [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected downwardAPI should provide container's memory limit [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should provide container's memory request [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should provide container's memory request [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected downwardAPI should provide container's memory request [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected downwardAPI should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected downwardAPI should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup [LinuxOnly]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup [LinuxOnly] [NodeFeature:FSGroup] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup and defaultMode [LinuxOnly]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [NodeFeature:FSGroup] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should provide podname only [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should provide podname only [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected downwardAPI should provide podname only [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected downwardAPI should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should set mode on item file [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should set mode on item file [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected downwardAPI should set mode on item file [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected downwardAPI should update annotations on modification [NodeConformance] [Conformance]": { + "average_duration": 7 + }, + "[sig-storage] Projected downwardAPI should update annotations on modification [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 10 + }, + "[sig-storage] Projected downwardAPI should update annotations on modification [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected downwardAPI should update labels on modification [NodeConformance] [Conformance]": { + "average_duration": 7 + }, + "[sig-storage] Projected downwardAPI should update labels on modification [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] Projected downwardAPI should update labels on modification [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected secret optional updates should be reflected in volume [NodeConformance] [Conformance]": { + "average_duration": 27 + }, + "[sig-storage] Projected secret optional updates should be reflected in volume [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 36 + }, + "[sig-storage] Projected secret optional updates should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] Projected secret should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected secret should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] Projected secret should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] Projected secret should be consumable from pods in volume [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected secret should be consumable from pods in volume [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected secret should be consumable from pods in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected secret should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected secret should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected secret should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected secret should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected secret should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected secret should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected secret should be consumable from pods in volume with mappings [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected secret should be consumable from pods in volume with mappings [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected secret should be consumable from pods in volume with mappings [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected secret should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected secret should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected secret should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Projected secret should be consumable in multiple volumes in a pod [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Projected secret should be consumable in multiple volumes in a pod [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Projected secret should be consumable in multiple volumes in a pod [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:pewang-LEVEL0-High-59668-[MicroShift] [Default Storageclass] [Dynamic Provision] [xfs] volume should be stored data and allowed exec of files": { + "average_duration": 156 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-Critical-59655-[MicroShift] Dynamic provision using storage class with option volumeBindingMode set to WaitForFirstConsumer": { + "average_duration": 102 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-Critical-59662-[MicroShift] Pod should be able to mount multiple PVCs": { + "average_duration": 73 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-Critical-59663-[MicroShift] Can not exceed storage and pvc quota in specific storageClass": { + "average_duration": 53 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-Critical-59665-[MicroShift] Delete pvc which is not consumed by pod should be successful": { + "average_duration": 30 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-Critical-59670-[MicroShift] Admin can change default storage class to non-default [Serial]": { + "average_duration": 10 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-Critical-59671-[MicroShift] Change dynamic provisioned PV reclaim policy should work as expected": { + "average_duration": 82 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-Critical-64840-[MicroShift] [Snapshot] [Block] Should provision storage with snapshot datasource and restore successfully": { + "average_duration": 4 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-Critical-64856-[MicroShift] [Snapshot] snapshot a volume should support different storage class using the same device class as the source pvc": { + "average_duration": 4 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-High-68580-[MicroShift] Perform persistent volume update operations with 'oc set volume' commands": { + "average_duration": 195 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-LEVEL0-Critical-59657-[MicroShift] Dynamic provision using storage class with option volumeBindingMode set to Immediate": { + "average_duration": 77 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-LEVEL0-Critical-59658-[MicroShift] User can create PVC with Block VolumeMode": { + "average_duration": 50 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-LEVEL0-Critical-59659-[MicroShift] User can create PVC with Filesystem VolumeMode": { + "average_duration": 35 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-LEVEL0-Critical-59660-[MicroShift] Volumes resize on-line [Serial]": { + "average_duration": 120 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-LEVEL0-Critical-59661-[MicroShift] [Statefulset] Volumes should store data and allow exec of files on the volume": { + "average_duration": 104 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-LEVEL0-Critical-59664-[MicroShift] Can not exceed storage and pvc quota in specific namespace": { + "average_duration": 42 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-LEVEL0-Critical-59666-[MicroShift] Delete pvc which is in active use by pod should postpone deletion and new pods consume such pvc should stuck at FailedScheduling": { + "average_duration": 88 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-LEVEL0-Critical-59667-[MicroShift] Cluster should have no more than one default storageclass defined, PVC provisioning without specifying storagclass should succeed while multiple storageclass present": { + "average_duration": 100 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-LEVEL0-Critical-59669-[MicroShift] Run pod with specific SELinux by using securityContext": { + "average_duration": 62 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-LEVEL0-Critical-64231-[MicroShift] Pod creation with generic ephemeral volume": { + "average_duration": 87 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-LEVEL0-Critical-64839-[MicroShift] [Snapshot] [Filesystem] Should provision storage with snapshot datasource and restore successfully": { + "average_duration": 4 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-LEVEL0-Critical-64842-[MicroShift] [Snapshot] volumeSnapshotContent should get removed after the corresponding snapshot deletion with deletionPolicy: 'Delete'": { + "average_duration": 4 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-LEVEL0-Critical-64843-[MicroShift] [Snapshot] volumeSnapshotContent should NOT be removed after the corresponding snapshot deletion with deletionPolicy: 'Retain'": { + "average_duration": 4 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-LEVEL0-Critical-64857-[MicroShift] [Clone] [Filesystem] clone a pvc with filesystem VolumeMode": { + "average_duration": 4 + }, + "[sig-storage] STORAGE MicroShiftOnly-Author:rdeore-LEVEL0-Critical-64858-[MicroShift] [Clone] [Block] clone a pvc with block VolumeMode": { + "average_duration": 4 + }, + "[sig-storage] Secrets optional updates should be reflected in volume [NodeConformance] [Conformance]": { + "average_duration": 27 + }, + "[sig-storage] Secrets optional updates should be reflected in volume [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 45 + }, + "[sig-storage] Secrets optional updates should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 32 + }, + "[sig-storage] Secrets should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Secrets should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] Secrets should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 6 + }, + "[sig-storage] Secrets should be consumable from pods in volume [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Secrets should be consumable from pods in volume [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Secrets should be consumable from pods in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Secrets should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Secrets should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Secrets should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Secrets should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Secrets should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Secrets should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Secrets should be consumable from pods in volume with mappings [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Secrets should be consumable from pods in volume with mappings [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Secrets should be consumable from pods in volume with mappings [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Secrets should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Secrets should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Secrets should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Secrets should be consumable in multiple volumes in a pod [NodeConformance] [Conformance]": { + "average_duration": 5 + }, + "[sig-storage] Secrets should be consumable in multiple volumes in a pod [NodeConformance] [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 7 + }, + "[sig-storage] Secrets should be consumable in multiple volumes in a pod [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 5 + }, + "[sig-storage] Secrets should be immutable if `immutable` field is set [Conformance]": { + "average_duration": 1 + }, + "[sig-storage] Secrets should be immutable if `immutable` field is set [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] Secrets should be immutable if `immutable` field is set [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] StorageClasses CSI Conformance should run through the lifecycle of a StorageClass [Conformance]": { + "average_duration": 1 + }, + "[sig-storage] StorageClasses CSI Conformance should run through the lifecycle of a StorageClass [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] Subpath Atomic writer volumes should support subpaths with configmap pod [Conformance]": { + "average_duration": 23 + }, + "[sig-storage] Subpath Atomic writer volumes should support subpaths with configmap pod [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-storage] Subpath Atomic writer volumes should support subpaths with configmap pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] Subpath Atomic writer volumes should support subpaths with configmap pod with mountPath of existing file [Conformance]": { + "average_duration": 23 + }, + "[sig-storage] Subpath Atomic writer volumes should support subpaths with configmap pod with mountPath of existing file [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-storage] Subpath Atomic writer volumes should support subpaths with configmap pod with mountPath of existing file [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] Subpath Atomic writer volumes should support subpaths with downward pod [Conformance]": { + "average_duration": 23 + }, + "[sig-storage] Subpath Atomic writer volumes should support subpaths with downward pod [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-storage] Subpath Atomic writer volumes should support subpaths with downward pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] Subpath Atomic writer volumes should support subpaths with projected pod [Conformance]": { + "average_duration": 23 + }, + "[sig-storage] Subpath Atomic writer volumes should support subpaths with projected pod [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-storage] Subpath Atomic writer volumes should support subpaths with projected pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] Subpath Atomic writer volumes should support subpaths with secret pod [Conformance]": { + "average_duration": 23 + }, + "[sig-storage] Subpath Atomic writer volumes should support subpaths with secret pod [Conformance] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 27 + }, + "[sig-storage] Subpath Atomic writer volumes should support subpaths with secret pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 25 + }, + "[sig-storage] Subpath Container restart should verify that container can restart successfully after configmaps modified": { + "average_duration": 91 + }, + "[sig-storage] Subpath Container restart should verify that container can restart successfully after configmaps modified [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 100 + }, + "[sig-storage] Subpath Container restart should verify that container can restart successfully after configmaps modified [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 89 + }, + "[sig-storage] VolumeAttachment Conformance should apply changes to a volumeattachment status [Conformance]": { + "average_duration": 1 + }, + "[sig-storage] VolumeAttachment Conformance should apply changes to a volumeattachment status [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] VolumeAttachment Conformance should run through the lifecycle of a VolumeAttachment [Conformance]": { + "average_duration": 1 + }, + "[sig-storage] VolumeAttachment Conformance should run through the lifecycle of a VolumeAttachment [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] VolumeAttributesClass [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] should run through the lifecycle of a VolumeAttributesClass [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] VolumeAttributesClass [FeatureGate:VolumeAttributesClass] should run through the lifecycle of a VolumeAttributesClass": { + "average_duration": 2 + }, + "[sig-storage] VolumeAttributesClass [FeatureGate:VolumeAttributesClass] should run through the lifecycle of a VolumeAttributesClass [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 2 + }, + "[sig-storage] Volumes ConfigMap should be mountable [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] Volumes ConfigMap should be mountable [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 13 + }, + "[sig-storage] Volumes NFSv3 should be mountable for NFSv3 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 23 + }, + "[sig-storage] Volumes NFSv3 should be mountable for NFSv3 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 21 + }, + "[sig-storage] Volumes NFSv4 should be mountable for NFSv4 [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 31 + }, + "[sig-storage] Volumes NFSv4 should be mountable for NFSv4 [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 29 + }, + "[sig-storage] [Serial] Volume metrics Ephemeral should create metrics for total number of volumes in A/D Controller": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics Ephemeral should create metrics for total number of volumes in A/D Controller [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics Ephemeral should create metrics for total number of volumes in A/D Controller [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics Ephemeral should create metrics for total time taken in volume operations in P/V Controller": { + "average_duration": 6 + }, + "[sig-storage] [Serial] Volume metrics Ephemeral should create metrics for total time taken in volume operations in P/V Controller [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 14 + }, + "[sig-storage] [Serial] Volume metrics Ephemeral should create metrics for total time taken in volume operations in P/V Controller [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 8 + }, + "[sig-storage] [Serial] Volume metrics Ephemeral should create prometheus metrics for volume provisioning and attach/detach": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics Ephemeral should create prometheus metrics for volume provisioning and attach/detach [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics Ephemeral should create prometheus metrics for volume provisioning and attach/detach [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics Ephemeral should create volume metrics in Volume Manager": { + "average_duration": 8 + }, + "[sig-storage] [Serial] Volume metrics Ephemeral should create volume metrics in Volume Manager [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 17 + }, + "[sig-storage] [Serial] Volume metrics Ephemeral should create volume metrics in Volume Manager [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 9 + }, + "[sig-storage] [Serial] Volume metrics Ephemeral should create volume metrics with the correct BlockMode PVC ref": { + "average_duration": 30 + }, + "[sig-storage] [Serial] Volume metrics Ephemeral should create volume metrics with the correct BlockMode PVC ref [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 67 + }, + "[sig-storage] [Serial] Volume metrics Ephemeral should create volume metrics with the correct BlockMode PVC ref [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-storage] [Serial] Volume metrics Ephemeral should create volume metrics with the correct FilesystemMode PVC ref": { + "average_duration": 31 + }, + "[sig-storage] [Serial] Volume metrics Ephemeral should create volume metrics with the correct FilesystemMode PVC ref [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 66 + }, + "[sig-storage] [Serial] Volume metrics Ephemeral should create volume metrics with the correct FilesystemMode PVC ref [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 34 + }, + "[sig-storage] [Serial] Volume metrics PVC should create metrics for total number of volumes in A/D Controller": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVC should create metrics for total number of volumes in A/D Controller [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVC should create metrics for total number of volumes in A/D Controller [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVC should create metrics for total time taken in volume operations in P/V Controller": { + "average_duration": 145 + }, + "[sig-storage] [Serial] Volume metrics PVC should create metrics for total time taken in volume operations in P/V Controller [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 35 + }, + "[sig-storage] [Serial] Volume metrics PVC should create metrics for total time taken in volume operations in P/V Controller [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 166 + }, + "[sig-storage] [Serial] Volume metrics PVC should create prometheus metrics for volume provisioning and attach/detach": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVC should create prometheus metrics for volume provisioning and attach/detach [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVC should create prometheus metrics for volume provisioning and attach/detach [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVC should create volume metrics in Volume Manager": { + "average_duration": 16 + }, + "[sig-storage] [Serial] Volume metrics PVC should create volume metrics in Volume Manager [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 29 + }, + "[sig-storage] [Serial] Volume metrics PVC should create volume metrics in Volume Manager [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 19 + }, + "[sig-storage] [Serial] Volume metrics PVC should create volume metrics with the correct BlockMode PVC ref": { + "average_duration": 29 + }, + "[sig-storage] [Serial] Volume metrics PVC should create volume metrics with the correct BlockMode PVC ref [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 55 + }, + "[sig-storage] [Serial] Volume metrics PVC should create volume metrics with the correct BlockMode PVC ref [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 33 + }, + "[sig-storage] [Serial] Volume metrics PVC should create volume metrics with the correct FilesystemMode PVC ref": { + "average_duration": 38 + }, + "[sig-storage] [Serial] Volume metrics PVC should create volume metrics with the correct FilesystemMode PVC ref [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 72 + }, + "[sig-storage] [Serial] Volume metrics PVC should create volume metrics with the correct FilesystemMode PVC ref [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 43 + }, + "[sig-storage] [Serial] Volume metrics PVController should create bound pv/pvc count metrics for pvc controller after creating both pv and pvc": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVController should create bound pv/pvc count metrics for pvc controller after creating both pv and pvc [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVController should create bound pv/pvc count metrics for pvc controller after creating both pv and pvc [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVController should create bound pv/pvc count metrics for pvc controller with volume attributes class dimension after creating both pv and pvc [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVController should create bound pv/pvc count metrics for pvc controller with volume attributes class dimension after creating both pv and pvc [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVController should create bound pv/pvc count metrics for pvc controller with volume attributes class dimension after creating both pv and pvc [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVController should create none metrics for pvc controller before creating any PV or PVC": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVController should create none metrics for pvc controller before creating any PV or PVC [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVController should create none metrics for pvc controller before creating any PV or PVC [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVController should create total pv count metrics for with plugin and volume mode labels after creating pv": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVController should create total pv count metrics for with plugin and volume mode labels after creating pv [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVController should create total pv count metrics for with plugin and volume mode labels after creating pv [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVController should create unbound pv count metrics for pvc controller after creating pv only": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVController should create unbound pv count metrics for pvc controller after creating pv only [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVController should create unbound pv count metrics for pvc controller after creating pv only [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVController should create unbound pvc count metrics for pvc controller after creating pvc only": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVController should create unbound pvc count metrics for pvc controller after creating pvc only [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVController should create unbound pvc count metrics for pvc controller after creating pvc only [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVController should create unbound pvc count metrics for pvc controller with volume attributes class dimension after creating pvc only [FeatureGate:VolumeAttributesClass] [Beta] [Feature:OffByDefault] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVController should create unbound pvc count metrics for pvc controller with volume attributes class dimension after creating pvc only [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass]": { + "average_duration": 1 + }, + "[sig-storage] [Serial] Volume metrics PVController should create unbound pvc count metrics for pvc controller with volume attributes class dimension after creating pvc only [FeatureGate:VolumeAttributesClass] [Feature:VolumeAttributesClass] [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-storage][Feature:CSIInlineVolumeAdmission][Serial] baseline namespace should allow pods with inline volumes when the driver uses the baseline label [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-storage][Feature:CSIInlineVolumeAdmission][Serial] baseline namespace should allow pods with inline volumes when the driver uses the restricted label [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-storage][Feature:CSIInlineVolumeAdmission][Serial] baseline namespace should deny pods with inline volumes when the driver uses the privileged label [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-storage][Feature:CSIInlineVolumeAdmission][Serial] privileged namespace should allow pods with inline volumes when the driver uses the privileged label [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-storage][Feature:CSIInlineVolumeAdmission][Serial] privileged namespace should allow pods with inline volumes when the driver uses the restricted label [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-storage][Feature:CSIInlineVolumeAdmission][Serial] restricted namespace should allow pods with inline volumes when the driver uses the restricted label [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-storage][Feature:CSIInlineVolumeAdmission][Serial] restricted namespace should deny pods with inline volumes when the driver uses the baseline label [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-storage][Feature:CSIInlineVolumeAdmission][Serial] restricted namespace should deny pods with inline volumes when the driver uses the privileged label [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-storage][Feature:Cluster-CSI-Snapshot-Controller-Operator][Serial][apigroup:operator.openshift.io] should restart webhook Pods if csi-snapshot-webhook-secret expiry annotation is changed [Suite:openshift/conformance/serial]": { + "average_duration": 7 + }, + "[sig-storage][Feature:Cluster-CSI-Snapshot-Controller-Operator][Serial][apigroup:operator.openshift.io] should restart webhook Pods if csi-snapshot-webhook-secret is deleted [Suite:openshift/conformance/serial]": { + "average_duration": 4 + }, + "[sig-storage][Feature:DisableStorageClass][Serial] should not reconcile the StorageClass when StorageClassState is Unmanaged [Suite:openshift/conformance/serial]": { + "average_duration": 13 + }, + "[sig-storage][Feature:DisableStorageClass][Serial] should reconcile the StorageClass when StorageClassState is Managed [Suite:openshift/conformance/serial]": { + "average_duration": 7 + }, + "[sig-storage][Feature:DisableStorageClass][Serial] should remove the StorageClass when StorageClassState is Removed [Suite:openshift/conformance/serial]": { + "average_duration": 16 + }, + "[sig-storage][Feature:DisableStorageClass][Serial][apigroup:operator.openshift.io] should not reconcile the StorageClass when StorageClassState is Unmanaged [Suite:openshift/conformance/serial]": { + "average_duration": 11 + }, + "[sig-storage][Feature:DisableStorageClass][Serial][apigroup:operator.openshift.io] should reconcile the StorageClass when StorageClassState is Managed [Suite:openshift/conformance/serial]": { + "average_duration": 7 + }, + "[sig-storage][Feature:DisableStorageClass][Serial][apigroup:operator.openshift.io] should remove the StorageClass when StorageClassState is Removed [Suite:openshift/conformance/serial]": { + "average_duration": 13 + }, + "[sig-storage][Feature:VSphereDriverConfiguration][Serial][apigroup:operator.openshift.io] vSphere CSI Driver Configuration snapshot options in clusterCSIDriver should allow all limits to be set at once [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-storage][Feature:VSphereDriverConfiguration][Serial][apigroup:operator.openshift.io] vSphere CSI Driver Configuration snapshot options in clusterCSIDriver should allow setting VSAN limit [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-storage][Feature:VSphereDriverConfiguration][Serial][apigroup:operator.openshift.io] vSphere CSI Driver Configuration snapshot options in clusterCSIDriver should allow setting VVOL limit [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-storage][Feature:VSphereDriverConfiguration][Serial][apigroup:operator.openshift.io] vSphere CSI Driver Configuration snapshot options in clusterCSIDriver should allow setting global snapshot limit [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-storage][Feature:VSphereDriverConfiguration][Serial][apigroup:operator.openshift.io] vSphere CSI Driver Configuration snapshot options in clusterCSIDriver should use default when unset [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-storage][FeatureGate:VSphereDriverConfiguration][Serial][apigroup:operator.openshift.io] vSphere CSI Driver Configuration snapshot options in clusterCSIDriver should allow all limits to be set at once [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-storage][FeatureGate:VSphereDriverConfiguration][Serial][apigroup:operator.openshift.io] vSphere CSI Driver Configuration snapshot options in clusterCSIDriver should allow setting VSAN limit [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-storage][FeatureGate:VSphereDriverConfiguration][Serial][apigroup:operator.openshift.io] vSphere CSI Driver Configuration snapshot options in clusterCSIDriver should allow setting VVOL limit [Suite:openshift/conformance/serial]": { + "average_duration": 3 + }, + "[sig-storage][FeatureGate:VSphereDriverConfiguration][Serial][apigroup:operator.openshift.io] vSphere CSI Driver Configuration snapshot options in clusterCSIDriver should allow setting global snapshot limit [Suite:openshift/conformance/serial]": { + "average_duration": 38 + }, + "[sig-storage][FeatureGate:VSphereDriverConfiguration][Serial][apigroup:operator.openshift.io] vSphere CSI Driver Configuration snapshot options in clusterCSIDriver should use default when unset [Suite:openshift/conformance/serial]": { + "average_duration": 14 + }, + "[sig-storage][Late] Metrics should report short attach times [Skipped:Disconnected] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-storage][Late] Metrics should report short attach times [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-storage][Late] Metrics should report short attach times [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-storage][Late] Metrics should report short mount times [Skipped:Disconnected] [Skipped:NoOptionalCapabilities] [Suite:openshift/conformance/parallel]": { + "average_duration": 4 + }, + "[sig-storage][Late] Metrics should report short mount times [Skipped:Disconnected] [Suite:openshift/conformance/parallel]": { + "average_duration": 3 + }, + "[sig-storage][Late] Metrics should report short mount times [Suite:openshift/conformance/parallel]": { + "average_duration": 0 + }, + "[sig-storage][OCPFeature:StorageNetworkPolicy] Storage Network Policy should ensure required NetworkPolicies exist with correct labels [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-storage][OCPFeature:StorageNetworkPolicy] Storage Network Policy should verify required labels for CSI related Operators [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-storage][OCPFeature:StorageNetworkPolicy] Storage Network Policy should verify required labels for CSO related Operators [Suite:openshift/conformance/parallel]": { + "average_duration": 2 + }, + "[sig-storage][OCPFeatureGate:StoragePerformantSecurityPolicy] Storage Performant Policy with invalid namespace labels on should fail to create namespace with invalid fsgroup label": { + "average_duration": 0 + }, + "[sig-storage][OCPFeatureGate:StoragePerformantSecurityPolicy] Storage Performant Policy with invalid namespace labels on should fail to create namespace with invalid selinux label": { + "average_duration": 0 + }, + "[sig-storage][OCPFeatureGate:StoragePerformantSecurityPolicy] Storage Performant Policy with valid namespace labels on when fsgroup should default to OnRootMismatch if pod has none": { + "average_duration": 46 + }, + "[sig-storage][OCPFeatureGate:StoragePerformantSecurityPolicy] Storage Performant Policy with valid namespace labels on when fsgroup should not override fsgroup change policy if pod already has one": { + "average_duration": 53 + }, + "[sig-storage][OCPFeatureGate:StoragePerformantSecurityPolicy] Storage Performant Policy with valid namespace labels on when selinux should default to selinux label of namespace if pod has none": { + "average_duration": 52 + }, + "[sig-storage][OCPFeatureGate:StoragePerformantSecurityPolicy] Storage Performant Policy with valid namespace labels on when selinux should not override selinux change policy if pod already has one": { + "average_duration": 57 + }, + "[sig-trt] ConfigMap count should not have grown significantly during upgrade": { + "average_duration": 0 + }, + "[sig-trt] Secret count should not have grown significantly during upgrade": { + "average_duration": 0 + }, + "[sig-trt] Skipped annotations present": { + "average_duration": 0 + }, + "[sig-trt] disruption/ci-cluster-network-liveness connection/new should be available throughout the test": { + "average_duration": 3480 + }, + "[sig-trt] disruption/ci-cluster-network-liveness connection/reused should be available throughout the test": { + "average_duration": 3480 + }, + "[sig-trt] no DNS lookup errors should be encountered in disruption samplers": { + "average_duration": 0 + }, + "[sig-trt][invariant] No alerts without an explicit test should be firing/pending more than historically": { + "average_duration": 0 + }, + "[sig-trt][invariant] No new alerts should be firing": { + "average_duration": 0 + }, + "[sig-windows] Hybrid cluster network for all supported CNIs should have stable networking for Linux and Windows pods": { + "average_duration": 0 + }, + "[sig-windows] Hybrid cluster network for all supported CNIs should have stable networking for Linux and Windows pods [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] Hybrid cluster network for all supported CNIs should provide Internet connection and DNS for Windows containers [Feature:Networking-IPv4] [Feature:Networking-DNS]": { + "average_duration": 0 + }, + "[sig-windows] Hybrid cluster network for all supported CNIs should provide Internet connection and DNS for Windows containers [Feature:Networking-IPv4] [Feature:Networking-DNS] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] Hybrid cluster network for all supported CNIs should provide Internet connection for Linux containers [Feature:Networking-IPv4]": { + "average_duration": 0 + }, + "[sig-windows] Hybrid cluster network for all supported CNIs should provide Internet connection for Linux containers [Feature:Networking-IPv4] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] Hybrid cluster network for all supported CNIs should provide Internet connection for Linux containers using DNS [Feature:Networking-DNS] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-windows] Hybrid cluster network for all supported CNIs should provide Internet connection for Windows containers using DNS [Feature:Networking-DNS] [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 1 + }, + "[sig-windows] Nodes should fail with invalid version annotation [Suite:openshift/conformance/parallel]": { + "average_duration": 1 + }, + "[sig-windows] Services should be able to create a functioning NodePort service for Windows": { + "average_duration": 0 + }, + "[sig-windows] Services should be able to create a functioning NodePort service for Windows [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:WindowsHostProcessContainers] [MinimumKubeletVersion:1.22] HostProcess containers container command path validation": { + "average_duration": 0 + }, + "[sig-windows] [Feature:WindowsHostProcessContainers] [MinimumKubeletVersion:1.22] HostProcess containers container command path validation [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:WindowsHostProcessContainers] [MinimumKubeletVersion:1.22] HostProcess containers container stats validation": { + "average_duration": 0 + }, + "[sig-windows] [Feature:WindowsHostProcessContainers] [MinimumKubeletVersion:1.22] HostProcess containers container stats validation [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:WindowsHostProcessContainers] [MinimumKubeletVersion:1.22] HostProcess containers metrics should report count of started and failed to start HostProcess containers": { + "average_duration": 0 + }, + "[sig-windows] [Feature:WindowsHostProcessContainers] [MinimumKubeletVersion:1.22] HostProcess containers metrics should report count of started and failed to start HostProcess containers [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:WindowsHostProcessContainers] [MinimumKubeletVersion:1.22] HostProcess containers should run as a process on the host/node": { + "average_duration": 0 + }, + "[sig-windows] [Feature:WindowsHostProcessContainers] [MinimumKubeletVersion:1.22] HostProcess containers should run as a process on the host/node [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:WindowsHostProcessContainers] [MinimumKubeletVersion:1.22] HostProcess containers should run as localgroup accounts": { + "average_duration": 0 + }, + "[sig-windows] [Feature:WindowsHostProcessContainers] [MinimumKubeletVersion:1.22] HostProcess containers should run as localgroup accounts [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:WindowsHostProcessContainers] [MinimumKubeletVersion:1.22] HostProcess containers should support init containers": { + "average_duration": 0 + }, + "[sig-windows] [Feature:WindowsHostProcessContainers] [MinimumKubeletVersion:1.22] HostProcess containers should support init containers [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:WindowsHostProcessContainers] [MinimumKubeletVersion:1.22] HostProcess containers should support querying api-server using in-cluster config": { + "average_duration": 0 + }, + "[sig-windows] [Feature:WindowsHostProcessContainers] [MinimumKubeletVersion:1.22] HostProcess containers should support querying api-server using in-cluster config [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:WindowsHostProcessContainers] [MinimumKubeletVersion:1.22] HostProcess containers should support various volume mount types": { + "average_duration": 0 + }, + "[sig-windows] [Feature:WindowsHostProcessContainers] [MinimumKubeletVersion:1.22] HostProcess containers should support various volume mount types [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:WindowsHyperVContainers] HyperV containers should start a hyperv isolated container": { + "average_duration": 0 + }, + "[sig-windows] [Feature:WindowsHyperVContainers] HyperV containers should start a hyperv isolated container [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] Cpu Resources [Serial] Container limits should not be exceeded after waiting 2 minutes": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] Cpu Resources [Serial] Container limits should not be exceeded after waiting 2 minutes [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] DNS should support configurable pod DNS servers": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] DNS should support configurable pod DNS servers [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] Kubelet-Stats Kubelet stats collection for Windows nodes when running 3 pods should return within 10 seconds": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] Kubelet-Stats Kubelet stats collection for Windows nodes when running 3 pods should return within 10 seconds [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] Kubelet-Stats Kubelet stats collection for Windows nodes when windows is booted should return bootid within 10 seconds": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] Kubelet-Stats Kubelet stats collection for Windows nodes when windows is booted should return bootid within 10 seconds [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] Kubelet-Stats [Serial] Kubelet stats collection for Windows nodes when running 10 pods should return within 10 seconds": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] Kubelet-Stats [Serial] Kubelet stats collection for Windows nodes when running 10 pods should return within 10 seconds [Suite:openshift/conformance/serial] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] SecurityContext should be able create pods and run containers with a given username": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] SecurityContext should be able create pods and run containers with a given username [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] SecurityContext should be able to create pod and run containers": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] SecurityContext should be able to create pod and run containers [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] SecurityContext should ignore Linux Specific SecurityContext if set": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] SecurityContext should ignore Linux Specific SecurityContext if set [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] SecurityContext should not be able to create pods with containers running as CONTAINERADMINISTRATOR when runAsNonRoot is true": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] SecurityContext should not be able to create pods with containers running as CONTAINERADMINISTRATOR when runAsNonRoot is true [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] SecurityContext should not be able to create pods with containers running as ContainerAdministrator when runAsNonRoot is true": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] SecurityContext should not be able to create pods with containers running as ContainerAdministrator when runAsNonRoot is true [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] SecurityContext should not be able to create pods with unknown usernames at Container level": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] SecurityContext should not be able to create pods with unknown usernames at Container level [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] SecurityContext should not be able to create pods with unknown usernames at Pod level": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] SecurityContext should not be able to create pods with unknown usernames at Pod level [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] SecurityContext should override SecurityContext username if set": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] SecurityContext should override SecurityContext username if set [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] Windows volume mounts check volume mount permissions container should have readOnly permissions on emptyDir": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] Windows volume mounts check volume mount permissions container should have readOnly permissions on emptyDir [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] Windows volume mounts check volume mount permissions container should have readOnly permissions on hostMapPath": { + "average_duration": 0 + }, + "[sig-windows] [Feature:Windows] Windows volume mounts check volume mount permissions container should have readOnly permissions on hostMapPath [Suite:openshift/conformance/parallel] [Suite:k8s]": { + "average_duration": 0 + }, + "ensure 1 worker node at least gets ready": { + "average_duration": 0 + }, + "objects in ns/default should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/default should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/kube-amd-gpu should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/kube-amd-gpu should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/kube-node-lease should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/kube-node-lease should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/kube-public should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/kube-public should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/kube-system should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/kube-system should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-addon-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-addon-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-adp should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-adp should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-apiserver should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-apiserver should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-apiserver-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-apiserver-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-aqua should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-aqua should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-authentication should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-authentication should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-authentication-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-authentication-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane-cee should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane-cee should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane-csa should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane-csa should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane-cse should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane-cse should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane-csm should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane-csm should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane-managed-scripts should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane-managed-scripts should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane-mcs-tier-two should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane-mcs-tier-two should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane-mobb should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane-mobb should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane-sdcicd should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane-sdcicd should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane-srep should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane-srep should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane-tam should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-backplane-tam should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-catalogd should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-catalogd should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-cloud-controller-manager should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-cloud-controller-manager should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-cloud-controller-manager-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-cloud-controller-manager-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-cloud-credential-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-cloud-credential-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-cloud-ingress-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-cloud-ingress-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-cloud-network-config-controller should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-cloud-network-config-controller should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-cloud-platform-infra should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-cloud-platform-infra should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-cluster-api should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-cluster-api should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-cluster-csi-drivers should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-cluster-csi-drivers should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-cluster-machine-approver should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-cluster-machine-approver should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-cluster-node-tuning-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-cluster-node-tuning-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-cluster-observability-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-cluster-observability-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-cluster-olm-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-cluster-olm-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-cluster-samples-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-cluster-samples-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-cluster-storage-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-cluster-storage-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-cluster-version should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-cluster-version should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-cnv should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-cnv should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-codeready-workspaces should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-codeready-workspaces should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-config should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-config should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-config-managed should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-config-managed should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-config-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-config-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-console should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-console should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-console-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-console-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-console-user-settings should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-console-user-settings should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-controller-manager should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-controller-manager should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-controller-manager-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-controller-manager-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-custom-domains-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-custom-domains-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-customer-monitoring should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-customer-monitoring should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-deployment-validation-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-deployment-validation-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-dns should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-dns should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-dns-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-dns-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-e2e-loki should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-e2e-loki should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-etcd should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-etcd should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-etcd-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-etcd-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-frr-k8s should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-frr-k8s should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-host-network should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-host-network should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-image-registry should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-image-registry should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-infra should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-infra should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-ingress should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-ingress should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-ingress-canary should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-ingress-canary should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-ingress-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-ingress-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-insights should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-insights should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-kmm should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-kmm should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-kni-infra should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-kni-infra should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-kube-apiserver should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-kube-apiserver should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-kube-apiserver-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-kube-apiserver-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-kube-controller-manager should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-kube-controller-manager should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-kube-controller-manager-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-kube-controller-manager-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-kube-descheduler-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-kube-descheduler-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-kube-proxy should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-kube-proxy should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-kube-scheduler should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-kube-scheduler should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-kube-scheduler-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-kube-scheduler-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-kube-storage-version-migrator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-kube-storage-version-migrator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-kube-storage-version-migrator-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-kube-storage-version-migrator-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-local-storage should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-local-storage should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-logging should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-logging should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-machine-api should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-machine-api should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-machine-config-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-machine-config-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-managed-node-metadata-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-managed-node-metadata-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-managed-upgrade-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-managed-upgrade-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-manila-csi-driver should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-manila-csi-driver should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-marketplace should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-marketplace should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-metallb-system should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-metallb-system should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-monitoring should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-monitoring should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-mtv should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-mtv should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-multiarch-tuning-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-multiarch-tuning-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-multus should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-multus should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-network-console should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-network-console should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-network-diagnostics should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-network-diagnostics should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-network-node-identity should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-network-node-identity should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-network-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-network-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-nfd should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-nfd should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-nmstate should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-nmstate should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-node should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-node should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-numaresources should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-numaresources should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-nutanix-infra should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-nutanix-infra should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-oauth-apiserver should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-oauth-apiserver should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-observability-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-observability-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-ocm-agent-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-ocm-agent-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-openstack-infra should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-openstack-infra should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-operator-controller should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-operator-controller should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-operator-lifecycle-manager should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-operator-lifecycle-manager should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-operators should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-operators should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-operators-redhat should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-operators-redhat should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-osd-metrics should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-osd-metrics should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-ovirt-infra should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-ovirt-infra should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-ovn-kubernetes should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-ovn-kubernetes should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-package-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-package-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-pipelines should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-pipelines should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-rbac-permissions should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-rbac-permissions should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-route-controller-manager should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-route-controller-manager should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-route-monitor-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-route-monitor-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-security should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-security should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-serverless should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-serverless should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-service-ca should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-service-ca should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-service-ca-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-service-ca-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-splunk-forwarder-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-splunk-forwarder-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-sre-pruning should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-sre-pruning should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-sriov-network-operator should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-sriov-network-operator should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-storage should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-storage should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-user-workload-monitoring should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-user-workload-monitoring should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-validation-webhook should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-validation-webhook should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-velero should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-velero should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-virtualization-os-images should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-virtualization-os-images should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-vsphere-infra should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-vsphere-infra should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-workload-availability should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-workload-availability should not have too many generations": { + "average_duration": 0 + }, + "objects in ns/openshift-workload-maintenance should have generation increasing monotonically": { + "average_duration": 0 + }, + "objects in ns/openshift-workload-maintenance should not have too many generations": { + "average_duration": 0 + }, + "operators in in ns/default should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/kube-amd-gpu should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/kube-node-lease should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/kube-public should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/kube-system should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-addon-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-adp should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-apiserver should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-apiserver-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-aqua should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-authentication should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-authentication-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-backplane should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-backplane-cee should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-backplane-csa should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-backplane-cse should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-backplane-csm should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-backplane-managed-scripts should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-backplane-mcs-tier-two should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-backplane-mobb should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-backplane-sdcicd should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-backplane-srep should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-backplane-tam should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-catalogd should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-cloud-controller-manager should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-cloud-controller-manager-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-cloud-credential-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-cloud-ingress-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-cloud-network-config-controller should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-cloud-platform-infra should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-cluster-api should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-cluster-csi-drivers should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-cluster-machine-approver should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-cluster-node-tuning-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-cluster-observability-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-cluster-olm-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-cluster-samples-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-cluster-storage-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-cluster-version should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-cnv should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-codeready-workspaces should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-config should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-config-managed should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-config-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-console should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-console-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-console-user-settings should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-controller-manager should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-controller-manager-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-custom-domains-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-customer-monitoring should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-deployment-validation-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-dns should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-dns-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-e2e-loki should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-etcd should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-etcd-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-frr-k8s should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-host-network should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-image-registry should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-infra should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-ingress should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-ingress-canary should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-ingress-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-insights should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-kmm should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-kni-infra should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-kube-apiserver should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-kube-apiserver-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-kube-controller-manager should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-kube-controller-manager-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-kube-descheduler-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-kube-proxy should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-kube-scheduler should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-kube-scheduler-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-kube-storage-version-migrator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-kube-storage-version-migrator-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-local-storage should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-logging should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-machine-api should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-machine-config-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-managed-node-metadata-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-managed-upgrade-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-manila-csi-driver should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-marketplace should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-metallb-system should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-monitoring should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-mtv should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-multiarch-tuning-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-multus should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-network-console should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-network-diagnostics should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-network-node-identity should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-network-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-nfd should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-nmstate should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-node should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-numaresources should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-nutanix-infra should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-oauth-apiserver should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-observability-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-ocm-agent-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-openstack-infra should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-operator-controller should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-operator-lifecycle-manager should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-operators should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-operators-redhat should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-osd-metrics should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-ovirt-infra should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-ovn-kubernetes should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-package-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-pipelines should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-rbac-permissions should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-route-controller-manager should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-route-monitor-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-security should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-serverless should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-service-ca should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-service-ca-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-splunk-forwarder-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-sre-pruning should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-sriov-network-operator should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-storage should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-user-workload-monitoring should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-validation-webhook should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-velero should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-virtualization-os-images should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-vsphere-infra should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-workload-availability should not submit invalid apply statements": { + "average_duration": 0 + }, + "operators in in ns/openshift-workload-maintenance should not submit invalid apply statements": { + "average_duration": 0 + }, + "test '[sig-arch][Feature:ClusterUpgrade] Cluster should be upgradeable after finishing upgrade [Late][Suite:upgrade]' has required number of successful passes across payload jobs for including:e2e-gcp-ovn-upgrade excluding:from-stable": { + "average_duration": 0 + }, + "test '[sig-arch][Feature:ClusterUpgrade] Cluster should be upgradeable after finishing upgrade [Late][Suite:upgrade]' has required number of successful passes across payload jobs for including:e2e-metal-ipi-ovn-bm-upgrade excluding:from-stable": { + "average_duration": 0 + }, + "test '[sig-arch][Feature:ClusterUpgrade] Cluster should be upgradeable after finishing upgrade [Late][Suite:upgrade]' has required number of successful passes across payload jobs for including:e2e-metal-ipi-upgrade-ovn-ipv6 excluding:from-stable": { + "average_duration": 0 + }, + "users in ns/default must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/default must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/default must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/default must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/default must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/kube-amd-gpu must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/kube-amd-gpu must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/kube-amd-gpu must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/kube-amd-gpu must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/kube-amd-gpu must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/kube-node-lease must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/kube-node-lease must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/kube-node-lease must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/kube-node-lease must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/kube-node-lease must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/kube-public must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/kube-public must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/kube-public must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/kube-public must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/kube-public must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/kube-system must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/kube-system must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/kube-system must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/kube-system must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/kube-system must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-addon-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-addon-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-addon-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-addon-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-addon-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-adp must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-adp must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-adp must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-adp must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-adp must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-apiserver must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-apiserver must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-apiserver must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-apiserver must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-apiserver must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-apiserver-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-apiserver-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-apiserver-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-apiserver-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-apiserver-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-aqua must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-aqua must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-aqua must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-aqua must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-aqua must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-authentication must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-authentication must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-authentication must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-authentication must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-authentication must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-authentication-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-authentication-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-authentication-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-authentication-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-authentication-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-backplane must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-cee must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-cee must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-cee must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-cee must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-cee must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-csa must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-csa must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-csa must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-csa must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-csa must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-cse must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-cse must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-cse must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-cse must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-cse must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-csm must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-csm must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-csm must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-csm must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-csm must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-managed-scripts must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-managed-scripts must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-managed-scripts must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-managed-scripts must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-managed-scripts must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-mcs-tier-two must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-mcs-tier-two must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-mcs-tier-two must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-mcs-tier-two must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-mcs-tier-two must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-mobb must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-mobb must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-mobb must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-mobb must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-mobb must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-sdcicd must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-sdcicd must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-sdcicd must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-sdcicd must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-sdcicd must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-srep must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-srep must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-srep must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-srep must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-srep must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-tam must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-tam must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-tam must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-tam must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-backplane-tam must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-catalogd must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-catalogd must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-catalogd must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-catalogd must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-catalogd must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-controller-manager must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-controller-manager must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-controller-manager must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-controller-manager must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-controller-manager must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-controller-manager-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-controller-manager-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-controller-manager-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-controller-manager-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-controller-manager-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-credential-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-credential-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-credential-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-credential-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-credential-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-ingress-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-ingress-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-ingress-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-ingress-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-ingress-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-network-config-controller must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-network-config-controller must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-network-config-controller must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-network-config-controller must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-network-config-controller must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-platform-infra must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-platform-infra must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-platform-infra must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-platform-infra must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cloud-platform-infra must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-api must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-api must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-api must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-api must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-api must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-csi-drivers must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-csi-drivers must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-csi-drivers must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-csi-drivers must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-csi-drivers must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-machine-approver must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-machine-approver must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-machine-approver must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-machine-approver must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-machine-approver must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-node-tuning-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-node-tuning-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-node-tuning-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-node-tuning-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-node-tuning-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-observability-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-observability-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-observability-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-observability-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-observability-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-olm-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-olm-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-olm-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-olm-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-olm-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-samples-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-samples-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-samples-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-samples-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-samples-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-storage-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-storage-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-storage-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-storage-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-storage-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-version must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-version must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-version must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-version must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cluster-version must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cnv must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-cnv must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cnv must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cnv must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-cnv must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-codeready-workspaces must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-codeready-workspaces must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-codeready-workspaces must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-codeready-workspaces must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-codeready-workspaces must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-config must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-config must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-config must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-config must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-config must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-config-managed must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-config-managed must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-config-managed must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-config-managed must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-config-managed must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-config-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-config-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-config-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-config-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-config-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-console must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-console must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-console must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-console must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-console must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-console-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-console-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-console-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-console-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-console-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-console-user-settings must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-console-user-settings must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-console-user-settings must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-console-user-settings must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-console-user-settings must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-controller-manager must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-controller-manager must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-controller-manager must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-controller-manager must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-controller-manager must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-controller-manager-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-controller-manager-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-controller-manager-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-controller-manager-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-controller-manager-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-custom-domains-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-custom-domains-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-custom-domains-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-custom-domains-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-custom-domains-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-customer-monitoring must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-customer-monitoring must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-customer-monitoring must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-customer-monitoring must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-customer-monitoring must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-deployment-validation-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-deployment-validation-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-deployment-validation-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-deployment-validation-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-deployment-validation-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-dns must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-dns must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-dns must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-dns must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-dns must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-dns-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-dns-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-dns-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-dns-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-dns-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-e2e-loki must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-e2e-loki must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-e2e-loki must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-e2e-loki must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-e2e-loki must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-etcd must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-etcd must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-etcd must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-etcd must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-etcd must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-etcd-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-etcd-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-etcd-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-etcd-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-etcd-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-frr-k8s must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-frr-k8s must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-frr-k8s must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-frr-k8s must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-frr-k8s must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-host-network must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-host-network must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-host-network must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-host-network must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-host-network must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-image-registry must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-image-registry must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-image-registry must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-image-registry must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-image-registry must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-infra must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-infra must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-infra must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-infra must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-infra must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ingress must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-ingress must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ingress must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ingress must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ingress must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ingress-canary must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-ingress-canary must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ingress-canary must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ingress-canary must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ingress-canary must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ingress-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-ingress-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ingress-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ingress-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ingress-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-insights must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-insights must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-insights must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-insights must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-insights must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kmm must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-kmm must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kmm must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kmm must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kmm must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kni-infra must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-kni-infra must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kni-infra must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kni-infra must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kni-infra must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-apiserver must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-kube-apiserver must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-apiserver must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-apiserver must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-apiserver must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-apiserver-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-kube-apiserver-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-apiserver-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-apiserver-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-apiserver-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-controller-manager must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-kube-controller-manager must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-controller-manager must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-controller-manager must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-controller-manager must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-controller-manager-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-kube-controller-manager-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-controller-manager-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-controller-manager-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-controller-manager-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-descheduler-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-kube-descheduler-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-descheduler-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-descheduler-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-descheduler-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-proxy must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-kube-proxy must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-proxy must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-proxy must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-proxy must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-scheduler must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-kube-scheduler must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-scheduler must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-scheduler must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-scheduler must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-scheduler-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-kube-scheduler-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-scheduler-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-scheduler-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-scheduler-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-storage-version-migrator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-kube-storage-version-migrator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-storage-version-migrator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-storage-version-migrator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-storage-version-migrator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-storage-version-migrator-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-kube-storage-version-migrator-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-storage-version-migrator-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-storage-version-migrator-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-kube-storage-version-migrator-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-local-storage must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-local-storage must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-local-storage must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-local-storage must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-local-storage must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-logging must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-logging must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-logging must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-logging must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-logging must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-machine-api must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-machine-api must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-machine-api must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-machine-api must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-machine-api must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-machine-config-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-machine-config-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-machine-config-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-machine-config-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-machine-config-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-managed-node-metadata-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-managed-node-metadata-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-managed-node-metadata-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-managed-node-metadata-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-managed-node-metadata-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-managed-upgrade-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-managed-upgrade-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-managed-upgrade-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-managed-upgrade-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-managed-upgrade-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-manila-csi-driver must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-manila-csi-driver must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-manila-csi-driver must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-manila-csi-driver must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-manila-csi-driver must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-marketplace must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-marketplace must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-marketplace must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-marketplace must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-marketplace must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-metallb-system must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-metallb-system must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-metallb-system must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-metallb-system must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-metallb-system must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-monitoring must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-monitoring must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-monitoring must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-monitoring must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-monitoring must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-mtv must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-mtv must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-mtv must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-mtv must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-mtv must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-multiarch-tuning-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-multiarch-tuning-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-multiarch-tuning-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-multiarch-tuning-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-multiarch-tuning-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-multus must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-multus must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-multus must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-multus must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-multus must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-network-console must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-network-console must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-network-console must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-network-console must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-network-console must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-network-diagnostics must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-network-diagnostics must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-network-diagnostics must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-network-diagnostics must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-network-diagnostics must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-network-node-identity must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-network-node-identity must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-network-node-identity must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-network-node-identity must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-network-node-identity must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-network-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-network-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-network-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-network-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-network-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-nfd must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-nfd must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-nfd must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-nfd must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-nfd must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-nmstate must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-nmstate must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-nmstate must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-nmstate must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-nmstate must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-node must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-node must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-node must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-node must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-node must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-numaresources must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-numaresources must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-numaresources must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-numaresources must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-numaresources must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-nutanix-infra must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-nutanix-infra must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-nutanix-infra must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-nutanix-infra must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-nutanix-infra must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-oauth-apiserver must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-oauth-apiserver must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-oauth-apiserver must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-oauth-apiserver must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-oauth-apiserver must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-observability-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-observability-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-observability-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-observability-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-observability-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ocm-agent-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-ocm-agent-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ocm-agent-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ocm-agent-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ocm-agent-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-openstack-infra must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-openstack-infra must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-openstack-infra must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-openstack-infra must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-openstack-infra must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-operator-controller must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-operator-controller must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-operator-controller must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-operator-controller must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-operator-controller must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-operator-lifecycle-manager must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-operator-lifecycle-manager must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-operator-lifecycle-manager must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-operator-lifecycle-manager must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-operator-lifecycle-manager must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-operators must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-operators must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-operators must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-operators must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-operators must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-operators-redhat must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-operators-redhat must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-operators-redhat must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-operators-redhat must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-operators-redhat must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-osd-metrics must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-osd-metrics must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-osd-metrics must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-osd-metrics must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-osd-metrics must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ovirt-infra must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-ovirt-infra must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ovirt-infra must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ovirt-infra must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ovirt-infra must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ovn-kubernetes must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-ovn-kubernetes must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ovn-kubernetes must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ovn-kubernetes must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-ovn-kubernetes must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-package-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-package-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-package-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-package-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-package-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-pipelines must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-pipelines must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-pipelines must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-pipelines must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-pipelines must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-rbac-permissions must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-rbac-permissions must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-rbac-permissions must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-rbac-permissions must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-rbac-permissions must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-route-controller-manager must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-route-controller-manager must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-route-controller-manager must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-route-controller-manager must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-route-controller-manager must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-route-monitor-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-route-monitor-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-route-monitor-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-route-monitor-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-route-monitor-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-security must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-security must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-security must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-security must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-security must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-serverless must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-serverless must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-serverless must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-serverless must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-serverless must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-service-ca must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-service-ca must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-service-ca must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-service-ca must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-service-ca must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-service-ca-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-service-ca-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-service-ca-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-service-ca-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-service-ca-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-splunk-forwarder-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-splunk-forwarder-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-splunk-forwarder-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-splunk-forwarder-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-splunk-forwarder-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-sre-pruning must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-sre-pruning must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-sre-pruning must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-sre-pruning must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-sre-pruning must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-sriov-network-operator must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-sriov-network-operator must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-sriov-network-operator must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-sriov-network-operator must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-sriov-network-operator must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-storage must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-storage must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-storage must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-storage must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-storage must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-user-workload-monitoring must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-user-workload-monitoring must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-user-workload-monitoring must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-user-workload-monitoring must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-user-workload-monitoring must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-validation-webhook must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-validation-webhook must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-validation-webhook must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-validation-webhook must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-validation-webhook must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-velero must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-velero must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-velero must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-velero must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-velero must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-virtualization-os-images must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-virtualization-os-images must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-virtualization-os-images must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-virtualization-os-images must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-virtualization-os-images must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-vsphere-infra must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-vsphere-infra must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-vsphere-infra must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-vsphere-infra must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-vsphere-infra must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-workload-availability must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-workload-availability must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-workload-availability must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-workload-availability must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-workload-availability must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-workload-maintenance must not produce too many applies": { + "average_duration": 0 + }, + "users in ns/openshift-workload-maintenance must not produce too many invalid \"apply\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-workload-maintenance must not produce too many invalid \"create\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-workload-maintenance must not produce too many invalid \"patch\" requests": { + "average_duration": 0 + }, + "users in ns/openshift-workload-maintenance must not produce too many invalid \"update\" requests": { + "average_duration": 0 + }, + "verify all machines should be in Running state": { + "average_duration": 0 + }, + "verify all nodes should be ready": { + "average_duration": 0 + }, + "verify node count should match or exceed machine count": { + "average_duration": 0 + }, + "verify operator conditions authentication": { + "average_duration": 0 + }, + "verify operator conditions baremetal": { + "average_duration": 0 + }, + "verify operator conditions cloud-controller-manager": { + "average_duration": 0 + }, + "verify operator conditions cloud-credential": { + "average_duration": 0 + }, + "verify operator conditions cluster-api": { + "average_duration": 0 + }, + "verify operator conditions cluster-autoscaler": { + "average_duration": 0 + }, + "verify operator conditions config-operator": { + "average_duration": 0 + }, + "verify operator conditions console": { + "average_duration": 0 + }, + "verify operator conditions control-plane-machine-set": { + "average_duration": 0 + }, + "verify operator conditions csi-snapshot-controller": { + "average_duration": 0 + }, + "verify operator conditions dns": { + "average_duration": 0 + }, + "verify operator conditions etcd": { + "average_duration": 0 + }, + "verify operator conditions image-registry": { + "average_duration": 0 + }, + "verify operator conditions ingress": { + "average_duration": 0 + }, + "verify operator conditions insights": { + "average_duration": 0 + }, + "verify operator conditions kube-apiserver": { + "average_duration": 0 + }, + "verify operator conditions kube-controller-manager": { + "average_duration": 0 + }, + "verify operator conditions kube-scheduler": { + "average_duration": 0 + }, + "verify operator conditions kube-storage-version-migrator": { + "average_duration": 0 + }, + "verify operator conditions machine-api": { + "average_duration": 0 + }, + "verify operator conditions machine-approver": { + "average_duration": 0 + }, + "verify operator conditions machine-config": { + "average_duration": 0 + }, + "verify operator conditions marketplace": { + "average_duration": 0 + }, + "verify operator conditions monitoring": { + "average_duration": 0 + }, + "verify operator conditions network": { + "average_duration": 0 + }, + "verify operator conditions node-tuning": { + "average_duration": 0 + }, + "verify operator conditions olm": { + "average_duration": 0 + }, + "verify operator conditions openshift-apiserver": { + "average_duration": 0 + }, + "verify operator conditions openshift-controller-manager": { + "average_duration": 0 + }, + "verify operator conditions openshift-samples": { + "average_duration": 0 + }, + "verify operator conditions operator-lifecycle-manager": { + "average_duration": 0 + }, + "verify operator conditions operator-lifecycle-manager-catalog": { + "average_duration": 0 + }, + "verify operator conditions operator-lifecycle-manager-packageserver": { + "average_duration": 0 + }, + "verify operator conditions service-ca": { + "average_duration": 0 + }, + "verify operator conditions storage": { + "average_duration": 0 + }, + "verify the cluster can be connected": { + "average_duration": 0 + } +} \ No newline at end of file diff --git a/vendor/cloud.google.com/go/bigquery/CHANGES.md b/vendor/cloud.google.com/go/bigquery/CHANGES.md new file mode 100644 index 000000000000..4a5386f7ce51 --- /dev/null +++ b/vendor/cloud.google.com/go/bigquery/CHANGES.md @@ -0,0 +1,1108 @@ +# Changes + + + + +## [1.69.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.68.0...bigquery/v1.69.0) (2025-05-27) + + +### Features + +* **bigquery/analyticshub:** Add support for Analytics Hub & Marketplace Integration ([2aaada3](https://github.com/googleapis/google-cloud-go/commit/2aaada3fb7a9d3eaacec3351019e225c4038646b)) +* **bigquery/analyticshub:** Adding allow_only_metadata_sharing to Listing resource ([2aaada3](https://github.com/googleapis/google-cloud-go/commit/2aaada3fb7a9d3eaacec3351019e225c4038646b)) +* **bigquery/analyticshub:** Adding CommercialInfo message to the Listing and Subscription resources ([2aaada3](https://github.com/googleapis/google-cloud-go/commit/2aaada3fb7a9d3eaacec3351019e225c4038646b)) +* **bigquery/analyticshub:** Adding delete_commercial and revoke_commercial to DeleteListingRequest and RevokeSubscriptionRequest ([2aaada3](https://github.com/googleapis/google-cloud-go/commit/2aaada3fb7a9d3eaacec3351019e225c4038646b)) +* **bigquery/analyticshub:** Adding DestinationDataset to the Subscription resource ([2aaada3](https://github.com/googleapis/google-cloud-go/commit/2aaada3fb7a9d3eaacec3351019e225c4038646b)) +* **bigquery/analyticshub:** Adding routine field to the SharedResource message ([2aaada3](https://github.com/googleapis/google-cloud-go/commit/2aaada3fb7a9d3eaacec3351019e225c4038646b)) +* **bigquery:** Add support for dataset view and update modes ([#12290](https://github.com/googleapis/google-cloud-go/issues/12290)) ([7c1f961](https://github.com/googleapis/google-cloud-go/commit/7c1f9616b7ea95436582eb3c40c94e6bd9b48610)) +* **bigquery:** Job creation mode GA ([#12225](https://github.com/googleapis/google-cloud-go/issues/12225)) ([1d8990d](https://github.com/googleapis/google-cloud-go/commit/1d8990dbf2563a5fbc96769ac9c6ea4ed06b239e)) + +## [1.68.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.67.0...bigquery/v1.68.0) (2025-05-12) + + +### Features + +* **bigquery/analyticshub:** Support new feature Sharing Cloud Pubsub Streams via AH (GA) and Subscriber Email logging feature ([#11908](https://github.com/googleapis/google-cloud-go/issues/11908)) ([a21d596](https://github.com/googleapis/google-cloud-go/commit/a21d5965fa3f4322da9563425350ba1079279d5a)) +* **bigquery/storage:** Increased the number of partitions can be written in a single request ([43bc515](https://github.com/googleapis/google-cloud-go/commit/43bc51591e4ffe7efc76449bb00e3747cda2c944)) +* **bigquery:** Add performance insights ([#12101](https://github.com/googleapis/google-cloud-go/issues/12101)) ([aef68ab](https://github.com/googleapis/google-cloud-go/commit/aef68abaa336e0ecd1f488ef6cb3d6b0e8930835)) +* **bigquery:** Add some missing fields to BQ stats ([#12212](https://github.com/googleapis/google-cloud-go/issues/12212)) ([77b08e8](https://github.com/googleapis/google-cloud-go/commit/77b08e8e72ece0d56ff8f86dcbfe44b944ab083f)) +* **bigquery:** Add WriteTruncateData write disposition ([#12013](https://github.com/googleapis/google-cloud-go/issues/12013)) ([b1126a3](https://github.com/googleapis/google-cloud-go/commit/b1126a3580a0c81c1d7df7cf138d17c748adefbc)) +* **bigquery:** New client(s) ([#12228](https://github.com/googleapis/google-cloud-go/issues/12228)) ([f229bd9](https://github.com/googleapis/google-cloud-go/commit/f229bd9b90830d96781d3f9059b64dbfece1690b)) +* **bigquery:** Support managed iceberg tables ([#11931](https://github.com/googleapis/google-cloud-go/issues/11931)) ([35e0774](https://github.com/googleapis/google-cloud-go/commit/35e0774bf17166dbaa88eba286f40ad91d9aa68a)) +* **bigquery:** Support per-job reservation assignment ([#12078](https://github.com/googleapis/google-cloud-go/issues/12078)) ([c9cebcc](https://github.com/googleapis/google-cloud-go/commit/c9cebcceebc5fb5eecacf99e18652e0c2a53cc6c)) + + +### Bug Fixes + +* **bigquery:** Cache total rows count ([#12230](https://github.com/googleapis/google-cloud-go/issues/12230)) ([202dce0](https://github.com/googleapis/google-cloud-go/commit/202dce02888c5d1d2821732145d5780e5c07ba05)), refs [#11874](https://github.com/googleapis/google-cloud-go/issues/11874) [#11873](https://github.com/googleapis/google-cloud-go/issues/11873) +* **bigquery:** Parse timestamps with timezone info ([#11950](https://github.com/googleapis/google-cloud-go/issues/11950)) ([530d522](https://github.com/googleapis/google-cloud-go/commit/530d522a1f8622e51310680cce31ff1dae007f81)) +* **bigquery:** Update google.golang.org/api to 0.229.0 ([3319672](https://github.com/googleapis/google-cloud-go/commit/3319672f3dba84a7150772ccb5433e02dab7e201)) +* **bigquery:** Upgrade gRPC service registration func ([7c01015](https://github.com/googleapis/google-cloud-go/commit/7c01015f2aafb5eeb0237accced76b059bc7635d)) + + +### Documentation + +* **bigquery/storage:** Updated the number of partitions (from 100 to 900) can be inserted, updated and deleted in a single request ([43bc515](https://github.com/googleapis/google-cloud-go/commit/43bc51591e4ffe7efc76449bb00e3747cda2c944)) + +## [1.67.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.66.2...bigquery/v1.67.0) (2025-03-14) + + +### Features + +* **bigquery/reservation:** Add a new field `enable_gemini_in_bigquery` to `.google.cloud.bigquery.reservation.v1.Assignment` that indicates if "Gemini in Bigquery"(https ([601e742](https://github.com/googleapis/google-cloud-go/commit/601e74202ca6bf28506f06f27abc1d99018f9dc5)) +* **bigquery/reservation:** Add a new field `replication_status` to `.google.cloud.bigquery.reservation.v1.Reservation` to provide visibility into errors that could arise during Disaster Recovery(DR) replication ([#11666](https://github.com/googleapis/google-cloud-go/issues/11666)) ([601e742](https://github.com/googleapis/google-cloud-go/commit/601e74202ca6bf28506f06f27abc1d99018f9dc5)) +* **bigquery/reservation:** Add the CONTINUOUS Job type to `.google.cloud.bigquery.reservation.v1.Assignment.JobType` for continuous SQL jobs ([601e742](https://github.com/googleapis/google-cloud-go/commit/601e74202ca6bf28506f06f27abc1d99018f9dc5)) +* **bigquery:** Support MetadataCacheMode for ExternalDataConfig ([#11803](https://github.com/googleapis/google-cloud-go/issues/11803)) ([af5174d](https://github.com/googleapis/google-cloud-go/commit/af5174daa535bb1ceee4bf5eee894eedeca66498)), refs [#11802](https://github.com/googleapis/google-cloud-go/issues/11802) + + +### Bug Fixes + +* **bigquery:** Increase timeout for storage api test and remove usage of deprecated pkg ([#11810](https://github.com/googleapis/google-cloud-go/issues/11810)) ([f47e038](https://github.com/googleapis/google-cloud-go/commit/f47e038e360375558da50c185f16002f1b1f73f4)), refs [#11801](https://github.com/googleapis/google-cloud-go/issues/11801) +* **bigquery:** Update golang.org/x/net to 0.37.0 ([1144978](https://github.com/googleapis/google-cloud-go/commit/11449782c7fb4896bf8b8b9cde8e7441c84fb2fd)) + + +### Documentation + +* **bigquery/reservation:** Remove the section about `EDITION_UNSPECIFIED` in the comment for `slot_capacity` in `.google.cloud.bigquery.reservation.v1.Reservation` to clarify that ([601e742](https://github.com/googleapis/google-cloud-go/commit/601e74202ca6bf28506f06f27abc1d99018f9dc5)) +* **bigquery/reservation:** Update the `google.api.field_behavior` for the `.google.cloud.bigquery.reservation.v1.Reservation.primary_location` and `.google.cloud.bigquery.reservation.v1.Reservation.original_primary_location` fields to clarify that they are `OUTPUT_ONLY` ([601e742](https://github.com/googleapis/google-cloud-go/commit/601e74202ca6bf28506f06f27abc1d99018f9dc5)) + +## [1.66.2](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.66.1...bigquery/v1.66.2) (2025-02-04) + + +### Bug Fixes + +* **bigquery:** Broken github.com/envoyproxy/go-control-plane/envoy dep ([#11556](https://github.com/googleapis/google-cloud-go/issues/11556)) ([e70d63b](https://github.com/googleapis/google-cloud-go/commit/e70d63bbc267c3b166bf264670b8b282a3651cc5)), refs [#11542](https://github.com/googleapis/google-cloud-go/issues/11542) + +## [1.66.1](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.66.0...bigquery/v1.66.1) (2025-02-03) + + +### Bug Fixes + +* **bigquery:** Move MaxStaleness field to table level ([#10066](https://github.com/googleapis/google-cloud-go/issues/10066)) ([164492d](https://github.com/googleapis/google-cloud-go/commit/164492d749ef0eeaf03a93d94b4a2c6c407eb4d6)) + +## [1.66.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.65.0...bigquery/v1.66.0) (2025-01-20) + + +### Features + +* **bigquery/storage/managedwriter:** Graceful connection drains ([#11463](https://github.com/googleapis/google-cloud-go/issues/11463)) ([b29912f](https://github.com/googleapis/google-cloud-go/commit/b29912faab73a2e708127eeb2f729ae581e7a24e)) + + +### Bug Fixes + +* **bigquery:** Update golang.org/x/net to v0.33.0 ([e9b0b69](https://github.com/googleapis/google-cloud-go/commit/e9b0b69644ea5b276cacff0a707e8a5e87efafc9)) + +## [1.65.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.64.0...bigquery/v1.65.0) (2024-12-05) + + +### Features + +* **bigquery/reservation:** Add a new field `is_flat_rate` to `.google.cloud.bigquery.reservation.v1.CapacityCommitment` to distinguish between flat rate and edition commitments ([8dedb87](https://github.com/googleapis/google-cloud-go/commit/8dedb878c070cc1e92d62bb9b32358425e3ceffb)) +* **bigquery/reservation:** Add the managed disaster recovery API(https ([8dedb87](https://github.com/googleapis/google-cloud-go/commit/8dedb878c070cc1e92d62bb9b32358425e3ceffb)) +* **bigquery:** Expose IsCaseInsensitive for dataset metadata ([#11216](https://github.com/googleapis/google-cloud-go/issues/11216)) ([364b639](https://github.com/googleapis/google-cloud-go/commit/364b63900f5a219d17a33807e6a500eae798b17a)) +* **bigquery:** Support IAM conditions in datasets ([#11123](https://github.com/googleapis/google-cloud-go/issues/11123)) ([d93c2d9](https://github.com/googleapis/google-cloud-go/commit/d93c2d9ad0f28336c03ffdd407fd05f5391233df)) + + +### Bug Fixes + +* **bigquery:** Do not override ctx within inner span creation ([#11119](https://github.com/googleapis/google-cloud-go/issues/11119)) ([627c69a](https://github.com/googleapis/google-cloud-go/commit/627c69ac46e0585afff2ba71ced6edf984e59857)), refs [#10961](https://github.com/googleapis/google-cloud-go/issues/10961) + + +### Documentation + +* **bigquery/reservation:** Clarify that `Autoscale.current_slots` in message `.google.cloud.bigquery.reservation.v1.Reservation` can temporarily be larger than `Autoscale.max_slots` if users reduce `Autoscale.max_slots` ([8dedb87](https://github.com/googleapis/google-cloud-go/commit/8dedb878c070cc1e92d62bb9b32358425e3ceffb)) +* **bigquery/reservation:** Update comment for `slot_capacity` in message `.google.cloud.bigquery.reservation.v1.Reservation` to provide more clarity about reservation baselines, committed slots and autoscaler SKU charges when the baseline exceeds committed slots ([8dedb87](https://github.com/googleapis/google-cloud-go/commit/8dedb878c070cc1e92d62bb9b32358425e3ceffb)) +* **bigquery/reservation:** Update comments for `commitment_start_time` and `commitment_end_time` in message `.google.cloud.bigquery.reservation.v1.CapacityCommitment` to provide details on how these values are affected by commitment renewal ([8dedb87](https://github.com/googleapis/google-cloud-go/commit/8dedb878c070cc1e92d62bb9b32358425e3ceffb)) + +## [1.64.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.63.1...bigquery/v1.64.0) (2024-10-30) + + +### Features + +* **bigquery/datatransfer:** Add scheduleOptionsV2 and Error fields for TransferConfig ([78d8513](https://github.com/googleapis/google-cloud-go/commit/78d8513f7e31c6ef118bdfc784049b8c7f1e3249)) +* **bigquery/storage:** Add experimental ArrowData type and arrow_data field within AppendRowsRequest ([f0b05e2](https://github.com/googleapis/google-cloud-go/commit/f0b05e260435d5e8889b9a0ca0ab215fcde169ab)) + + +### Bug Fixes + +* **bigquery:** Handle null RANGE ([#11058](https://github.com/googleapis/google-cloud-go/issues/11058)) ([9979e72](https://github.com/googleapis/google-cloud-go/commit/9979e72b57947ec1e11d3e0c4a7e1ec335a490cf)), refs [#11047](https://github.com/googleapis/google-cloud-go/issues/11047) +* **bigquery:** Parse negative NUMERIC from arrow ([#11052](https://github.com/googleapis/google-cloud-go/issues/11052)) ([83352c4](https://github.com/googleapis/google-cloud-go/commit/83352c475681f596e0f1e811f8c2056aef6179b2)) +* **bigquery:** Update google.golang.org/api to v0.203.0 ([8bb87d5](https://github.com/googleapis/google-cloud-go/commit/8bb87d56af1cba736e0fe243979723e747e5e11e)) +* **bigquery:** WARNING: On approximately Dec 1, 2024, an update to Protobuf will change service registration function signatures to use an interface instead of a concrete type in generated .pb.go files. This change is expected to affect very few if any users of this client library. For more information, see https://togithub.com/googleapis/google-cloud-go/issues/11020. ([8bb87d5](https://github.com/googleapis/google-cloud-go/commit/8bb87d56af1cba736e0fe243979723e747e5e11e)) + + +### Documentation + +* **bigquery:** Link types on package docs ([#11036](https://github.com/googleapis/google-cloud-go/issues/11036)) ([c4af6fe](https://github.com/googleapis/google-cloud-go/commit/c4af6fe0962e0e96223744a09fd7b5a638cd92fd)) + +## [1.63.1](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.63.0...bigquery/v1.63.1) (2024-10-01) + + +### Bug Fixes + +* **bigquery/storage:** Increase method timeout to 240s for BigQuery Metastore Partition Service API version v1alpha ([fdb4ea9](https://github.com/googleapis/google-cloud-go/commit/fdb4ea99189657880e5f0e0dce16bef1c3aa0d2f)) +* **bigquery:** Create read session with client or job projectID ([#10932](https://github.com/googleapis/google-cloud-go/issues/10932)) ([f98396e](https://github.com/googleapis/google-cloud-go/commit/f98396e074dff5261523b46a5c37d7888000f2cd)) +* **bigquery:** Missing schema for empty result set on stateless queries ([#10935](https://github.com/googleapis/google-cloud-go/issues/10935)) ([28a069a](https://github.com/googleapis/google-cloud-go/commit/28a069a4e30b3d6281fb2aa229aeb5cda3fff577)) + +## [1.63.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.62.0...bigquery/v1.63.0) (2024-09-18) + + +### Features + +* **bigquery/migration:** Update MS API stubs with Unified API ([1bb4c84](https://github.com/googleapis/google-cloud-go/commit/1bb4c846ec1ff37f394afb1684823ea76c18d16e)) +* **bigquery:** Add support for Go 1.23 iterators ([84461c0](https://github.com/googleapis/google-cloud-go/commit/84461c0ba464ec2f951987ba60030e37c8a8fc18)) +* **bigquery:** New client(s) ([#10774](https://github.com/googleapis/google-cloud-go/issues/10774)) ([9638b8d](https://github.com/googleapis/google-cloud-go/commit/9638b8d00f7e2e1610a252061c3b5acd868906bc)) + + +### Bug Fixes + +* **bigquery:** Bump dependencies ([2ddeb15](https://github.com/googleapis/google-cloud-go/commit/2ddeb1544a53188a7592046b98913982f1b0cf04)) +* **bigquery:** ProcessStream check ctx done when queuing non retryable err ([#10675](https://github.com/googleapis/google-cloud-go/issues/10675)) ([60ad7f3](https://github.com/googleapis/google-cloud-go/commit/60ad7f32d69ed3986fb1326841bba2c5dc36e508)) +* **bigquery:** Properly handle RANGE type arrays ([#10883](https://github.com/googleapis/google-cloud-go/issues/10883)) ([ce3d492](https://github.com/googleapis/google-cloud-go/commit/ce3d4920258349618dab628bac85a0e2141a70a7)) +* **bigquery:** Remove retry on FailedPrecondition ([#10671](https://github.com/googleapis/google-cloud-go/issues/10671)) ([ab9a961](https://github.com/googleapis/google-cloud-go/commit/ab9a9610c2542e956a0edbffbadcaef588028dfa)) +* **bigquery:** Update dependencies ([257c40b](https://github.com/googleapis/google-cloud-go/commit/257c40bd6d7e59730017cf32bda8823d7a232758)) +* **bigquery:** Update google.golang.org/api to v0.191.0 ([5b32644](https://github.com/googleapis/google-cloud-go/commit/5b32644eb82eb6bd6021f80b4fad471c60fb9d73)) + + +### Documentation + +* **bigquery/datatransfer:** Add a note to the CreateTransferConfigRequest and UpdateTransferConfigRequest to disable restricting service account usage ([2710d0f](https://github.com/googleapis/google-cloud-go/commit/2710d0f8c66c17f1ddb1d4cc287f7aeb701c0f72)) +* **bigquery/datatransfer:** Deprecate `authorization_code` ([84461c0](https://github.com/googleapis/google-cloud-go/commit/84461c0ba464ec2f951987ba60030e37c8a8fc18)) +* **bigquery/migration:** A comment for field `name` in message `.google.cloud.bigquery.migration.v2.MigrationWorkflow` is changed to include 'Identifier' ([1bb4c84](https://github.com/googleapis/google-cloud-go/commit/1bb4c846ec1ff37f394afb1684823ea76c18d16e)) +* **bigquery/migration:** A comment for field `translation_config_details` in message `.google.cloud.bigquery.migration.v2.MigrationTask` is changed ([1bb4c84](https://github.com/googleapis/google-cloud-go/commit/1bb4c846ec1ff37f394afb1684823ea76c18d16e)) +* **bigquery/migration:** A comment for field `type` in message `.google.cloud.bigquery.migration.v2.MigrationTask` is changed to include new supported types ([1bb4c84](https://github.com/googleapis/google-cloud-go/commit/1bb4c846ec1ff37f394afb1684823ea76c18d16e)) +* **bigquery/storage:** A comment for field `location_uri` in message `.google.cloud.bigquery.storage.v1alpha.StorageDescriptor` is changed ([2710d0f](https://github.com/googleapis/google-cloud-go/commit/2710d0f8c66c17f1ddb1d4cc287f7aeb701c0f72)) +* **bigquery/storage:** A comment for message `StreamMetastorePartitionsRequest` is changed ([2710d0f](https://github.com/googleapis/google-cloud-go/commit/2710d0f8c66c17f1ddb1d4cc287f7aeb701c0f72)) +* **bigquery/storage:** A comment for message `StreamMetastorePartitionsResponse` is changed ([2710d0f](https://github.com/googleapis/google-cloud-go/commit/2710d0f8c66c17f1ddb1d4cc287f7aeb701c0f72)) + +## [1.62.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.61.0...bigquery/v1.62.0) (2024-07-22) + + +### Features + +* **bigquery/analyticshub:** Support Direct Table Access Toggle (Egress GA) ([b660d68](https://github.com/googleapis/google-cloud-go/commit/b660d6870658fe6881883785bcebaea0929fec0a)) +* **bigquery/analyticshub:** Support public directory self service for Listings/Exchanges ([#10485](https://github.com/googleapis/google-cloud-go/issues/10485)) ([b660d68](https://github.com/googleapis/google-cloud-go/commit/b660d6870658fe6881883785bcebaea0929fec0a)) +* **bigquery:** Add rounding mode to FieldSchema ([#10328](https://github.com/googleapis/google-cloud-go/issues/10328)) ([1a9e204](https://github.com/googleapis/google-cloud-go/commit/1a9e204d7752c5bfe9edfd7bc7ee36c5b1385783)) +* **bigquery:** Json support on managedwriter/adapt pkg ([#10542](https://github.com/googleapis/google-cloud-go/issues/10542)) ([978d4a1](https://github.com/googleapis/google-cloud-go/commit/978d4a1e47cbd8d4bf567b616381a2f12fac4cab)) +* **bigquery:** Support column name character map in load jobs ([#10425](https://github.com/googleapis/google-cloud-go/issues/10425)) ([b829327](https://github.com/googleapis/google-cloud-go/commit/b82932789af82b5e0799c20a096aab98132b5eb1)) + + +### Bug Fixes + +* **bigquery/storage/managedwriter:** Faster context failure on send ([#10169](https://github.com/googleapis/google-cloud-go/issues/10169)) ([1fb0e64](https://github.com/googleapis/google-cloud-go/commit/1fb0e6401d584bf8ede60a170b4d82dc211010b8)) +* **bigquery:** Bump google.golang.org/api@v0.187.0 ([8fa9e39](https://github.com/googleapis/google-cloud-go/commit/8fa9e398e512fd8533fd49060371e61b5725a85b)) +* **bigquery:** Bump google.golang.org/grpc@v1.64.1 ([8ecc4e9](https://github.com/googleapis/google-cloud-go/commit/8ecc4e9622e5bbe9b90384d5848ab816027226c5)) +* **bigquery:** Empty slice instead of nil slice for primitive repeated fields ([#7315](https://github.com/googleapis/google-cloud-go/issues/7315)) ([b371210](https://github.com/googleapis/google-cloud-go/commit/b3712100831061fea8605e574d482d7f768ecf14)) +* **bigquery:** Reduce default backoffs ([#10558](https://github.com/googleapis/google-cloud-go/issues/10558)) ([037e9ef](https://github.com/googleapis/google-cloud-go/commit/037e9efa929ad9f8d6f725b28ec8096c3e536b76)) + + +### Documentation + +* **bigquery/analyticshub:** A comment for message `DataExchange` is changed ([b660d68](https://github.com/googleapis/google-cloud-go/commit/b660d6870658fe6881883785bcebaea0929fec0a)) +* **bigquery/analyticshub:** A comment for message `Listing` is changed ([b660d68](https://github.com/googleapis/google-cloud-go/commit/b660d6870658fe6881883785bcebaea0929fec0a)) +* **bigquery/datatransfer:** Update OAuth links in `CreateTransferConfigRequest` and `UpdateTransferConfigRequest` ([3df3c04](https://github.com/googleapis/google-cloud-go/commit/3df3c04f0dffad3fa2fe272eb7b2c263801b9ada)) +* **bigquery:** Improve Inserter and StructSaver godoc ([#10170](https://github.com/googleapis/google-cloud-go/issues/10170)) ([c1cffb6](https://github.com/googleapis/google-cloud-go/commit/c1cffb63c33ae49f3a705bd0bc7a32cd2b0319bc)) +* **bigquery:** Update description of query preview feature ([#10554](https://github.com/googleapis/google-cloud-go/issues/10554)) ([25c5cbe](https://github.com/googleapis/google-cloud-go/commit/25c5cbe6f31d62fdea1455889ac2e336d1287615)) + +## [1.61.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.60.0...bigquery/v1.61.0) (2024-04-24) + + +### Features + +* **bigquery/storage/managedwriter/adapt:** Add RANGE support to adapt ([#9836](https://github.com/googleapis/google-cloud-go/issues/9836)) ([ae25253](https://github.com/googleapis/google-cloud-go/commit/ae252533375b21dd41a0ea13e85462bbcad291af)) +* **bigquery:** RANGE support for basic data movement ([#9762](https://github.com/googleapis/google-cloud-go/issues/9762)) ([07f0806](https://github.com/googleapis/google-cloud-go/commit/07f0806a945c2cf0fbc431b63d9c8a30ed3a22fd)) +* **bigquery:** RANGE support when reading Arrow format ([#9795](https://github.com/googleapis/google-cloud-go/issues/9795)) ([da245fa](https://github.com/googleapis/google-cloud-go/commit/da245fac5ee335e86c63bfa5f165b0ab84960847)) +* **bigquery:** RANGE type StandardSQLDataType support ([#9754](https://github.com/googleapis/google-cloud-go/issues/9754)) ([33666cf](https://github.com/googleapis/google-cloud-go/commit/33666cfeaefdebc474045894af069ca7172e836b)) + + +### Bug Fixes + +* **bigquery/datatransfer:** Mark parent/name fields with the REQUIRED field_behavior annotation ([8892943](https://github.com/googleapis/google-cloud-go/commit/8892943b169060f8ba7be227cd65680696c494a0)) +* **bigquery:** Bump x/net to v0.24.0 ([ba31ed5](https://github.com/googleapis/google-cloud-go/commit/ba31ed5fda2c9664f2e1cf972469295e63deb5b4)) + +## [1.60.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.59.1...bigquery/v1.60.0) (2024-03-27) + + +### Features + +* **bigquery/analyticshub:** Support selective sharing on data clean room Listings ([a3bb7c0](https://github.com/googleapis/google-cloud-go/commit/a3bb7c07ba570f26c6eb073ab3275487784547d0)) +* **bigquery/datatransfer:** Add UnenrollDataSources API which gives users a programmatic way to unenroll data sources ([a86aa8e](https://github.com/googleapis/google-cloud-go/commit/a86aa8e962b77d152ee6cdd433ad94967150ef21)) +* **bigquery/storage:** Add the RANGE type to the google.cloud.bigquery.storage.v1.TableFieldSchema ([0195fe9](https://github.com/googleapis/google-cloud-go/commit/0195fe9292274ff9d86c71079a8e96ed2e5f9331)) + + +### Bug Fixes + +* **bigquery/storage/managedwriter:** Fix flowcontrol refund on error ([#9649](https://github.com/googleapis/google-cloud-go/issues/9649)) ([a07bf1d](https://github.com/googleapis/google-cloud-go/commit/a07bf1d463416d8a4bbfbbd7e720653962fb27d5)) +* **bigquery/storage/managedwriter:** Retry improvements ([#9642](https://github.com/googleapis/google-cloud-go/issues/9642)) ([48a9258](https://github.com/googleapis/google-cloud-go/commit/48a9258954b9be40d74656dc12fe46f2bbc19bda)) +* **bigquery:** Update protobuf dep to v1.33.0 ([30b038d](https://github.com/googleapis/google-cloud-go/commit/30b038d8cac0b8cd5dd4761c87f3f298760dd33a)) + + +### Documentation + +* **bigquery/datatransfer:** Update unenrollDataSources API documentation ([#9449](https://github.com/googleapis/google-cloud-go/issues/9449)) ([da644cc](https://github.com/googleapis/google-cloud-go/commit/da644ccc6f154d41b8bedf21f4c4cc8aa9ce41bf)) +* **bigquery/storage:** Mark BigQueryWrite v1beta2 as deprecated ([d130d86](https://github.com/googleapis/google-cloud-go/commit/d130d861f55d137a2803340c2e11da3589669cb8)) + +## [1.59.1](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.59.0...bigquery/v1.59.1) (2024-02-12) + + +### Bug Fixes + +* **bigquery:** Align return time.Time values to UTC ([#9411](https://github.com/googleapis/google-cloud-go/issues/9411)) ([4ac005d](https://github.com/googleapis/google-cloud-go/commit/4ac005d77f1e19981c7e1ab1cebec1302e0840ca)) + +## [1.59.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.58.0...bigquery/v1.59.0) (2024-02-06) + + +### Features + +* **bigquery:** Add ExportDataStatstics to QueryStatistics ([#9371](https://github.com/googleapis/google-cloud-go/issues/9371)) ([261c8d9](https://github.com/googleapis/google-cloud-go/commit/261c8d944b53ac8953ea7d771c4bb50e4078d508)) +* **bigquery:** Switch all timestamp representations to int64 usec ([#9368](https://github.com/googleapis/google-cloud-go/issues/9368)) ([8c1fb7d](https://github.com/googleapis/google-cloud-go/commit/8c1fb7d4728ebc3b21cb0d601952966dca9cd1e8)) + + +### Bug Fixes + +* **bigquery/storage/managedwriter:** Resolve data races ([#9360](https://github.com/googleapis/google-cloud-go/issues/9360)) ([fa31ec0](https://github.com/googleapis/google-cloud-go/commit/fa31ec0c0f04302a9713a9b1d3228bda2ba135c6)) +* **bigquery:** Enable universe domain resolution options ([fd1d569](https://github.com/googleapis/google-cloud-go/commit/fd1d56930fa8a747be35a224611f4797b8aeb698)) +* **bigquery:** Support more timestamp formats for query param ([#9236](https://github.com/googleapis/google-cloud-go/issues/9236)) ([cc98509](https://github.com/googleapis/google-cloud-go/commit/cc98509fc7961e3d3619b837d13e69f9621386e8)), refs [#9221](https://github.com/googleapis/google-cloud-go/issues/9221) + +## [1.58.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.57.1...bigquery/v1.58.0) (2024-01-18) + + +### Features + +* **bigquery/storage/managedwriter:** Improve schema comparison stability ([#9241](https://github.com/googleapis/google-cloud-go/issues/9241)) ([faccb68](https://github.com/googleapis/google-cloud-go/commit/faccb68deeb18ad51875042242a1141285448bbb)) +* **bigquery/storage:** Add ability to request compressed ReadRowsResponse rows ([c3f1174](https://github.com/googleapis/google-cloud-go/commit/c3f1174dc29d1c00d514a69590bd83f9b08a60d1)) +* **bigquery:** Add DataGovernanceType to routines ([#8990](https://github.com/googleapis/google-cloud-go/issues/8990)) ([57491ae](https://github.com/googleapis/google-cloud-go/commit/57491ae3b7bbcee2abe1064dfb4f18cb3a511265)) +* **bigquery:** Add schema support for RANGE type ([#9050](https://github.com/googleapis/google-cloud-go/issues/9050)) ([477ccee](https://github.com/googleapis/google-cloud-go/commit/477ccee8eb210a0e0f9c71513318e0fbbd08928c)) +* **bigquery:** Add support for AllowNonIncrementalDefinition and Staleness on MaterializedView ([#8673](https://github.com/googleapis/google-cloud-go/issues/8673)) ([6ec2bb2](https://github.com/googleapis/google-cloud-go/commit/6ec2bb218335acf791af859852fc6c8e9bea7a08)) +* **bigquery:** Add table resource tags support ([#9084](https://github.com/googleapis/google-cloud-go/issues/9084)) ([3569cc2](https://github.com/googleapis/google-cloud-go/commit/3569cc27b3357c3f62ccfae1670a1bf6383dee9a)) +* **bigquery:** Expose query id on row iterator if available ([#9224](https://github.com/googleapis/google-cloud-go/issues/9224)) ([bbff8ac](https://github.com/googleapis/google-cloud-go/commit/bbff8ac817fb95af219c588bdadc0ca1784c5c0c)) + + +### Documentation + +* **bigquery/storage/managedwriter:** Add documentation for ingesting JSON to a ManagedStream ([#9137](https://github.com/googleapis/google-cloud-go/issues/9137)) ([cae54ed](https://github.com/googleapis/google-cloud-go/commit/cae54ed31548e6f17f3b6bc217bb117723f04e15)) +* **bigquery:** Update package docs to show query parameterization ([#8965](https://github.com/googleapis/google-cloud-go/issues/8965)) ([cc76ab3](https://github.com/googleapis/google-cloud-go/commit/cc76ab35c25a672ed3255c0b26a99bef2cb81868)) + +## [1.57.1](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.57.0...bigquery/v1.57.1) (2023-11-01) + + +### Bug Fixes + +* **bigquery:** Correct deps issue ([#8958](https://github.com/googleapis/google-cloud-go/issues/8958)) ([abd6ca7](https://github.com/googleapis/google-cloud-go/commit/abd6ca7e4d59595abe6ffb2abf738b445955d0ce)) + +## [1.57.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.56.0...bigquery/v1.57.0) (2023-10-30) + + +### Features + +* **bigquery/biglake:** Promote to GA ([e864fbc](https://github.com/googleapis/google-cloud-go/commit/e864fbcbc4f0a49dfdb04850b07451074c57edc8)) +* **bigquery/storage/managedwriter:** Support default value controls ([#8686](https://github.com/googleapis/google-cloud-go/issues/8686)) ([dfa8e22](https://github.com/googleapis/google-cloud-go/commit/dfa8e22edf560211ae2a2ebf1f9a23b86887c7be)) +* **bigquery:** Expose Apache Arrow data through ArrowIterator ([#8506](https://github.com/googleapis/google-cloud-go/issues/8506)) ([c8e7692](https://github.com/googleapis/google-cloud-go/commit/c8e76923621b379fb7deb6dfb944011af1d980bd)), refs [#8100](https://github.com/googleapis/google-cloud-go/issues/8100) +* **bigquery:** Introduce query preview features ([#8653](https://github.com/googleapis/google-cloud-go/issues/8653)) ([f29683b](https://github.com/googleapis/google-cloud-go/commit/f29683bcd06567e4fc2d404f53bedbea5b5f0f90)) + + +### Bug Fixes + +* **bigquery:** Handle storage read api Recv call errors ([#8666](https://github.com/googleapis/google-cloud-go/issues/8666)) ([c73963f](https://github.com/googleapis/google-cloud-go/commit/c73963f64ef667daa8a33a5a4cc2156818fc6914)) +* **bigquery:** Update golang.org/x/net to v0.17.0 ([174da47](https://github.com/googleapis/google-cloud-go/commit/174da47254fefb12921bbfc65b7829a453af6f5d)) +* **bigquery:** Update grpc-go to v1.56.3 ([343cea8](https://github.com/googleapis/google-cloud-go/commit/343cea8c43b1e31ae21ad50ad31d3b0b60143f8c)) +* **bigquery:** Update grpc-go to v1.59.0 ([81a97b0](https://github.com/googleapis/google-cloud-go/commit/81a97b06cb28b25432e4ece595c55a9857e960b7)) + +## [1.56.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.55.0...bigquery/v1.56.0) (2023-10-05) + + +### Features + +* **bigquery/analyticshub:** Add Subscription resource and RPCs ([#8612](https://github.com/googleapis/google-cloud-go/issues/8612)) ([9992249](https://github.com/googleapis/google-cloud-go/commit/999224951d586513bd382483326b455c953a14f3)) +* **bigquery:** Add external dataset reference ([#8545](https://github.com/googleapis/google-cloud-go/issues/8545)) ([1001acf](https://github.com/googleapis/google-cloud-go/commit/1001acf6ac894a7d9945b7d204ad55aa7b162909)) +* **bigquery:** Add media options to LoadConfig ([#8640](https://github.com/googleapis/google-cloud-go/issues/8640)) ([62baf56](https://github.com/googleapis/google-cloud-go/commit/62baf569c052a8c565710533ba50a1f5df8176dd)) + + +### Bug Fixes + +* **bigquery/storage/managedwriter:** Automatic retry for multiplex test ([#8601](https://github.com/googleapis/google-cloud-go/issues/8601)) ([6ef1945](https://github.com/googleapis/google-cloud-go/commit/6ef1945a837430afcd195affd661768817cdc40b)) +* **bigquery:** Dependency detection on proto conversion ([#8566](https://github.com/googleapis/google-cloud-go/issues/8566)) ([763ab5d](https://github.com/googleapis/google-cloud-go/commit/763ab5dbd466fd0450dcd46e38c75e87cbf6c49c)) + + +### Documentation + +* **bigquery/datatransfer:** Update transferConfig.name description to indicate that it supports both formats ([0449518](https://github.com/googleapis/google-cloud-go/commit/0449518f8396cc0280c0f3303c103edcee34016b)) + +## [1.55.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.54.0...bigquery/v1.55.0) (2023-09-11) + + +### Features + +* **bigquery/datapolicies:** Support using custom UDF in the data policy ([20725c8](https://github.com/googleapis/google-cloud-go/commit/20725c86c970ad24efa18c056fc3aa71dc3a4f03)) +* **bigquery:** Set PreferredMinStreamCount when creating read session ([#8476](https://github.com/googleapis/google-cloud-go/issues/8476)) ([22e095a](https://github.com/googleapis/google-cloud-go/commit/22e095adea77a2bc3900f5d5c57715d4a9ed4fcb)), refs [#8432](https://github.com/googleapis/google-cloud-go/issues/8432) + + +### Bug Fixes + +* **bigquery/storage/managedwriter:** Address possible deadlocks ([#8507](https://github.com/googleapis/google-cloud-go/issues/8507)) ([48b08bf](https://github.com/googleapis/google-cloud-go/commit/48b08bf47494052a2652a3ab519de76fddc74c8a)) +* **bigquery:** Field descriptor proto name should not be lowercase ([#8495](https://github.com/googleapis/google-cloud-go/issues/8495)) ([4287e4b](https://github.com/googleapis/google-cloud-go/commit/4287e4bed40e69203ddb55bd754e3adbf269ba9e)) +* **bigquery:** Value for datasetID on foreign keys ([#8447](https://github.com/googleapis/google-cloud-go/issues/8447)) ([fa6e827](https://github.com/googleapis/google-cloud-go/commit/fa6e827a5997fb7abe97375ea6abb7d2fc71047d)), refs [#8442](https://github.com/googleapis/google-cloud-go/issues/8442) + +## [1.54.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.53.0...bigquery/v1.54.0) (2023-08-17) + + +### Features + +* **bigquery/biglake:** Start generating apiv1 and apiv1alpha1 ([#8433](https://github.com/googleapis/google-cloud-go/issues/8433)) ([916f779](https://github.com/googleapis/google-cloud-go/commit/916f779a3513b2532d2e0fbd15bfd381ae3efeb5)) +* **bigquery/datatransfer:** Add EncryptionConfiguration to TransferConfig ([e3f8c89](https://github.com/googleapis/google-cloud-go/commit/e3f8c89429a207c05fee36d5d93efe76f9e29efe)) +* **bigquery/storage/managedwriter:** Refine connection metrics ([#8324](https://github.com/googleapis/google-cloud-go/issues/8324)) ([54fcf36](https://github.com/googleapis/google-cloud-go/commit/54fcf36fe7e26d6e3d11deec19f56e92ceb87d34)) +* **bigquery/storage:** Add beta2 deprecation message ([b3dbdde](https://github.com/googleapis/google-cloud-go/commit/b3dbdde48ddfa215c3c3bb110e0051fd8158f451)) +* **bigquery/storage:** Add default_missing_value_interpretation field; indicate KMS_SERVICE_ERROR is retryable ([b3dbdde](https://github.com/googleapis/google-cloud-go/commit/b3dbdde48ddfa215c3c3bb110e0051fd8158f451)) +* **bigquery:** Add ProjectID to JobIDConfig ([#8405](https://github.com/googleapis/google-cloud-go/issues/8405)) ([7fafd80](https://github.com/googleapis/google-cloud-go/commit/7fafd805327a0734e1602a597c2ded09a860f405)) + + +### Bug Fixes + +* **bigquery/datapolicies:** Sync the new PredefinedEpxression types to the client library ([fcb41cc](https://github.com/googleapis/google-cloud-go/commit/fcb41cc1d2435452ee78314c1b0362e3f21ae637)) +* **bigquery:** Use JobFromProject for storage iterator ([#8372](https://github.com/googleapis/google-cloud-go/issues/8372)) ([bfbf18c](https://github.com/googleapis/google-cloud-go/commit/bfbf18cb373cd6a88a22eec8db7033f6678df755)) + + +### Documentation + +* **bigquery/storage/managedwriter:** Augment context usage in package docs ([#8334](https://github.com/googleapis/google-cloud-go/issues/8334)) ([b30a7f4](https://github.com/googleapis/google-cloud-go/commit/b30a7f4a520c358eb71e1378b98e7413c2ea7f81)) +* **bigquery:** Improve RowIterator docs and out of process pagination with Storage API ([#8419](https://github.com/googleapis/google-cloud-go/issues/8419)) ([40f8f80](https://github.com/googleapis/google-cloud-go/commit/40f8f809d9ad1e6d2d0f6207cdf38428c306cb66)) + +## [1.53.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.52.0...bigquery/v1.53.0) (2023-07-24) + + +### Features + +* **bigquery/analyticshub:** Promote to GA ([130c571](https://github.com/googleapis/google-cloud-go/commit/130c5713dcbac7f670cb92ea113dd53d8029c960)) +* **bigquery/connection:** Add support for Salesforce connections, which are usable only by allowlisted partners ([bac978a](https://github.com/googleapis/google-cloud-go/commit/bac978ace43bb58db7c0b1475e41c8fdf8c49a29)) +* **bigquery/datapolicies:** Promote to GA ([130c571](https://github.com/googleapis/google-cloud-go/commit/130c5713dcbac7f670cb92ea113dd53d8029c960)) +* **bigquery/storage:** Add ResourceExhausted to retryable error for Write API unary calls ([#8214](https://github.com/googleapis/google-cloud-go/issues/8214)) ([8ff13bf](https://github.com/googleapis/google-cloud-go/commit/8ff13bf87397ad524019268c1146e44f3c1cd0e6)) + + +### Bug Fixes + +* **bigquery/storage/managedwriter:** Context refactoring ([#8275](https://github.com/googleapis/google-cloud-go/issues/8275)) ([c4104ea](https://github.com/googleapis/google-cloud-go/commit/c4104eaab0d7291c15aba37b78e71ce3cbb9f77a)) + +## [1.52.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.51.2...bigquery/v1.52.0) (2023-06-23) + + +### Features + +* **bigquery/storage:** Add estimated physical file sizes to ReadAPI v1 ([94ea341](https://github.com/googleapis/google-cloud-go/commit/94ea3410e233db6040a7cb0a931948f1e3bb4c9a)) +* **bigquery/storage:** Add table sampling to ReadAPI v1 ([ca94e27](https://github.com/googleapis/google-cloud-go/commit/ca94e2724f9e2610b46aefd0a3b5ddc06102e91b)) +* **bigquery:** Support for tables primary and foreign keys ([#8055](https://github.com/googleapis/google-cloud-go/issues/8055)) ([93d6a1a](https://github.com/googleapis/google-cloud-go/commit/93d6a1a1a3bde8d3519acc2b7e77bf8b7ba1678a)) +* **bigquery:** Update all direct dependencies ([b340d03](https://github.com/googleapis/google-cloud-go/commit/b340d030f2b52a4ce48846ce63984b28583abde6)) + + +### Bug Fixes + +* **bigquery/storage/managedwriter:** Correct reconnection logic ([#8164](https://github.com/googleapis/google-cloud-go/issues/8164)) ([a67d53d](https://github.com/googleapis/google-cloud-go/commit/a67d53ddf13b7d382d4c7856cafb068919021912)) +* **bigquery:** REST query UpdateMask bug ([df52820](https://github.com/googleapis/google-cloud-go/commit/df52820b0e7721954809a8aa8700b93c5662dc9b)) +* **bigquery:** RowIterator.Schema not filled when using Storage Read API ([#7671](https://github.com/googleapis/google-cloud-go/issues/7671)) ([31040e8](https://github.com/googleapis/google-cloud-go/commit/31040e8a7989b143c0c3c3f3e31c4a9dfbba8094)) + +## [1.51.2](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.51.1...bigquery/v1.51.2) (2023-05-08) + + +### Bug Fixes + +* **bigquery:** Update grpc to v1.55.0 ([1147ce0](https://github.com/googleapis/google-cloud-go/commit/1147ce02a990276ca4f8ab7a1ab65c14da4450ef)) + +## [1.51.1](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.51.0...bigquery/v1.51.1) (2023-05-04) + + +### Bug Fixes + +* **bigquery/storage/managedwriter:** Schema evolution improvements ([#7838](https://github.com/googleapis/google-cloud-go/issues/7838)) ([49a1621](https://github.com/googleapis/google-cloud-go/commit/49a1621254cc9cc16cbcc2ca779979edfd2565ab)) +* **bigquery:** Upgrade arrow to v12 to fix build error ([#7870](https://github.com/googleapis/google-cloud-go/issues/7870)) ([402e365](https://github.com/googleapis/google-cloud-go/commit/402e3651c18b9e5b73529e9a8f9bdeac71323875)) + + +### Documentation + +* **bigquery/storage/managedwriter:** Improve tuning guidance ([#7848](https://github.com/googleapis/google-cloud-go/issues/7848)) ([ca2184c](https://github.com/googleapis/google-cloud-go/commit/ca2184c8e7094294479665ca02ae9b29c21b09aa)) + +## [1.51.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.50.0...bigquery/v1.51.0) (2023-04-17) + + +### Features + +* **bigquery/storage/managedwriter:** Expose connection multiplexing as experimental ([#7673](https://github.com/googleapis/google-cloud-go/issues/7673)) ([3b8bfb4](https://github.com/googleapis/google-cloud-go/commit/3b8bfb44a237fc0696e77a47c5a8305caa5ec64b)) +* **bigquery:** Add Iceberg as DataFormat option. ([#7155](https://github.com/googleapis/google-cloud-go/issues/7155)) ([7a9e211](https://github.com/googleapis/google-cloud-go/commit/7a9e21121ca8debffe11fe16d1b96b0d969e11ac)) +* **bigquery:** Expose dataset MaxTimeTravelHours ([#7706](https://github.com/googleapis/google-cloud-go/issues/7706)) ([22a666c](https://github.com/googleapis/google-cloud-go/commit/22a666c766fa4565ee120574709b345e7fc37c5f)) + + +### Bug Fixes + +* **bigquery:** Respect context during query execution ([#7693](https://github.com/googleapis/google-cloud-go/issues/7693)) ([56772f5](https://github.com/googleapis/google-cloud-go/commit/56772f50217574e6776efeefef767c16e374e593)) + +## [1.50.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.49.0...bigquery/v1.50.0) (2023-04-03) + + +### Features + +* **bigquery/connection:** Add spark connection properties type ([#7570](https://github.com/googleapis/google-cloud-go/issues/7570)) ([499b489](https://github.com/googleapis/google-cloud-go/commit/499b489d8d6bc8db203c864db97f1462bbeff3d2)) +* **bigquery/migration:** Add request_source field and update formatting ([#7586](https://github.com/googleapis/google-cloud-go/issues/7586)) ([c967961](https://github.com/googleapis/google-cloud-go/commit/c967961ed95750e173af0193ec8d0974471f43ff)) +* **bigquery/reservation:** Add edition/autoscale related fields ([#7608](https://github.com/googleapis/google-cloud-go/issues/7608)) ([2b7bb66](https://github.com/googleapis/google-cloud-go/commit/2b7bb662eb00671b8ee933766f4254f897131a7c)) +* **bigquery/storage/managedwriter:** Decouple connections and writers ([#7314](https://github.com/googleapis/google-cloud-go/issues/7314)) ([7d085b4](https://github.com/googleapis/google-cloud-go/commit/7d085b4b25a29ff1a81164409fc68b8bcb5eacc4)) +* **bigquery/storage/managedwriter:** Introduce location routing header ([#7663](https://github.com/googleapis/google-cloud-go/issues/7663)) ([cf06802](https://github.com/googleapis/google-cloud-go/commit/cf068024f1066ee391191066039d7ba2668dd3f4)) + + +### Bug Fixes + +* **bigquery/storage/managedwriter:** Fix option propagation ([#7669](https://github.com/googleapis/google-cloud-go/issues/7669)) ([f684e16](https://github.com/googleapis/google-cloud-go/commit/f684e1610c51311c597763b5d1447c178173940a)) + + +### Documentation + +* **bigquery/reservation:** Mention that some fields are deprecated ([597ea0f](https://github.com/googleapis/google-cloud-go/commit/597ea0fe09bcea04e884dffe78add850edb2120d)) + +## [1.49.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.48.0...bigquery/v1.49.0) (2023-03-16) + + +### Features + +* **bigquery:** Add support for storage billing model ([#7510](https://github.com/googleapis/google-cloud-go/issues/7510)) ([0132ca9](https://github.com/googleapis/google-cloud-go/commit/0132ca9e43f979d0e164b31a1fde203694311b43)), refs [#6978](https://github.com/googleapis/google-cloud-go/issues/6978) +* **bigquery:** Update iam and longrunning deps ([91a1f78](https://github.com/googleapis/google-cloud-go/commit/91a1f784a109da70f63b96414bba8a9b4254cddd)) + +## [1.48.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.47.0...bigquery/v1.48.0) (2023-03-01) + + +### Features + +* **bigquery/connection:** Add cloud spanner connection properties - serverless analytics ([#7487](https://github.com/googleapis/google-cloud-go/issues/7487)) ([14771b1](https://github.com/googleapis/google-cloud-go/commit/14771b146b7add234183d0884ac822b2f05af0e5)) +* **bigquery/storage/managedwriter:** Mark managedwriter as GA ([#6804](https://github.com/googleapis/google-cloud-go/issues/6804)) ([3d3eeda](https://github.com/googleapis/google-cloud-go/commit/3d3eedacbaa209ac63f9ada17074620585d03726)) + +## [1.47.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.46.0...bigquery/v1.47.0) (2023-02-22) + + +### Features + +* **bigquery/storage:** Add default_value_expression to TableFieldSchema ([#7400](https://github.com/googleapis/google-cloud-go/issues/7400)) ([1244b3f](https://github.com/googleapis/google-cloud-go/commit/1244b3f63338ffe7af9051fd368b6b81ca63ff37)) +* **bigquery:** Add support for session in load jobs ([#7418](https://github.com/googleapis/google-cloud-go/issues/7418)) ([f9ff2ca](https://github.com/googleapis/google-cloud-go/commit/f9ff2ca3a01736b049873ff43005626e8c06e6b2)) + + +### Bug Fixes + +* **bigquery:** Avoid double-channel-close during context cancellation ([#7467](https://github.com/googleapis/google-cloud-go/issues/7467)) ([ca4b2ef](https://github.com/googleapis/google-cloud-go/commit/ca4b2efbda670566f2cfed4eacd559f31cf460ff)) + +## [1.46.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.45.0...bigquery/v1.46.0) (2023-02-06) + + +### Features + +* **bigquery:** Add dataset/table collation ([#7235](https://github.com/googleapis/google-cloud-go/issues/7235)) ([9f7bbeb](https://github.com/googleapis/google-cloud-go/commit/9f7bbeb466bd7572544c4178a33370a25b5f1496)) +* **bigquery:** Use storage api for query jobs ([#6822](https://github.com/googleapis/google-cloud-go/issues/6822)) ([26c04f4](https://github.com/googleapis/google-cloud-go/commit/26c04f4cd5083b4aa3c219500572d3af2f291645)) + + +### Bug Fixes + +* **bigquery:** Create/update an isolated dataset for collation feature ([#7256](https://github.com/googleapis/google-cloud-go/issues/7256)) ([b371558](https://github.com/googleapis/google-cloud-go/commit/b3715585aa6892fc41a29027694c72f31390441a)) +* **bigquery:** Fetch dst table for jobs when readings with Storage API ([#7325](https://github.com/googleapis/google-cloud-go/issues/7325)) ([0bf80d7](https://github.com/googleapis/google-cloud-go/commit/0bf80d72a893755adefdead900e8990ed53d9627)), refs [#7322](https://github.com/googleapis/google-cloud-go/issues/7322) + +## [1.45.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.44.0...bigquery/v1.45.0) (2023-01-05) + + +### Features + +* **bigquery/datapolicies:** Start generating apiv1 ([#7204](https://github.com/googleapis/google-cloud-go/issues/7204)) ([fd71cba](https://github.com/googleapis/google-cloud-go/commit/fd71cba7b6d5a015dcdb24b9eacc7fae1aa54c89)) +* **bigquery/datatransfer:** Add location methods ([06a54a1](https://github.com/googleapis/google-cloud-go/commit/06a54a16a5866cce966547c51e203b9e09a25bc0)) +* **bigquery:** Add REST client ([06a54a1](https://github.com/googleapis/google-cloud-go/commit/06a54a16a5866cce966547c51e203b9e09a25bc0)) +* **bigquery:** Rewrite signatures and type in terms of new location ([620e6d8](https://github.com/googleapis/google-cloud-go/commit/620e6d828ad8641663ae351bfccfe46281e817ad)) + +## [1.44.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.43.0...bigquery/v1.44.0) (2022-11-30) + + +### Features + +* **bigquery/datatransfer:** added Location API methods docs: updated comments ([22ec3e3](https://github.com/googleapis/google-cloud-go/commit/22ec3e3e727f8c0232059a5d31bccd12b7b5034c)) +* **bigquery/storage:** add missing_value_interpretations to AppendRowsRequest ([2a0b1ae](https://github.com/googleapis/google-cloud-go/commit/2a0b1aeb1683222e6aa5c876cb945845c00cef79)) +* **bigquery:** Add default partition expiration to Dataset ([#7096](https://github.com/googleapis/google-cloud-go/issues/7096)) ([601c77a](https://github.com/googleapis/google-cloud-go/commit/601c77a69a27b5f13ebb4508f8222a98c8a904bc)), refs [#7021](https://github.com/googleapis/google-cloud-go/issues/7021) +* **bigquery:** Remove code for reservation/apiv1beta1 ([#7010](https://github.com/googleapis/google-cloud-go/issues/7010)) ([451acc1](https://github.com/googleapis/google-cloud-go/commit/451acc1bfc04cc600ab3c1f50f5494e609e65ce2)) +* **bigquery:** Start generating proto stubs ([#7026](https://github.com/googleapis/google-cloud-go/issues/7026)) ([debc4c7](https://github.com/googleapis/google-cloud-go/commit/debc4c70786fece5d04d8cad9e9211c55a0a692f)) +* **bigquery:** Widen retry predicate ([#6976](https://github.com/googleapis/google-cloud-go/issues/6976)) ([753b751](https://github.com/googleapis/google-cloud-go/commit/753b75139f4b9e8593db5d45d8ab1e0cc8969350)) + + +### Bug Fixes + +* **bigquery/storage/managedwriter:** Remove old header routing ([#6960](https://github.com/googleapis/google-cloud-go/issues/6960)) ([434b407](https://github.com/googleapis/google-cloud-go/commit/434b407f4ba66247cb0a15288a2de8e76b691605)) + + +### Documentation + +* **bigquery/storage:** remove stale header guidance for AppendRows ([9c5d6c8](https://github.com/googleapis/google-cloud-go/commit/9c5d6c857b9deece4663d37fc6c834fd758b98ca)) + +## [1.43.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.42.0...bigquery/v1.43.0) (2022-10-24) + + +### Features + +* **bigquery/analyticshub:** rename nodejs analyticshub library package name ([52dddd1](https://github.com/googleapis/google-cloud-go/commit/52dddd1ed89fbe77e1859311c3b993a77a82bfc7)) +* **bigquery/storage/managedwriter:** Enable field name indirection ([#6247](https://github.com/googleapis/google-cloud-go/issues/6247)) ([1969273](https://github.com/googleapis/google-cloud-go/commit/19692735b0fbafa176d0315bda923528e1eedf6d)) +* **bigquery/storage/managedwriter:** Retry on FailedPrecondition ([#6761](https://github.com/googleapis/google-cloud-go/issues/6761)) ([d1a444d](https://github.com/googleapis/google-cloud-go/commit/d1a444d769c9578b586bef608d343b4b0abd3658)) +* **bigquery/storage/managedwriter:** Support append retries ([#6695](https://github.com/googleapis/google-cloud-go/issues/6695)) ([6ae9c67](https://github.com/googleapis/google-cloud-go/commit/6ae9c670a11d80b34872cb05fda933303b81851d)) +* **bigquery/storage/managedwriter:** Switch to opt-in retry ([#6765](https://github.com/googleapis/google-cloud-go/issues/6765)) ([a3e97a6](https://github.com/googleapis/google-cloud-go/commit/a3e97a6f15ad1989ef815b9bd5838192f9f226f1)) +* **bigquery:** Add remote function options to routine metadata ([#6702](https://github.com/googleapis/google-cloud-go/issues/6702)) ([d9a437d](https://github.com/googleapis/google-cloud-go/commit/d9a437de75a5f5151cd000d8f9a6b7fc567d8551)) + + +### Bug Fixes + +* **bigquery/storage/managedwriter:** Address possible resource leak ([#6775](https://github.com/googleapis/google-cloud-go/issues/6775)) ([979440b](https://github.com/googleapis/google-cloud-go/commit/979440b43573c1cfd744d3f63d0c633c7319ad46)) +* **bigquery:** Avoid stack overflow on query param with recursive types ([#6890](https://github.com/googleapis/google-cloud-go/issues/6890)) ([854ccfc](https://github.com/googleapis/google-cloud-go/commit/854ccfca259d747759d283fc0d0053893f3c8f8d)), refs [#6884](https://github.com/googleapis/google-cloud-go/issues/6884) +* **bigquery:** Bq connection auth scopes ([#6752](https://github.com/googleapis/google-cloud-go/issues/6752)) ([8e09288](https://github.com/googleapis/google-cloud-go/commit/8e09288185f721d90288c3aa873980fc44b98613)), refs [#6744](https://github.com/googleapis/google-cloud-go/issues/6744) + + +### Documentation + +* **bigquery/storage/managedwriter/adapt:** Typo in error string ([#6729](https://github.com/googleapis/google-cloud-go/issues/6729)) ([bb26153](https://github.com/googleapis/google-cloud-go/commit/bb26153d38475cd9784edbf241df84c368f5a166)) +* **bigquery/storage/managedwriter:** Add retry info to package docs ([#6803](https://github.com/googleapis/google-cloud-go/issues/6803)) ([81e52e5](https://github.com/googleapis/google-cloud-go/commit/81e52e59dcf3c4a44108e039fb0e3a0e2ce8284f)) + +## [1.42.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.41.0...bigquery/v1.42.0) (2022-09-21) + + +### Features + +* **bigquery/analyticshub:** Start generating apiv1 ([#6707](https://github.com/googleapis/google-cloud-go/issues/6707)) ([feb7d7d](https://github.com/googleapis/google-cloud-go/commit/feb7d7d4b85d51aef6798d87a6ba8e9c536d040c)) +* **bigquery/datapolicies:** Start generating apiv1beta1 ([#6697](https://github.com/googleapis/google-cloud-go/issues/6697)) ([f5443e8](https://github.com/googleapis/google-cloud-go/commit/f5443e81ae14e6aed2befe03c0df611bf5533b1f)) +* **bigquery/reservation/apiv1beta1:** add REST transport ([f7b0822](https://github.com/googleapis/google-cloud-go/commit/f7b082212b1e46ff2f4126b52d49618785c2e8ca)) +* **bigquery/storage/managedwriter:** Define append retry predicate ([#6650](https://github.com/googleapis/google-cloud-go/issues/6650)) ([478b8dd](https://github.com/googleapis/google-cloud-go/commit/478b8dd4e0d722cbf02fa2e216929eb561694fe0)) +* **bigquery/storage:** add proto annotation for non-ascii field mapping ([ec1a190](https://github.com/googleapis/google-cloud-go/commit/ec1a190abbc4436fcaeaa1421c7d9df624042752)) +* **bigquery:** Add reference file schema option for federated formats ([#6693](https://github.com/googleapis/google-cloud-go/issues/6693)) ([3d26091](https://github.com/googleapis/google-cloud-go/commit/3d26091bb8861ccfcc8d0a1727f8bbb9014ef866)) +* **bigquery:** Add support for explicit query parameter type ([#6596](https://github.com/googleapis/google-cloud-go/issues/6596)) ([d59b5b2](https://github.com/googleapis/google-cloud-go/commit/d59b5b2da7d1caa6622aec84b4004cf02fb4b066)), refs [#4704](https://github.com/googleapis/google-cloud-go/issues/4704) + + +### Bug Fixes + +* **bigquery/connection:** integrate gapic-generator-python-1.4.1 and enable more py_test targets ([ec1a190](https://github.com/googleapis/google-cloud-go/commit/ec1a190abbc4436fcaeaa1421c7d9df624042752)) + +## [1.41.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.40.0...bigquery/v1.41.0) (2022-09-14) + + +### Features + +* **bigquery/storage:** add location to WriteStream and add WriteStreamView support ([6a0080a](https://github.com/googleapis/google-cloud-go/commit/6a0080ad69398c572d856886293e19c79cf0fc0e)) + + +### Bug Fixes + +* **bigquery/storage/managedwriter:** Fix incorrect error retention ([#6659](https://github.com/googleapis/google-cloud-go/issues/6659)) ([dc02bca](https://github.com/googleapis/google-cloud-go/commit/dc02bca4ac14acb4f536f078a7d8f209626340bb)) +* **bigquery:** Parse timestamp query parameter with RFC3339 ([#6653](https://github.com/googleapis/google-cloud-go/issues/6653)) ([aabd2d6](https://github.com/googleapis/google-cloud-go/commit/aabd2d61c81ed598755656b4e7c3fd84dcd3b2d4)) + +## [1.40.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.39.0...bigquery/v1.40.0) (2022-09-08) + + +### ⚠ BREAKING CHANGES + +* **bigquery/dataexchange:** update BigQuery Analytics Hub API v1beta1 client BREAKING CHANGE: refresh current dataexchange/v1beta1/* directory to include recent change in protos. Removed common directory and use local enum Category fix!: refactor references to Category message docs: improve proto documentation. + +### Features + +* **bigquery/dataexchange:** update BigQuery Analytics Hub API v1beta1 client BREAKING CHANGE: refresh current dataexchange/v1beta1/* directory to include recent change in protos. Removed common directory and use local enum Category fix!: refactor references to Category message docs: improve proto documentation. ([e45ad9a](https://github.com/googleapis/google-cloud-go/commit/e45ad9af568c59151decc0dacedf137653b576dd)) +* **bigquery/storage/managedwriter:** Augment reconnection logic ([#6609](https://github.com/googleapis/google-cloud-go/issues/6609)) ([6b0ac0c](https://github.com/googleapis/google-cloud-go/commit/6b0ac0c400d2d5b26689176c71cc6db1db9b283f)) +* **bigquery:** Add trace instrumentation support for individual rpcs ([#6493](https://github.com/googleapis/google-cloud-go/issues/6493)) ([eedc632](https://github.com/googleapis/google-cloud-go/commit/eedc6327b845850d9d6109014a5d531dfbfa7d04)) +* **bigquery:** Improve error when reading null values ([#6566](https://github.com/googleapis/google-cloud-go/issues/6566)) ([e9a94c2](https://github.com/googleapis/google-cloud-go/commit/e9a94c2e52ca3d07bc15030cf411f7e1c5235d39)), refs [#2612](https://github.com/googleapis/google-cloud-go/issues/2612) + + +### Documentation + +* **bigquery:** Add numeric and bignumeric to RowIterator docs ([#6560](https://github.com/googleapis/google-cloud-go/issues/6560)) ([bea4028](https://github.com/googleapis/google-cloud-go/commit/bea4028a5fde6e790f70b0a98c33b81b3ad4023e)) + + +### Miscellaneous Chores + +* **bigquery:** Release 1.40.0 ([#6635](https://github.com/googleapis/google-cloud-go/issues/6635)) ([628deae](https://github.com/googleapis/google-cloud-go/commit/628deae4e0e0f4f1ae7e99433eefdc8f7cc41b41)) + +## [1.39.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.38.0...bigquery/v1.39.0) (2022-08-23) + + +### Features + +* **bigquery/storage:** allow users to set Apache Avro output format options through avro_serialization_options param in TableReadOptions message Through AvroSerializationOptions, users can set enable_display_name_attribute, which populates displayName for every avro field with the original column name Improved documentation for selected_fields, added example for clarity. ([41ab4ec](https://github.com/googleapis/google-cloud-go/commit/41ab4ec00552931b12f61a9fcb27b36a7c0b5d77)) +* **bigquery:** add PreserveAsciiControlCharacters support for CSV ([#6448](https://github.com/googleapis/google-cloud-go/issues/6448)) ([b7bac2f](https://github.com/googleapis/google-cloud-go/commit/b7bac2fbf63c2a681da6fdbf5af217bf8de1455f)) +* **bigquery:** add preview support for default values ([#6464](https://github.com/googleapis/google-cloud-go/issues/6464)) ([edc3be5](https://github.com/googleapis/google-cloud-go/commit/edc3be586f9e8b65c34318773f5c55e1a4ccb07b)) + +## [1.38.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.37.0...bigquery/v1.38.0) (2022-08-12) + + +### Features + +* **bigquery/migration:** Add MySQL dialect to bigquerymigration v2 client library ([370e23e](https://github.com/googleapis/google-cloud-go/commit/370e23eaa342a7055a8d8b6f8fe9420f83afe43e)) +* **bigquery/storage/managedwriter:** improve error communication ([#6360](https://github.com/googleapis/google-cloud-go/issues/6360)) ([b30d89d](https://github.com/googleapis/google-cloud-go/commit/b30d89d5bd4a8ce553a328abb4b78f8fc51b43f0)) + + +### Bug Fixes + +* **bigquery/storage/managedwriter:** propagate calloptions to append ([#6488](https://github.com/googleapis/google-cloud-go/issues/6488)) ([c65f9da](https://github.com/googleapis/google-cloud-go/commit/c65f9dab8118295e49a7b863f59cb64ace4c2d5b)) + +## [1.37.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.36.0...bigquery/v1.37.0) (2022-08-04) + + +### Features + +* **bigquery/connection:** Add service_account_id output field to CloudSQL properties ([1d6fbcc](https://github.com/googleapis/google-cloud-go/commit/1d6fbcc6406e2063201ef5a98de560bf32f7fb73)) +* **bigquery/storage/managedwriter:** refactor AppendResponse ([#6402](https://github.com/googleapis/google-cloud-go/issues/6402)) ([c07bca2](https://github.com/googleapis/google-cloud-go/commit/c07bca2d65ec9903ba0c592da11440cebe8b7d9e)) +* **bigquery:** support JSON as a data type ([#5986](https://github.com/googleapis/google-cloud-go/issues/5986)) ([835fe4f](https://github.com/googleapis/google-cloud-go/commit/835fe4fe59f4a3c64c5762a530228d5369618897)) + + +### Bug Fixes + +* **bigquery:** include user_email field when requesting job information ([#6256](https://github.com/googleapis/google-cloud-go/issues/6256)) ([da42b4e](https://github.com/googleapis/google-cloud-go/commit/da42b4e05faa067b5afa0a9a479d1db72296948e)) + + +### Documentation + +* **bigquery/storage:** clarify size limitations for AppendRowsRequest chore: add preferred_min_stream_count to CreateReadSessionRequest chore: add write_stream to AppendRowsResponse ([1d6fbcc](https://github.com/googleapis/google-cloud-go/commit/1d6fbcc6406e2063201ef5a98de560bf32f7fb73)) + +## [1.36.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.35.0...bigquery/v1.36.0) (2022-07-18) + + +### Features + +* **bigquery/migration:** Add Presto dialect to bigquerymigration v2 client library ([89a049a](https://github.com/googleapis/google-cloud-go/commit/89a049a98e1d18b922cc6ad08622161448544902)) +* **bigquery/storage/managedwriter/adapt:** support packed field option ([#6312](https://github.com/googleapis/google-cloud-go/issues/6312)) ([fc3417b](https://github.com/googleapis/google-cloud-go/commit/fc3417be70cd01a0044ec934c5c6426ea833d90c)) + + +### Bug Fixes + +* **bigquery/storage/managedwriter:** improve network reconnection ([#6338](https://github.com/googleapis/google-cloud-go/issues/6338)) ([085a038](https://github.com/googleapis/google-cloud-go/commit/085a03865d20122c74e107ea43883ae33bdf25bc)) + +## [1.35.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.34.1...bigquery/v1.35.0) (2022-07-07) + + +### Features + +* **bigquery:** start generating REST client for beta clients ([25b7775](https://github.com/googleapis/google-cloud-go/commit/25b77757c1e6f372e03bf99ab7461264bba48d26)) + + +### Bug Fixes + +* **bigquery/storage/managedstorage:** improve internal locking ([#6304](https://github.com/googleapis/google-cloud-go/issues/6304)) ([a2925ce](https://github.com/googleapis/google-cloud-go/commit/a2925ce2f96c538d3994e2d0cef49fbcdd727217)) +* **bigquery/storage/managedwriter/adapt:** schema->protodescriptor ([#6267](https://github.com/googleapis/google-cloud-go/issues/6267)) ([a017230](https://github.com/googleapis/google-cloud-go/commit/a01723055cb7604047c4fddd7d00213d800e4122)), refs [#6258](https://github.com/googleapis/google-cloud-go/issues/6258) +* **bigquery/storage:** Modify client lib retry policy for CreateWriteStream with longer backoff, more error code and longer overall time ([199b725](https://github.com/googleapis/google-cloud-go/commit/199b7250f474b1a6f53dcf0aac0c2966f4987b68)) + +## [1.34.1](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.34.0...bigquery/v1.34.1) (2022-06-23) + + +### Bug Fixes + +* **bigquery:** release 1.34.1 ([#6251](https://github.com/googleapis/google-cloud-go/issues/6251)) ([c742b0e](https://github.com/googleapis/google-cloud-go/commit/c742b0ee644246162acaa964fc2a65eef392846f)) + +## [1.34.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.33.0...bigquery/v1.34.0) (2022-06-23) + + +### Features + +* **bigquery/storage:** add fields to eventually contain row level errors ([5fe3b1d](https://github.com/googleapis/google-cloud-go/commit/5fe3b1d946db991aebdfd279f6f3b06b8baec205)) + + +### Bug Fixes + +* **bigquery/storage/managedwriter:** address locking and schema updates ([#6243](https://github.com/googleapis/google-cloud-go/issues/6243)) ([fe264a5](https://github.com/googleapis/google-cloud-go/commit/fe264a5ccfe5b13f6b7215d66a04282f5e38457f)) + +## [1.33.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.32.0...bigquery/v1.33.0) (2022-06-16) + + +### Features + +* **bigquery/migration:** Add SQL Server dialect to bigquerymigration v2 client library ([90489b1](https://github.com/googleapis/google-cloud-go/commit/90489b10fd7da4cfafe326e00d1f4d81570147f7)) +* **bigquery/storage/managedwriter/adapt:** support proto3 presence ([#6021](https://github.com/googleapis/google-cloud-go/issues/6021)) ([2984600](https://github.com/googleapis/google-cloud-go/commit/29846003d4bebb1a07ac11cac462ae65cb0bc59c)) +* **bigquery/storage/managedwriter:** improve proto3 normalization ([#6082](https://github.com/googleapis/google-cloud-go/issues/6082)) ([6a742ff](https://github.com/googleapis/google-cloud-go/commit/6a742ffb16da991a0bf2df37218dc40af5ee0011)) +* **bigquery:** add support for dataset tags ([#6114](https://github.com/googleapis/google-cloud-go/issues/6114)) ([1f35044](https://github.com/googleapis/google-cloud-go/commit/1f35044894c7395326d7a5b787a2406d5cd92cb1)) +* **bigquery:** support partial projection of table metadata ([#6186](https://github.com/googleapis/google-cloud-go/issues/6186)) ([507a2be](https://github.com/googleapis/google-cloud-go/commit/507a2be8e4fda152d517dcb972be6353a6da2914)) + + +### Bug Fixes + +* **bigquery/dataexchange:** Include common protos in google-cloud-bigquery-data_exchange-v1beta1 ([6ef576e](https://github.com/googleapis/google-cloud-go/commit/6ef576e2d821d079e7b940cd5d49fe3ca64a7ba2)) + +## [1.32.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.31.0...bigquery/v1.32.0) (2022-05-06) + + +### Features + +* **bigquery:** add interval support ([#5907](https://github.com/googleapis/google-cloud-go/issues/5907)) ([9e979c9](https://github.com/googleapis/google-cloud-go/commit/9e979c9718df1de440d440e4c3e20bb3cb8c5aa1)) +* **bigquery:** expose connections and schema autodetect modifier ([#5739](https://github.com/googleapis/google-cloud-go/issues/5739)) ([c72e34f](https://github.com/googleapis/google-cloud-go/commit/c72e34fd79990eedaa56ed9e5121ab1a7fc4e2da)) + +## [1.31.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.30.2...bigquery/v1.31.0) (2022-04-12) + + +### Features + +* **bigquery/storage:** Deprecate format specific `row_count` field in Read API ([57896d1](https://github.com/googleapis/google-cloud-go/commit/57896d1491c04fa53d3f3e2344ef10c3d91c4b65)) +* **bigquery:** enhance SchemaFromJSON ([#5877](https://github.com/googleapis/google-cloud-go/issues/5877)) ([16289f0](https://github.com/googleapis/google-cloud-go/commit/16289f086ae15ea18c70d387b542796e099d4a09)) +* **bigquery:** support table cloning ([#5672](https://github.com/googleapis/google-cloud-go/issues/5672)) ([74c120a](https://github.com/googleapis/google-cloud-go/commit/74c120a81d2181d9809e5d3c0462bd859297d073)) + +### [1.30.2](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.30.1...bigquery/v1.30.2) (2022-03-30) + + +### Bug Fixes + +* **bigquery/storage/managedwriter/adapt:** fix enum append ([#5819](https://github.com/googleapis/google-cloud-go/issues/5819)) ([9eeaf0f](https://github.com/googleapis/google-cloud-go/commit/9eeaf0fe9de6e9583a6994e49f95ad524bc9e68e)) + +### [1.30.1](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.30.0...bigquery/v1.30.1) (2022-03-30) + + +### Bug Fixes + +* **bigquery/storage/managedwriter:** correct enum processing in NormalizeDescriptor ([#5811](https://github.com/googleapis/google-cloud-go/issues/5811)) ([52cf48e](https://github.com/googleapis/google-cloud-go/commit/52cf48edff487352c2755de86e2ea069b1b29617)) +* **bigquery:** improve retry for table create ([#5807](https://github.com/googleapis/google-cloud-go/issues/5807)) ([f27d1dc](https://github.com/googleapis/google-cloud-go/commit/f27d1dc43acbd437f517c05d65c992644f3f3111)) + +## [1.30.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.29.0...bigquery/v1.30.0) (2022-03-16) + + +### Features + +* **bigquery:** support authorized datasets ([#5666](https://github.com/googleapis/google-cloud-go/issues/5666)) ([859048e](https://github.com/googleapis/google-cloud-go/commit/859048e491dd840c9aea218fa670ed2fb46d78e2)) + + +### Bug Fixes + +* **bigquery:** Query.Read fails with dry-run queries ([#5753](https://github.com/googleapis/google-cloud-go/issues/5753)) ([e279584](https://github.com/googleapis/google-cloud-go/commit/e279584727e2a496b3d566ed6f6683715a594a6d)) + +## [1.29.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.28.0...bigquery/v1.29.0) (2022-03-02) + + +### Features + +* **bigquery/storage/managedwriter/adapt:** handle oneof normalization ([#5670](https://github.com/googleapis/google-cloud-go/issues/5670)) ([c7f54d8](https://github.com/googleapis/google-cloud-go/commit/c7f54d81baa34ce0f31bbe0af1cb03c2598e5e74)) +* **bigquery/storage/managedwriter:** minor ease-of-use improvements ([#5660](https://github.com/googleapis/google-cloud-go/issues/5660)) ([d253c24](https://github.com/googleapis/google-cloud-go/commit/d253c24fd61f181971056ba00749efd69b3ae691)) +* **bigquery/storage:** add trace_id for Read API ([080adb0](https://github.com/googleapis/google-cloud-go/commit/080adb0b855289ddbd86ac9e5e6eb236673f6884)) +* **bigquery:** add job timeout support ([#5707](https://github.com/googleapis/google-cloud-go/issues/5707)) ([868363c](https://github.com/googleapis/google-cloud-go/commit/868363cbc68c655d4c1f8959280cf1acba5073a7)) +* **bigquery:** set versionClient to module version ([55f0d92](https://github.com/googleapis/google-cloud-go/commit/55f0d92bf112f14b024b4ab0076c9875a17423c9)) + + +### Bug Fixes + +* **bigquery/storage:** remove bigquery.readonly auth scope ([5af548b](https://github.com/googleapis/google-cloud-go/commit/5af548bee4ffde279727b2e1ad9b072925106a74)) + +## [1.28.0](https://github.com/googleapis/google-cloud-go/compare/bigquery/v1.27.0...bigquery/v1.28.0) (2022-02-14) + + +### Features + +* **bigquery/datatransfer:** add owner email to TransferConfig message feat: allow customer to enroll a datasource programmatically docs: improvements to various message and field descriptions ([f560b1e](https://github.com/googleapis/google-cloud-go/commit/f560b1ed0263956ef84fbf2fbf34bdc66dbc0a88)) +* **bigquery:** add better version metadata to calls ([d1ad921](https://github.com/googleapis/google-cloud-go/commit/d1ad921d0322e7ce728ca9d255a3cf0437d26add)) + + +### Bug Fixes + +* **bigquery/storage/managedwriter:** address possible panic due to flow ([#5436](https://github.com/googleapis/google-cloud-go/issues/5436)) ([50c6e38](https://github.com/googleapis/google-cloud-go/commit/50c6e38c2798b3d4f2a9560239753ecd04502273)) +* **bigquery/storage/managedwriter:** append improvements ([#5465](https://github.com/googleapis/google-cloud-go/issues/5465)) ([aa167bd](https://github.com/googleapis/google-cloud-go/commit/aa167bd5e57facb0f0d6834ab65805956e4ef08c)) + +## [1.27.0](https://www.github.com/googleapis/google-cloud-go/compare/bigquery/v1.26.0...bigquery/v1.27.0) (2022-01-24) + + +### Features + +* **bigquery:** augment retry predicate ([#5387](https://www.github.com/googleapis/google-cloud-go/issues/5387)) ([f9608d4](https://www.github.com/googleapis/google-cloud-go/commit/f9608d4622c56362b2ed0a5845b8fe27f81995aa)) +* **bigquery:** support null marker for csv in external data config ([#5287](https://www.github.com/googleapis/google-cloud-go/issues/5287)) ([132904a](https://www.github.com/googleapis/google-cloud-go/commit/132904a061809ba7117c51e8a8000f1adac34e48)) + +## [1.26.0](https://www.github.com/googleapis/google-cloud-go/compare/bigquery/v1.25.0...bigquery/v1.26.0) (2022-01-04) + + +### Features + +* **bigquery/reservation:** increase the logical timeout (retry deadline) to 5 minutes ([5444809](https://www.github.com/googleapis/google-cloud-go/commit/5444809e0b7cf9f5416645ea2df6fec96f8b9023)) +* **bigquery/storage/managedwriter:** support schema change notification ([#5253](https://www.github.com/googleapis/google-cloud-go/issues/5253)) ([70e40db](https://www.github.com/googleapis/google-cloud-go/commit/70e40db88bc016f228a425da1e278fc76dbf2e36)) +* **bigquery/storage:** add write_mode support for BigQuery Storage Write API v1 ([615b42b](https://www.github.com/googleapis/google-cloud-go/commit/615b42bbb549b6fd3e8b1ba751bc109f79a5575b)) + +## [1.25.0](https://www.github.com/googleapis/google-cloud-go/compare/bigquery/v1.24.0...bigquery/v1.25.0) (2021-12-02) + + +### ⚠ BREAKING CHANGES + +* **bigquery/storage/managedwriter:** changes function signatures to add variadic call options + +### Features + +* **bigquery/storage/managedwriter:** extend managedstream to support call options ([#5078](https://www.github.com/googleapis/google-cloud-go/issues/5078)) ([fbc2717](https://www.github.com/googleapis/google-cloud-go/commit/fbc2717ec84b1c5557873efaa732c047da66c1e6)) +* **bigquery/storage/managedwriter:** improve method parity in managedwriter ([#5007](https://www.github.com/googleapis/google-cloud-go/issues/5007)) ([a2af4de](https://www.github.com/googleapis/google-cloud-go/commit/a2af4de215a42848368ec3081263d34782032caa)) +* **bigquery/storage/managedwriter:** support variadic appends ([#5102](https://www.github.com/googleapis/google-cloud-go/issues/5102)) ([014b314](https://www.github.com/googleapis/google-cloud-go/commit/014b314b2db70147a26120a1d54a6bc7142d5665)) +* **bigquery:** add BI Engine information to query statistics ([#5081](https://www.github.com/googleapis/google-cloud-go/issues/5081)) ([b78c89b](https://www.github.com/googleapis/google-cloud-go/commit/b78c89b18a81ce155441554cb5455600168eb8fd)) +* **bigquery:** add support for AvroOptions in external data config ([#4945](https://www.github.com/googleapis/google-cloud-go/issues/4945)) ([8844e40](https://www.github.com/googleapis/google-cloud-go/commit/8844e40b7c2a7347e174587ea2cf438a6da9e16f)) +* **bigquery:** allow construction of jobs from other projects ([#5048](https://www.github.com/googleapis/google-cloud-go/issues/5048)) ([6d07eca](https://www.github.com/googleapis/google-cloud-go/commit/6d07eca680362807f6dd870ba9df8c26256601ab)) +* **bigquery:** expose identifiers using a variety of formats ([#5017](https://www.github.com/googleapis/google-cloud-go/issues/5017)) ([c9cd984](https://www.github.com/googleapis/google-cloud-go/commit/c9cd9846b6707d236648d33d44434e64eced9cdd)) + + +### Bug Fixes + +* **bigquery/migration:** correct python namespace for migration API Committer: [@shollyman](https://www.github.com/shollyman) ([8c5c6cf](https://www.github.com/googleapis/google-cloud-go/commit/8c5c6cf9df046b67998a8608d05595bd9e34feb0)) +* **bigquery/storage/managedwriter:** correctly copy request ([#5122](https://www.github.com/googleapis/google-cloud-go/issues/5122)) ([cd43a5c](https://www.github.com/googleapis/google-cloud-go/commit/cd43a5cde5e4e388266f3773f206ead90d666261)) +* **bigquery:** address one other callsite for the job construction feature ([#5059](https://www.github.com/googleapis/google-cloud-go/issues/5059)) ([98779eb](https://www.github.com/googleapis/google-cloud-go/commit/98779eba0f1f95b195aa6194210208767c169f5e)) + + +### Miscellaneous Chores + +* **bigquery:** release 1.25.0 ([#5128](https://www.github.com/googleapis/google-cloud-go/issues/5128)) ([f58a9f7](https://www.github.com/googleapis/google-cloud-go/commit/f58a9f7b88e2ce6101cb4bd3c85c267a688a1a1d)) +* **bigquery:** release 1.25.0 ([#5177](https://www.github.com/googleapis/google-cloud-go/issues/5177)) ([359f5b1](https://www.github.com/googleapis/google-cloud-go/commit/359f5b1ca118ff6f92603da083eb943b672ed779)) + +## [1.24.0](https://www.github.com/googleapis/google-cloud-go/compare/bigquery/v1.23.0...bigquery/v1.24.0) (2021-09-27) + + +### Features + +* **bigquery/migration:** Add PAUSED state to Subtask and add task details protos ([bddab08](https://www.github.com/googleapis/google-cloud-go/commit/bddab08dfd0b9a0a79b113a46a0dd84dba1f3d3b)) + + +### Bug Fixes + +* **bigquery/storage:** add missing read api retry setting on SplitReadStream ([797a9bd](https://www.github.com/googleapis/google-cloud-go/commit/797a9bdcb68c0c3ff7eef04cd3a3a0747937975b)) + +## [1.23.0](https://www.github.com/googleapis/google-cloud-go/compare/bigquery/v1.22.0...bigquery/v1.23.0) (2021-09-23) + + +### Features + +* **bigquery/reservation:** + * Deprecated SearchAssignments in favor of SearchAllAssignments + * feat: Reservation objects now contain a creation time and an update time + * feat: Added commitment_start_time to capacity commitments + * feat: Force deleting capacity commitments is allowed while reservations with active assignments exist + * feat: ML_EXTERNAL job type is supported + * feat: Optional id can be passed into CreateCapacityCommitment and CreateAssignment + * docs: Clarified docs for None assignments + * fix!: Fixed pattern for BiReservation object BREAKING_CHANGE: Changed from `bireservation` to `biReservation` + * ([d9ce9d0](https://www.github.com/googleapis/google-cloud-go/commit/d9ce9d0ee64f59c4e07ce4752bfd721051a95ac7)) +* **bigquery/storage/managedwriter:** BREAKING CHANGE: changeAppendRows behavior ([#4729](https://github.com/googleapis/google-cloud-go/pull/4729)) +* **bigquery/storage:** add BigQuery Storage Write API v1 ([e52c204](https://www.github.com/googleapis/google-cloud-go/commit/e52c2042a2b7cdd7dd799a561421f32fecc5d1d2)) +* **bigquery/storage:** migrate managedwriter to v1 write from v1beta2 ([#4788](https://github.com/googleapis/google-cloud-go/pull/4788)) +* **bigquery:** add session and connection support ([#4754](https://www.github.com/googleapis/google-cloud-go/issues/4754)) ([e846dfd](https://www.github.com/googleapis/google-cloud-go/commit/e846dfdefbba88320088667525e5fdd966c80c4b)) +* **bigquery:** expose the query source of a rowiterator via SourceJob() ([#4748](https://github.com/googleapis/google-cloud-go/pull/4748)) + +## [1.22.0](https://www.github.com/googleapis/google-cloud-go/compare/bigquery/v1.21.0...bigquery/v1.22.0) (2021-08-30) + + +### Features + +* **bigquery/storage/managedwriter/adapt:** add NormalizeDescriptor ([#4681](https://www.github.com/googleapis/google-cloud-go/issues/4681)) ([c54aa74](https://www.github.com/googleapis/google-cloud-go/commit/c54aa74f7a0574cbbe3f65dc90b96cf5a0b1aa88)) +* **bigquery/storage/managedwriter:** more metrics instrumentation ([#4690](https://www.github.com/googleapis/google-cloud-go/issues/4690)) ([9505384](https://www.github.com/googleapis/google-cloud-go/commit/9505384b2c771d7d0c95f7786744bdf76174c706)) + +## [1.21.0](https://www.github.com/googleapis/google-cloud-go/compare/bigquery/v1.20.1...bigquery/v1.21.0) (2021-08-16) + + +### Features + +* **bigquery/storage/managedwriter:** add project autodetection ([#4605](https://www.github.com/googleapis/google-cloud-go/issues/4605)) ([d8cc9be](https://www.github.com/googleapis/google-cloud-go/commit/d8cc9be6f0314f585f708638834abfc209799724)) +* **bigquery/storage/managedwriter:** improve protobuf support ([#4589](https://www.github.com/googleapis/google-cloud-go/issues/4589)) ([a455082](https://www.github.com/googleapis/google-cloud-go/commit/a45508272a730e0ad81021695d2d8564e7c81631)) +* **bigquery/storage/managedwriter:** more instrumentation support ([#4601](https://www.github.com/googleapis/google-cloud-go/issues/4601)) ([ff488c8](https://www.github.com/googleapis/google-cloud-go/commit/ff488c86b9c1a1f02397bb579905fa049e59ac05)) +* **bigquery:** switch to centralized project autodetect logic ([#4625](https://www.github.com/googleapis/google-cloud-go/issues/4625)) ([18ff070](https://www.github.com/googleapis/google-cloud-go/commit/18ff070b8baa3ed7d324ca9ea00dcd66d7742340)) + + +### Bug Fixes + +* **bigquery/storage/managedwriter:** support non-default regions ([#4566](https://www.github.com/googleapis/google-cloud-go/issues/4566)) ([68418f9](https://www.github.com/googleapis/google-cloud-go/commit/68418f9e340def179eb5556aea433c0d07000b79)) + +### [1.20.1](https://www.github.com/googleapis/google-cloud-go/compare/bigquery/v1.20.0...bigquery/v1.20.1) (2021-08-06) + + +### Bug Fixes + +* **bigquery/storage/managedwriter:** fix flowcontroller double-release ([#4555](https://www.github.com/googleapis/google-cloud-go/issues/4555)) ([67facd9](https://www.github.com/googleapis/google-cloud-go/commit/67facd9697e931e193f3cd8e188f1dd819ba31eb)) + +## [1.20.0](https://www.github.com/googleapis/google-cloud-go/compare/bigquery/v1.19.0...bigquery/v1.20.0) (2021-07-30) + + +### Features + +* **bigquery/connection:** add cloud spanner connection support ([458f15b](https://www.github.com/googleapis/google-cloud-go/commit/458f15bb6f1193ce83dbfc7a82c3f2a672f52c06)) +* **bigquery/storage/managedwriter/adapt:** add schema -> proto support ([#4375](https://www.github.com/googleapis/google-cloud-go/issues/4375)) ([4ff6243](https://www.github.com/googleapis/google-cloud-go/commit/4ff62433f58c1c92976a66e890b7d5394198f77b)) +* **bigquery/storage/managedwriter:** add append stream plumbing ([#4452](https://www.github.com/googleapis/google-cloud-go/issues/4452)) ([b085384](https://www.github.com/googleapis/google-cloud-go/commit/b0853846a34a32ca45deb92a3cc6ab843473acd8)) +* **bigquery/storage/managedwriter:** add base client ([#4422](https://www.github.com/googleapis/google-cloud-go/issues/4422)) ([4f7193b](https://www.github.com/googleapis/google-cloud-go/commit/4f7193b74f4b1954cf7b664d61b5cc9805337e84)) +* **bigquery/storage/managedwriter:** add flow controller ([#4404](https://www.github.com/googleapis/google-cloud-go/issues/4404)) ([9dc78e0](https://www.github.com/googleapis/google-cloud-go/commit/9dc78e073b5f69037c6328460554c4354fcee11f)) +* **bigquery/storage/managedwriter:** add opencensus instrumentation ([#4512](https://www.github.com/googleapis/google-cloud-go/issues/4512)) ([73b6f5e](https://www.github.com/googleapis/google-cloud-go/commit/73b6f5e012d0b89d36850cb986fd7e288bf1e3c5)) +* **bigquery/storage/managedwriter:** add state tracking ([#4407](https://www.github.com/googleapis/google-cloud-go/issues/4407)) ([4638e17](https://www.github.com/googleapis/google-cloud-go/commit/4638e17dacd1fa76f9976f44974c4037fe4358dc)) +* **bigquery/storage/managedwriter:** naming and doc improvements ([#4508](https://www.github.com/googleapis/google-cloud-go/issues/4508)) ([663c899](https://www.github.com/googleapis/google-cloud-go/commit/663c899c3b8aa751527d24f541d964f2ba91a233)) +* **bigquery/storage/managedwriter:** wire in flow controller ([#4501](https://www.github.com/googleapis/google-cloud-go/issues/4501)) ([40571fa](https://www.github.com/googleapis/google-cloud-go/commit/40571fa0e3b5ab326fd592a6907061c2304893aa)) +* **bigquery:** add more dml statistics to query statistics ([#4405](https://www.github.com/googleapis/google-cloud-go/issues/4405)) ([99d5728](https://www.github.com/googleapis/google-cloud-go/commit/99d57282f6668de91390ad29a888a89209689f39)) +* **bigquery:** support decimalTargetType prioritization ([#4343](https://www.github.com/googleapis/google-cloud-go/issues/4343)) ([95a27f7](https://www.github.com/googleapis/google-cloud-go/commit/95a27f711a1c7dfdaa16ae5d3c52644769b6fc39)) +* **bigquery:** support multistatement transaction statistics in jobs ([#4485](https://www.github.com/googleapis/google-cloud-go/issues/4485)) ([4565eb7](https://www.github.com/googleapis/google-cloud-go/commit/4565eb7fe730eade294fb3baa85bd255df008bfa)) + + +### Bug Fixes + +* **bigquery/storage/managedwriter:** fix double-close error, add tests ([#4502](https://www.github.com/googleapis/google-cloud-go/issues/4502)) ([c6cf659](https://www.github.com/googleapis/google-cloud-go/commit/c6cf6590a41368885b7399c993c47dc965862558)) + +## [1.19.0](https://www.github.com/googleapis/google-cloud-go/compare/bigquery/v1.18.0...bigquery/v1.19.0) (2021-06-29) + + +### Features + +* **bigquery/storage:** Add ZSTD compression as an option for Arrow. ([770db30](https://www.github.com/googleapis/google-cloud-go/commit/770db3083270d485d265362fe5a4b2a1b23619ff)) +* **bigquery/storage:** remove alpha client ([#4100](https://www.github.com/googleapis/google-cloud-go/issues/4100)) ([a2d137d](https://www.github.com/googleapis/google-cloud-go/commit/a2d137d233e7a401976fbe1fd8ff81145dda515d)), refs [#4098](https://www.github.com/googleapis/google-cloud-go/issues/4098) +* **bigquery:** add support for parameterized types ([#4103](https://www.github.com/googleapis/google-cloud-go/issues/4103)) ([a2330e4](https://www.github.com/googleapis/google-cloud-go/commit/a2330e4d66c0a1832fb3b9e23a33c006c9345c28)) +* **bigquery:** add support for snapshot/restore ([#4112](https://www.github.com/googleapis/google-cloud-go/issues/4112)) ([4c12b42](https://www.github.com/googleapis/google-cloud-go/commit/4c12b424eec06c7d87244eaa922995bbe6e46e7e)) +* **bigquery:** add support for user defined TVF ([#4043](https://www.github.com/googleapis/google-cloud-go/issues/4043)) ([37607b4](https://www.github.com/googleapis/google-cloud-go/commit/37607b4afbc4c42baa4a931a9a86cddcc6d885ca)) +* **bigquery:** enable project autodetection, expose project ids further ([#4312](https://www.github.com/googleapis/google-cloud-go/issues/4312)) ([267787e](https://www.github.com/googleapis/google-cloud-go/commit/267787eb245d9307cf78304c1ce34bdfb2aaf5ab)) +* **bigquery:** support job deletion ([#3935](https://www.github.com/googleapis/google-cloud-go/issues/3935)) ([363ba03](https://www.github.com/googleapis/google-cloud-go/commit/363ba03e1c3c813749a65ff3c050877ce4f60016)) +* **bigquery:** support nullable params and geography params ([#4225](https://www.github.com/googleapis/google-cloud-go/issues/4225)) ([43755d3](https://www.github.com/googleapis/google-cloud-go/commit/43755d38b5d928222127cc6be26183d6bfbb1cb4)) + + +### Bug Fixes + +* **bigquery:** minor rename to feature that's not yet in a release ([#4320](https://www.github.com/googleapis/google-cloud-go/issues/4320)) ([ef8d138](https://www.github.com/googleapis/google-cloud-go/commit/ef8d1386149cff28ae6258ab167789bae6af6407)) +* **bigquery:** update streaming insert error test ([#4321](https://www.github.com/googleapis/google-cloud-go/issues/4321)) ([12f3042](https://www.github.com/googleapis/google-cloud-go/commit/12f3042716d51fb0d7a23071d00a20f9751bac91)) + +## [1.18.0](https://www.github.com/googleapis/google-cloud-go/compare/bigquery/v1.17.0...bigquery/v1.18.0) (2021-05-06) + + +### Features + +* **bigquery/storage:** new JSON type through BigQuery Write ([9029071](https://www.github.com/googleapis/google-cloud-go/commit/90290710158cf63de918c2d790df48f55a23adc5)) +* **bigquery:** augment retry predicate to support additional errors ([#4046](https://www.github.com/googleapis/google-cloud-go/issues/4046)) ([d4af6f7](https://www.github.com/googleapis/google-cloud-go/commit/d4af6f7707b3c5ee12cde53c7485a9b743034119)) +* **bigquery:** expose ParquetOptions for loads and external tables ([#4016](https://www.github.com/googleapis/google-cloud-go/issues/4016)) ([f9c4ccb](https://www.github.com/googleapis/google-cloud-go/commit/f9c4ccb6efb271c421edf3f67d5249b1cfb0ecb2)) +* **bigquery:** support mutable clustering configuration ([#3950](https://www.github.com/googleapis/google-cloud-go/issues/3950)) ([0ab30da](https://www.github.com/googleapis/google-cloud-go/commit/0ab30dadc43ae85354dc12a4130ecfcc56273882)) + +## [1.17.0](https://www.github.com/googleapis/google-cloud-go/compare/bigquery/v1.15.0...bigquery/v1.17.0) (2021-04-08) + + +### Features + +* **bigquery/storage:** add a Arrow compression options (Only LZ4 for now). feat: Return schema on first ReadRowsResponse. doc: clarify limit on filter string. ([2b02a03](https://www.github.com/googleapis/google-cloud-go/commit/2b02a03ff9f78884da5a8e7b64a336014c61bde7)) +* **bigquery/storage:** deprecate bigquery storage v1alpha2 API ([9cc6d2c](https://www.github.com/googleapis/google-cloud-go/commit/9cc6d2cce96235b0a144c1c6b48eff496f9e5fa7)) +* **bigquery/storage:** updates for v1beta2 storage API - Updated comments on BatchCommitWriteStreams - Added new support Bigquery types BIGNUMERIC and INTERVAL to TableSchema - Added read rows schema in ReadRowsResponse - Misc comment updates ([48b4e59](https://www.github.com/googleapis/google-cloud-go/commit/48b4e596206cef879194d2888186d603a6f51292)) +* **bigquery:** export HivePartitioningOptions in load job configurations ([#3877](https://www.github.com/googleapis/google-cloud-go/issues/3877)) ([7c759be](https://www.github.com/googleapis/google-cloud-go/commit/7c759be074ce1f6b8ccce88c86dbe49bd38fd6b5)) +* **bigquery:** support type alias names for numeric/bignumeric schemas. ([#3760](https://www.github.com/googleapis/google-cloud-go/issues/3760)) ([2ee6bf4](https://www.github.com/googleapis/google-cloud-go/commit/2ee6bf451524fc1f9735634320a55ca0b07d3d8b)) + +## v1.16.0 + +- Updates to various dependencies. + +## [1.15.0](https://www.github.com/googleapis/google-cloud-go/compare/bigquery/v1.14.0...v1.15.0) (2021-01-14) + + +### Features + +* **bigquery:** add reservation usage stats to query statistics ([#3403](https://www.github.com/googleapis/google-cloud-go/issues/3403)) ([112bcde](https://www.github.com/googleapis/google-cloud-go/commit/112bcdeb7cee1b44f337d3e5398a0d0820e93162)) +* **bigquery:** add support for allowing Javascript UDFs to indicate determinism ([#3534](https://www.github.com/googleapis/google-cloud-go/issues/3534)) ([2f417a3](https://www.github.com/googleapis/google-cloud-go/commit/2f417a39d93402fbb1e5e3001645019782d7d656)), refs [#3533](https://www.github.com/googleapis/google-cloud-go/issues/3533) + + +### Bug Fixes + +* **bigquery:** address possible panic due to offset checking in handleInsertErrors ([#3524](https://www.github.com/googleapis/google-cloud-go/issues/3524)) ([5288511](https://www.github.com/googleapis/google-cloud-go/commit/52885115af3e95cdfd1ec784837fb1df7fe01446)), refs [#3519](https://www.github.com/googleapis/google-cloud-go/issues/3519) + +## [1.14.0](https://www.github.com/googleapis/google-cloud-go/compare/bigquery/v1.13.0...v1.14.0) (2020-12-04) + + +### Features + +* **bigquery:** add support for bignumeric ([#2779](https://www.github.com/googleapis/google-cloud-go/issues/2779)) ([ea3cde5](https://www.github.com/googleapis/google-cloud-go/commit/ea3cde55ad3d8d843bce8d023747cf69552850b5)) +* **bigquery:** expose hive partitioning options ([#3240](https://www.github.com/googleapis/google-cloud-go/issues/3240)) ([fa77efa](https://www.github.com/googleapis/google-cloud-go/commit/fa77efa1a1880ff89307d54cc7e9e8c09430e4e2)) + +## v1.13.0 + +* Support retries for specific http2 transport race. +* Remove unused datasource client from bigquery/datatransfer. +* Adds support for authorized User Defined Functions (UDFs). +* Documentation improvements. +* Various updates to autogenerated clients. + + +## v1.12.0 + +* Adds additional retry support for table deletion. +* Various updates to autogenerated clients. + +## v1.11.2 + +* Addresses issue with consuming query results using an iterator.Pager + +## v1.11.1 + +* Addresses issue with optimized query path changes, released + in v1.11.0 + +## v1.11.0 + +* Add support for optimized query path. +* Documentation improvements. +* Fix issue related to the ReturnType of a bigquery Routine. +* Various updates to autogenerated clients. + +## v1.10.0 + +* Support for Infinity/-Infinity/NaN values in NullFloat64. +* Updates to RowIterator to address issues related to retrieving query + results without explicit destination table references. +* Various updates to autogenerated clients. + +## v1.9.0 + +* SchemaFromJSON will now accept alias type names (e.g. INT64 vs INTEGER, STRUCT vs RECORD). +* Support for IAM on table resources. +* Various updates to autogenerated clients. + +## v1.8.0 + +* Add support for hourly time partitioning. +* Various updates to autogenerated clients. + +## v1.7.0 + +* Add support for extracting BQML models to cloud storage. +* Add support for specifying projected fields when ingesting + datastore backups. +* Fix issue related to defining a range partitioning range + using default values. +* Add bigquery/reservation/v1 API. +* Various updates to autogenerated clients. + +## v1.6.0 + +* Add support for materialized views. +* Add support for policy tags (column ACLs). +* Add bigquery/connection/v1beta1 API. +* Documentation improvements. +* Various updates to autogenerated clients. + +## v1.5.0 + +* Add v1 endpoint for bigquerystorage API. +* Improved error message in bigquery.PutMultiError. +* Various updates to autogenerated clients. + +## v1.4.0 + +* Add v1beta2, v1alpha2 endpoints for bigquerystorage API. + +* Location is now reported as part of TableMetadata. + +## v1.3.0 + +* Add Description field for Routine entities. + +* Add support for iamMember entities on dataset ACLs. + +* Address issue when constructing a Pager from a RowIterator + that referenced a result with zero result rows. + +* Add support for integer range partitioning, which affects + table creation directly and via query/load jobs. + +* Add opt-out support for streaming inserts via experimental + `NoDedupeID` sentinel. + +## v1.2.0 + +* Adds support for scripting feature, which includes script statistics + and the ability to list jobs run as part of a script query. + +* Updates default endpoint for BigQuery from www.googleapis.com + to bigquery.googleapis.com. + +## v1.1.0 + +* Added support for specifying default `EncryptionConfig` settings on the + dataset. + +* Added support for `EncyptionConfig` as part of an ML model. + +* Added `Relax()` to make all fields within a `Schema` nullable. + +* Added a `UseAvroLogicalTypes` option when defining an avro extract job. + +## v1.0.1 + +This patch release is a small fix to the go.mod to point to the post-carve out +cloud.google.com/go. + +## v1.0.0 + +This is the first tag to carve out bigquery as its own module. See: +https://github.com/golang/go/wiki/Modules#is-it-possible-to-add-a-module-to-a-multi-module-repository. diff --git a/vendor/cloud.google.com/go/bigquery/LICENSE b/vendor/cloud.google.com/go/bigquery/LICENSE new file mode 100644 index 000000000000..d64569567334 --- /dev/null +++ b/vendor/cloud.google.com/go/bigquery/LICENSE @@ -0,0 +1,202 @@ + + Apache License + Version 2.0, January 2004 + http://www.apache.org/licenses/ + + TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION + + 1. Definitions. + + "License" shall mean the terms and conditions for use, reproduction, + and distribution as defined by Sections 1 through 9 of this document. + + "Licensor" shall mean the copyright owner or entity authorized by + the copyright owner that is granting the License. + + "Legal Entity" shall mean the union of the acting entity and all + other entities that control, are controlled by, or are under common + control with that entity. For the purposes of this definition, + "control" means (i) the power, direct or indirect, to cause the + direction or management of such entity, whether by contract or + otherwise, or (ii) ownership of fifty percent (50%) or more of the + outstanding shares, or (iii) beneficial ownership of such entity. + + "You" (or "Your") shall mean an individual or Legal Entity + exercising permissions granted by this License. + + "Source" form shall mean the preferred form for making modifications, + including but not limited to software source code, documentation + source, and configuration files. + + "Object" form shall mean any form resulting from mechanical + transformation or translation of a Source form, including but + not limited to compiled object code, generated documentation, + and conversions to other media types. + + "Work" shall mean the work of authorship, whether in Source or + Object form, made available under the License, as indicated by a + copyright notice that is included in or attached to the work + (an example is provided in the Appendix below). + + "Derivative Works" shall mean any work, whether in Source or Object + form, that is based on (or derived from) the Work and for which the + editorial revisions, annotations, elaborations, or other modifications + represent, as a whole, an original work of authorship. For the purposes + of this License, Derivative Works shall not include works that remain + separable from, or merely link (or bind by name) to the interfaces of, + the Work and Derivative Works thereof. + + "Contribution" shall mean any work of authorship, including + the original version of the Work and any modifications or additions + to that Work or Derivative Works thereof, that is intentionally + submitted to Licensor for inclusion in the Work by the copyright owner + or by an individual or Legal Entity authorized to submit on behalf of + the copyright owner. For the purposes of this definition, "submitted" + means any form of electronic, verbal, or written communication sent + to the Licensor or its representatives, including but not limited to + communication on electronic mailing lists, source code control systems, + and issue tracking systems that are managed by, or on behalf of, the + Licensor for the purpose of discussing and improving the Work, but + excluding communication that is conspicuously marked or otherwise + designated in writing by the copyright owner as "Not a Contribution." + + "Contributor" shall mean Licensor and any individual or Legal Entity + on behalf of whom a Contribution has been received by Licensor and + subsequently incorporated within the Work. + + 2. Grant of Copyright License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + copyright license to reproduce, prepare Derivative Works of, + publicly display, publicly perform, sublicense, and distribute the + Work and such Derivative Works in Source or Object form. + + 3. Grant of Patent License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + (except as stated in this section) patent license to make, have made, + use, offer to sell, sell, import, and otherwise transfer the Work, + where such license applies only to those patent claims licensable + by such Contributor that are necessarily infringed by their + Contribution(s) alone or by combination of their Contribution(s) + with the Work to which such Contribution(s) was submitted. If You + institute patent litigation against any entity (including a + cross-claim or counterclaim in a lawsuit) alleging that the Work + or a Contribution incorporated within the Work constitutes direct + or contributory patent infringement, then any patent licenses + granted to You under this License for that Work shall terminate + as of the date such litigation is filed. + + 4. Redistribution. You may reproduce and distribute copies of the + Work or Derivative Works thereof in any medium, with or without + modifications, and in Source or Object form, provided that You + meet the following conditions: + + (a) You must give any other recipients of the Work or + Derivative Works a copy of this License; and + + (b) You must cause any modified files to carry prominent notices + stating that You changed the files; and + + (c) You must retain, in the Source form of any Derivative Works + that You distribute, all copyright, patent, trademark, and + attribution notices from the Source form of the Work, + excluding those notices that do not pertain to any part of + the Derivative Works; and + + (d) If the Work includes a "NOTICE" text file as part of its + distribution, then any Derivative Works that You distribute must + include a readable copy of the attribution notices contained + within such NOTICE file, excluding those notices that do not + pertain to any part of the Derivative Works, in at least one + of the following places: within a NOTICE text file distributed + as part of the Derivative Works; within the Source form or + documentation, if provided along with the Derivative Works; or, + within a display generated by the Derivative Works, if and + wherever such third-party notices normally appear. The contents + of the NOTICE file are for informational purposes only and + do not modify the License. You may add Your own attribution + notices within Derivative Works that You distribute, alongside + or as an addendum to the NOTICE text from the Work, provided + that such additional attribution notices cannot be construed + as modifying the License. + + You may add Your own copyright statement to Your modifications and + may provide additional or different license terms and conditions + for use, reproduction, or distribution of Your modifications, or + for any such Derivative Works as a whole, provided Your use, + reproduction, and distribution of the Work otherwise complies with + the conditions stated in this License. + + 5. Submission of Contributions. Unless You explicitly state otherwise, + any Contribution intentionally submitted for inclusion in the Work + by You to the Licensor shall be under the terms and conditions of + this License, without any additional terms or conditions. + Notwithstanding the above, nothing herein shall supersede or modify + the terms of any separate license agreement you may have executed + with Licensor regarding such Contributions. + + 6. Trademarks. This License does not grant permission to use the trade + names, trademarks, service marks, or product names of the Licensor, + except as required for reasonable and customary use in describing the + origin of the Work and reproducing the content of the NOTICE file. + + 7. Disclaimer of Warranty. Unless required by applicable law or + agreed to in writing, Licensor provides the Work (and each + Contributor provides its Contributions) on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or + implied, including, without limitation, any warranties or conditions + of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A + PARTICULAR PURPOSE. You are solely responsible for determining the + appropriateness of using or redistributing the Work and assume any + risks associated with Your exercise of permissions under this License. + + 8. Limitation of Liability. In no event and under no legal theory, + whether in tort (including negligence), contract, or otherwise, + unless required by applicable law (such as deliberate and grossly + negligent acts) or agreed to in writing, shall any Contributor be + liable to You for damages, including any direct, indirect, special, + incidental, or consequential damages of any character arising as a + result of this License or out of the use or inability to use the + Work (including but not limited to damages for loss of goodwill, + work stoppage, computer failure or malfunction, or any and all + other commercial damages or losses), even if such Contributor + has been advised of the possibility of such damages. + + 9. Accepting Warranty or Additional Liability. While redistributing + the Work or Derivative Works thereof, You may choose to offer, + and charge a fee for, acceptance of support, warranty, indemnity, + or other liability obligations and/or rights consistent with this + License. However, in accepting such obligations, You may act only + on Your own behalf and on Your sole responsibility, not on behalf + of any other Contributor, and only if You agree to indemnify, + defend, and hold each Contributor harmless for any liability + incurred by, or claims asserted against, such Contributor by reason + of your accepting any such warranty or additional liability. + + END OF TERMS AND CONDITIONS + + APPENDIX: How to apply the Apache License to your work. + + To apply the Apache License to your work, attach the following + boilerplate notice, with the fields enclosed by brackets "[]" + replaced with your own identifying information. (Don't include + the brackets!) The text should be enclosed in the appropriate + comment syntax for the file format. We also recommend that a + file or class name and description of purpose be included on the + same "printed page" as the copyright notice for easier + identification within third-party archives. + + Copyright [yyyy] [name of copyright owner] + + Licensed under the Apache License, Version 2.0 (the "License"); + you may not use this file except in compliance with the License. + You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. diff --git a/vendor/cloud.google.com/go/bigquery/README.md b/vendor/cloud.google.com/go/bigquery/README.md new file mode 100644 index 000000000000..94f5c6d306a6 --- /dev/null +++ b/vendor/cloud.google.com/go/bigquery/README.md @@ -0,0 +1,47 @@ +## BigQuery [](https://pkg.go.dev/cloud.google.com/go/bigquery) + +- [About BigQuery](https://cloud.google.com/bigquery/) +- [API documentation](https://cloud.google.com/bigquery/docs) +- [Go client documentation](https://pkg.go.dev/cloud.google.com/go/bigquery) +- [Complete sample programs](https://github.com/GoogleCloudPlatform/golang-samples/tree/main/bigquery) + +### Example Usage + +First create a `bigquery.Client` to use throughout your application: +[snip]:# (bq-1) +```go +c, err := bigquery.NewClient(ctx, "my-project-ID") +if err != nil { + // TODO: Handle error. +} +``` + +Then use that client to interact with the API: +[snip]:# (bq-2) +```go +// Construct a query. +q := c.Query(` + SELECT year, SUM(number) + FROM [bigquery-public-data:usa_names.usa_1910_2013] + WHERE name = "William" + GROUP BY year + ORDER BY year +`) +// Execute the query. +it, err := q.Read(ctx) +if err != nil { + // TODO: Handle error. +} +// Iterate through the results. +for { + var values []bigquery.Value + err := it.Next(&values) + if err == iterator.Done { // from "google.golang.org/api/iterator" + break + } + if err != nil { + // TODO: Handle error. + } + fmt.Println(values) +} +``` diff --git a/vendor/cloud.google.com/go/bigquery/arrow.go b/vendor/cloud.google.com/go/bigquery/arrow.go new file mode 100644 index 000000000000..041edf8d96a3 --- /dev/null +++ b/vendor/cloud.google.com/go/bigquery/arrow.go @@ -0,0 +1,297 @@ +// Copyright 2023 Google LLC +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +package bigquery + +import ( + "bytes" + "encoding/base64" + "errors" + "fmt" + "io" + "math/big" + + "cloud.google.com/go/civil" + "github.com/apache/arrow/go/v15/arrow" + "github.com/apache/arrow/go/v15/arrow/array" + "github.com/apache/arrow/go/v15/arrow/ipc" + "github.com/apache/arrow/go/v15/arrow/memory" + "google.golang.org/api/iterator" +) + +// ArrowRecordBatch represents an Arrow RecordBatch with the source PartitionID +type ArrowRecordBatch struct { + reader io.Reader + // Serialized Arrow Record Batch. + Data []byte + // Serialized Arrow Schema. + Schema []byte + // Source partition ID. In the Storage API world, it represents the ReadStream. + PartitionID string +} + +// Read makes ArrowRecordBatch implements io.Reader +func (r *ArrowRecordBatch) Read(p []byte) (int, error) { + if r.reader == nil { + buf := bytes.NewBuffer(r.Schema) + buf.Write(r.Data) + r.reader = buf + } + return r.reader.Read(p) +} + +// ArrowIterator represents a way to iterate through a stream of arrow records. +// Experimental: this interface is experimental and may be modified or removed in future versions, +// regardless of any other documented package stability guarantees. +type ArrowIterator interface { + Next() (*ArrowRecordBatch, error) + Schema() Schema + SerializedArrowSchema() []byte +} + +// NewArrowIteratorReader allows to consume an ArrowIterator as an io.Reader. +// Experimental: this interface is experimental and may be modified or removed in future versions, +// regardless of any other documented package stability guarantees. +func NewArrowIteratorReader(it ArrowIterator) io.Reader { + return &arrowIteratorReader{ + it: it, + } +} + +type arrowIteratorReader struct { + buf *bytes.Buffer + it ArrowIterator +} + +// Read makes ArrowIteratorReader implement io.Reader +func (r *arrowIteratorReader) Read(p []byte) (int, error) { + if r.it == nil { + return -1, errors.New("bigquery: nil ArrowIterator") + } + if r.buf == nil { // init with schema + buf := bytes.NewBuffer(r.it.SerializedArrowSchema()) + r.buf = buf + } + n, err := r.buf.Read(p) + if err == io.EOF { + batch, err := r.it.Next() + if err == iterator.Done { + return 0, io.EOF + } + r.buf.Write(batch.Data) + return r.Read(p) + } + return n, err +} + +type arrowDecoder struct { + allocator memory.Allocator + tableSchema Schema + arrowSchema *arrow.Schema +} + +func newArrowDecoder(arrowSerializedSchema []byte, schema Schema) (*arrowDecoder, error) { + buf := bytes.NewBuffer(arrowSerializedSchema) + r, err := ipc.NewReader(buf) + if err != nil { + return nil, err + } + defer r.Release() + p := &arrowDecoder{ + tableSchema: schema, + arrowSchema: r.Schema(), + allocator: memory.DefaultAllocator, + } + return p, nil +} + +func (ap *arrowDecoder) createIPCReaderForBatch(arrowRecordBatch *ArrowRecordBatch) (*ipc.Reader, error) { + return ipc.NewReader( + arrowRecordBatch, + ipc.WithSchema(ap.arrowSchema), + ipc.WithAllocator(ap.allocator), + ) +} + +// decodeArrowRecords decodes BQ ArrowRecordBatch into rows of []Value. +func (ap *arrowDecoder) decodeArrowRecords(arrowRecordBatch *ArrowRecordBatch) ([][]Value, error) { + r, err := ap.createIPCReaderForBatch(arrowRecordBatch) + if err != nil { + return nil, err + } + defer r.Release() + rs := make([][]Value, 0) + for r.Next() { + rec := r.Record() + values, err := ap.convertArrowRecordValue(rec) + if err != nil { + return nil, err + } + rs = append(rs, values...) + } + return rs, nil +} + +// decodeRetainedArrowRecords decodes BQ ArrowRecordBatch into a list of retained arrow.Record. +func (ap *arrowDecoder) decodeRetainedArrowRecords(arrowRecordBatch *ArrowRecordBatch) ([]arrow.Record, error) { + r, err := ap.createIPCReaderForBatch(arrowRecordBatch) + if err != nil { + return nil, err + } + defer r.Release() + records := []arrow.Record{} + for r.Next() { + rec := r.Record() + rec.Retain() + records = append(records, rec) + } + return records, nil +} + +// convertArrowRows converts an arrow.Record into a series of Value slices. +func (ap *arrowDecoder) convertArrowRecordValue(record arrow.Record) ([][]Value, error) { + rs := make([][]Value, record.NumRows()) + for i := range rs { + rs[i] = make([]Value, record.NumCols()) + } + for j, col := range record.Columns() { + fs := ap.tableSchema[j] + ft := ap.arrowSchema.Field(j).Type + for i := 0; i < col.Len(); i++ { + v, err := convertArrowValue(col, i, ft, fs) + if err != nil { + return nil, fmt.Errorf("found arrow type %s, but could not convert value: %v", ap.arrowSchema.Field(j).Type, err) + } + rs[i][j] = v + } + } + return rs, nil +} + +// convertArrow gets row value in the given column and converts to a Value. +// Arrow is a colunar storage, so we navigate first by column and get the row value. +// More details on conversions can be seen here: https://cloud.google.com/bigquery/docs/reference/storage#arrow_schema_details +func convertArrowValue(col arrow.Array, i int, ft arrow.DataType, fs *FieldSchema) (Value, error) { + if !col.IsValid(i) { + return nil, nil + } + switch ft.(type) { + case *arrow.BooleanType: + v := col.(*array.Boolean).Value(i) + return convertBasicType(fmt.Sprintf("%v", v), fs.Type) + case *arrow.Int8Type: + v := col.(*array.Int8).Value(i) + return convertBasicType(fmt.Sprintf("%v", v), fs.Type) + case *arrow.Int16Type: + v := col.(*array.Int16).Value(i) + return convertBasicType(fmt.Sprintf("%v", v), fs.Type) + case *arrow.Int32Type: + v := col.(*array.Int32).Value(i) + return convertBasicType(fmt.Sprintf("%v", v), fs.Type) + case *arrow.Int64Type: + v := col.(*array.Int64).Value(i) + return convertBasicType(fmt.Sprintf("%v", v), fs.Type) + case *arrow.Float16Type: + v := col.(*array.Float16).Value(i) + return convertBasicType(fmt.Sprintf("%v", v.Float32()), fs.Type) + case *arrow.Float32Type: + v := col.(*array.Float32).Value(i) + return convertBasicType(fmt.Sprintf("%v", v), fs.Type) + case *arrow.Float64Type: + v := col.(*array.Float64).Value(i) + return convertBasicType(fmt.Sprintf("%v", v), fs.Type) + case *arrow.BinaryType: + v := col.(*array.Binary).Value(i) + encoded := base64.StdEncoding.EncodeToString(v) + return convertBasicType(encoded, fs.Type) + case *arrow.StringType: + v := col.(*array.String).Value(i) + return convertBasicType(v, fs.Type) + case *arrow.Date32Type: + v := col.(*array.Date32).Value(i) + return convertBasicType(v.FormattedString(), fs.Type) + case *arrow.Date64Type: + v := col.(*array.Date64).Value(i) + return convertBasicType(v.FormattedString(), fs.Type) + case *arrow.TimestampType: + v := col.(*array.Timestamp).Value(i) + dft := ft.(*arrow.TimestampType) + t := v.ToTime(dft.Unit) + if dft.TimeZone == "" { // Datetime + return Value(civil.DateTimeOf(t)), nil + } + return Value(t.UTC()), nil // Timestamp + case *arrow.Time32Type: + v := col.(*array.Time32).Value(i) + return convertBasicType(v.FormattedString(arrow.Microsecond), fs.Type) + case *arrow.Time64Type: + v := col.(*array.Time64).Value(i) + return convertBasicType(v.FormattedString(arrow.Microsecond), fs.Type) + case *arrow.Decimal128Type: + dft := ft.(*arrow.Decimal128Type) + v := col.(*array.Decimal128).Value(i) + rat := new(big.Rat) + rat.SetString(v.ToString(dft.Scale)) + return Value(rat), nil + case *arrow.Decimal256Type: + dft := ft.(*arrow.Decimal256Type) + v := col.(*array.Decimal256).Value(i) + rat := new(big.Rat) + rat.SetString(v.ToString(dft.Scale)) + return Value(rat), nil + case *arrow.ListType: + arr := col.(*array.List) + dft := ft.(*arrow.ListType) + values := []Value{} + start, end := arr.ValueOffsets(i) + slice := array.NewSlice(arr.ListValues(), start, end) + for j := 0; j < slice.Len(); j++ { + v, err := convertArrowValue(slice, j, dft.Elem(), fs) + if err != nil { + return nil, err + } + values = append(values, v) + } + return values, nil + case *arrow.StructType: + arr := col.(*array.Struct) + nestedValues := []Value{} + fields := ft.(*arrow.StructType).Fields() + if fs.Type == RangeFieldType { + rangeFieldSchema := &FieldSchema{ + Type: fs.RangeElementType.Type, + } + start, err := convertArrowValue(arr.Field(0), i, fields[0].Type, rangeFieldSchema) + if err != nil { + return nil, err + } + end, err := convertArrowValue(arr.Field(1), i, fields[1].Type, rangeFieldSchema) + if err != nil { + return nil, err + } + rangeValue := &RangeValue{Start: start, End: end} + return Value(rangeValue), nil + } + for fIndex, f := range fields { + v, err := convertArrowValue(arr.Field(fIndex), i, f.Type, fs.Schema[fIndex]) + if err != nil { + return nil, err + } + nestedValues = append(nestedValues, v) + } + return nestedValues, nil + default: + return nil, fmt.Errorf("unknown arrow type: %v", ft) + } +} diff --git a/vendor/cloud.google.com/go/bigquery/bigquery.go b/vendor/cloud.google.com/go/bigquery/bigquery.go new file mode 100644 index 000000000000..937dcf058f17 --- /dev/null +++ b/vendor/cloud.google.com/go/bigquery/bigquery.go @@ -0,0 +1,303 @@ +// Copyright 2015 Google LLC +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +package bigquery + +import ( + "context" + "errors" + "fmt" + "io" + "net/http" + "net/url" + "strings" + "time" + + "cloud.google.com/go/bigquery/internal" + cloudinternal "cloud.google.com/go/internal" + "cloud.google.com/go/internal/detect" + "cloud.google.com/go/internal/trace" + "cloud.google.com/go/internal/version" + gax "github.com/googleapis/gax-go/v2" + bq "google.golang.org/api/bigquery/v2" + "google.golang.org/api/googleapi" + "google.golang.org/api/option" +) + +const ( + // Scope is the Oauth2 scope for the service. + // For relevant BigQuery scopes, see: + // https://developers.google.com/identity/protocols/googlescopes#bigqueryv2 + Scope = "https://www.googleapis.com/auth/bigquery" + userAgentPrefix = "gcloud-golang-bigquery" +) + +var xGoogHeader = fmt.Sprintf("gl-go/%s gccl/%s", version.Go(), internal.Version) + +func setClientHeader(headers http.Header) { + headers.Set("x-goog-api-client", xGoogHeader) +} + +// Client may be used to perform BigQuery operations. +type Client struct { + // Location, if set, will be used as the default location for all subsequent + // dataset creation and job operations. A location specified directly in one of + // those operations will override this value. + Location string + + projectID string + bqs *bq.Service + rc *readClient + + // container for custom client options + customConfig *customClientConfig +} + +// DetectProjectID is a sentinel value that instructs [NewClient] to detect the +// project ID. It is given in place of the projectID argument. [NewClient] will +// use the project ID from the given credentials or the default credentials +// (https://developers.google.com/accounts/docs/application-default-credentials) +// if no credentials were provided. When providing credentials, not all +// options will allow [NewClient] to extract the project ID. Specifically a JWT +// does not have the project ID encoded. +const DetectProjectID = "*detect-project-id*" + +// NewClient constructs a new [Client] which can perform BigQuery operations. +// Operations performed via the client are billed to the specified GCP project. +// +// If the project ID is set to [DetectProjectID], NewClient will attempt to detect +// the project ID from credentials. +func NewClient(ctx context.Context, projectID string, opts ...option.ClientOption) (*Client, error) { + o := []option.ClientOption{ + option.WithScopes(Scope), + option.WithUserAgent(fmt.Sprintf("%s/%s", userAgentPrefix, internal.Version)), + } + o = append(o, opts...) + bqs, err := bq.NewService(ctx, o...) + if err != nil { + return nil, fmt.Errorf("bigquery: constructing client: %w", err) + } + + // Handle project autodetection. + projectID, err = detect.ProjectID(ctx, projectID, "", opts...) + if err != nil { + return nil, err + } + + // gather any custom client options + custom := newCustomClientConfig(opts...) + + c := &Client{ + projectID: projectID, + bqs: bqs, + customConfig: custom, + } + return c, nil +} + +// EnableStorageReadClient sets up Storage API connection to be used when fetching +// large datasets from tables, jobs or queries. +// Currently out of pagination methods like PageInfo().Token and RowIterator.StartIndex +// are not supported when the Storage API is enabled. +// Calling this method twice will return an error. +func (c *Client) EnableStorageReadClient(ctx context.Context, opts ...option.ClientOption) error { + if c.isStorageReadAvailable() { + return fmt.Errorf("failed: storage read client already set up") + } + rc, err := newReadClient(ctx, c.projectID, opts...) + if err != nil { + return err + } + c.rc = rc + return nil +} + +func (c *Client) isStorageReadAvailable() bool { + return c.rc != nil +} + +// Project returns the project ID or number for this instance of the client, which may have +// either been explicitly specified or autodetected. +func (c *Client) Project() string { + return c.projectID +} + +// Close closes any resources held by the client. +// Close should be called when the client is no longer needed. +// It need not be called at program exit. +func (c *Client) Close() error { + if c.isStorageReadAvailable() { + err := c.rc.close() + if err != nil { + return err + } + } + return nil +} + +// Calls the Jobs.Insert RPC and returns a Job. +func (c *Client) insertJob(ctx context.Context, job *bq.Job, media io.Reader, mediaOpts ...googleapi.MediaOption) (*Job, error) { + call := c.bqs.Jobs.Insert(c.projectID, job).Context(ctx) + setClientHeader(call.Header()) + if media != nil { + call.Media(media, mediaOpts...) + } + var res *bq.Job + var err error + invoke := func() error { + sCtx := trace.StartSpan(ctx, "bigquery.jobs.insert") + res, err = call.Do() + trace.EndSpan(sCtx, err) + return err + } + // A job with a client-generated ID can be retried; the presence of the + // ID makes the insert operation idempotent. + // We don't retry if there is media, because it is an io.Reader. We'd + // have to read the contents and keep it in memory, and that could be expensive. + // TODO(jba): Look into retrying if media != nil. + if job.JobReference != nil && media == nil { + // We deviate from default retries due to BigQuery wanting to retry structured internal job errors. + err = runWithRetryExplicit(ctx, invoke, jobRetryReasons) + } else { + err = invoke() + } + if err != nil { + return nil, err + } + return bqToJob(res, c) +} + +// runQuery invokes the optimized query path. +// Due to differences in options it supports, it cannot be used for all existing +// jobs.insert requests that are query jobs. +func (c *Client) runQuery(ctx context.Context, queryRequest *bq.QueryRequest) (*bq.QueryResponse, error) { + call := c.bqs.Jobs.Query(c.projectID, queryRequest).Context(ctx) + setClientHeader(call.Header()) + + var res *bq.QueryResponse + var err error + invoke := func() error { + sCtx := trace.StartSpan(ctx, "bigquery.jobs.query") + res, err = call.Do() + trace.EndSpan(sCtx, err) + return err + } + + // We control request ID, so we can always runWithRetry. + err = runWithRetryExplicit(ctx, invoke, jobRetryReasons) + if err != nil { + return nil, err + } + return res, nil +} + +// Convert a number of milliseconds since the Unix epoch to a time.Time. +// Treat an input of zero specially: convert it to the zero time, +// rather than the start of the epoch. +func unixMillisToTime(m int64) time.Time { + if m == 0 { + return time.Time{} + } + return time.Unix(0, m*1e6) +} + +// runWithRetry calls the function until it returns nil or a non-retryable error, or +// the context is done. +// See the similar function in ../storage/invoke.go. The main difference is the +// reason for retrying. +func runWithRetry(ctx context.Context, call func() error) error { + return runWithRetryExplicit(ctx, call, defaultRetryReasons) +} + +func runWithRetryExplicit(ctx context.Context, call func() error, allowedReasons []string) error { + // These parameters match the suggestions in https://cloud.google.com/bigquery/sla. + backoff := gax.Backoff{ + Initial: 1 * time.Second, + Max: 32 * time.Second, + Multiplier: 2, + } + return cloudinternal.Retry(ctx, backoff, func() (stop bool, err error) { + err = call() + if err == nil { + return true, nil + } + return !retryableError(err, allowedReasons), err + }) +} + +var ( + defaultRetryReasons = []string{"backendError", "rateLimitExceeded"} + + // These reasons are used exclusively for enqueuing jobs (jobs.insert and jobs.query). + // Using them for polling may cause unwanted retries until context deadline/cancellation/etc. + jobRetryReasons = []string{"backendError", "rateLimitExceeded", "jobRateLimitExceeded", "internalError"} + + retry5xxCodes = []int{ + http.StatusInternalServerError, + http.StatusBadGateway, + http.StatusServiceUnavailable, + http.StatusGatewayTimeout, + } +) + +// retryableError is the unary retry predicate for this library. In addition to structured error +// reasons, it specifies some HTTP codes (500, 502, 503, 504) and network/transport reasons. +func retryableError(err error, allowedReasons []string) bool { + if err == nil { + return false + } + if err == io.ErrUnexpectedEOF { + return true + } + // Special case due to http2: https://github.com/googleapis/google-cloud-go/issues/1793 + // Due to Go's default being higher for streams-per-connection than is accepted by the + // BQ backend, it's possible to get streams refused immediately after a connection is + // started but before we receive SETTINGS frame from the backend. This generally only + // happens when we try to enqueue > 100 requests onto a newly initiated connection. + if err.Error() == "http2: stream closed" { + return true + } + + switch e := err.(type) { + case *googleapi.Error: + // We received a structured error from backend. + var reason string + if len(e.Errors) > 0 { + reason = e.Errors[0].Reason + for _, r := range allowedReasons { + if reason == r { + return true + } + } + } + for _, code := range retry5xxCodes { + if e.Code == code { + return true + } + } + case *url.Error: + retryable := []string{"connection refused", "connection reset"} + for _, s := range retryable { + if strings.Contains(e.Error(), s) { + return true + } + } + case interface{ Temporary() bool }: + if e.Temporary() { + return true + } + } + // Check wrapped error. + return retryableError(errors.Unwrap(err), allowedReasons) +} diff --git a/vendor/cloud.google.com/go/bigquery/bigquery.replay b/vendor/cloud.google.com/go/bigquery/bigquery.replay new file mode 100644 index 000000000000..86bd3a3ea5f6 --- /dev/null +++ b/vendor/cloud.google.com/go/bigquery/bigquery.replay @@ -0,0 +1,28376 @@ +{ + "Initial": "IjIwMTktMTAtMjhUMTg6MzU6MDYuNTkwMDkzNjU5WiI=", + "Version": "0.2", + "Converter": { + "ClearHeaders": [ + "^X-Goog-.*Encryption-Key$" + ], + "RemoveRequestHeaders": [ + "^Authorization$", + "^Proxy-Authorization$", + "^Connection$", + "^Content-Type$", + "^Date$", + "^Host$", + "^Transfer-Encoding$", + "^Via$", + "^X-Forwarded-.*$", + "^X-Cloud-Trace-Context$", + "^X-Goog-Api-Client$", + "^X-Google-.*$", + "^X-Gfe-.*$" + ], + "RemoveResponseHeaders": [ + "^X-Google-.*$", + "^X-Gfe-.*$" + ], + "ClearParams": null, + "RemoveParams": null + }, + "Entries": [ + { + "ID": "05a0f97b61e4f9bc", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "74" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJkYXRhc2V0UmVmZXJlbmNlIjp7ImRhdGFzZXRJZCI6ImRhdGFzZXRfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAwMSJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:07 GMT" + ], + "Etag": [ + "gs3AYtwXmh7aF/dUsSnjCA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42RbWvCMBSF/0v2VZu0vtQWhLnNDWEvUBU3xpCYXmu0TbokVUT870ulyj6o+Clwcs65T252aMVFjEI048lvAWp7F1NDNRhUQ2BoYm8S3eh9mc1ntvDpM47HeiiWj71u1zp4mdQLmabbjIp6DJmsG9AmrEqmHnEDl3idabsdkHYrICRo2GNKCHFtXkM6f+ViZVsWxuQ6xPjI4SRSJinQnGuHyeyk47WHcyWXwIzGZ0bjarTGNzJUtgjmoEAwQOHuqA3K591YUzENLmwE7WuIMgZao/B7h5RM7SA0iQajflQuIgfGafqiZJFbvSqbKG5AaZs9JT4m71cCHxtxwV9oUA/bfkZ5atWSqK7kTJr7M6wOp5mT2MCaM7DQshCm/IP/vVG/93QFJAIaH0h+aogpoIZLMeJZmXRbvud1fJ/4zWbTFqRUmzcZ8zmH+JJFskODvRoP0f4PCVPOULQCAAA=" + } + }, + { + "ID": "f0be3768141a8a07", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "210" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODg2MDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoicmVjIiwidHlwZSI6IlJFQ09SRCJ9XX0sInRhYmxlUmVmZXJlbmNlIjp7ImRhdGFzZXRJZCI6ImRhdGFzZXRfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAwMSIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QiLCJ0YWJsZUlkIjoidF9iYWQifX0K" + ] + }, + "Response": { + "StatusCode": 400, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:07 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6WOMQvCMBCF9/6KI7NDBye3YqsUtEJRFxFJm6MNpI3kUkFK/7tJzODudHz37r17cwLA0Bht2AZmBw5bLdDROk1X38WARLzzO7aTqAQYbEES2PcToS62pzqHZrLQc4JRA7U9DpxFcwgn570Fhvjl7+AQIPTA5ej9ndINV7+aQU46aHJ8cSUFi9oS5j32I8vt5PuxsrpmhzJ/ZPX+ciyqs79fkiX5AH4fDhokAQAA" + } + }, + { + "ID": "007350d4f29cb23a", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "366" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im1vZGUiOiJSRVBFQVRFRCIsIm5hbWUiOiJudW1zIiwidHlwZSI6IklOVEVHRVIifSx7ImZpZWxkcyI6W3sibmFtZSI6ImJvb2wiLCJ0eXBlIjoiQk9PTEVBTiJ9XSwibmFtZSI6InJlYyIsInR5cGUiOiJSRUNPUkQifV19LCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRhYmxlXzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:08 GMT" + ], + "Etag": [ + "xGHJs5vCc0GIeyRFDLpKQA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42Q3U7CQBCF32W9RXapgZYmXIBURCtoqVfGkKUdykrbrd1VaQjv7rSCNf6F7MVmzpwz82W2ZC3SkNhkIaLnF8iLE80XMZAGAc0j1DejyyvVfj0P2GgMhXcxdLPru36vhw5R5tRKxnGR8PQ0hESealDaDrnmCvTcYK1uixnWvNPpsk67y1j3DL85Y6zVrPb8a8EVCuKlK9I1LlppnSmb0gNoM5IyioFnQjUDmXzq9NWgWS6fINCK/kJH93SKHoNJK0xFj6KtTB4sIYc0AGJvyR5k/MelMLOHqBzHAB3WVIEjqHZ4xGAFCS9xlgLiUBH7YUtSniDhx4cji6ysZr43nowwU/dfElX3xxPfGTkeCokMS8Fzbp2+7wy/RnII6oTnnE+9IdY/Vy+kjGvjYDp1nf6E7B7xNcq9gwJPhB1GqtKVaeRD/l325NuhCnLgWsjUF9X8Vts0DMs0mWkZ5dlgk4n8p8E6YyZeCg0xV/pGhgJRw+8zLNYxali/P3CdMiGDaiBK9zOyewcC/my7TQMAAA==" + } + }, + { + "ID": "f84d1553f81296b8", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "311" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRfdmlld19zdGFuZGFyZHNxbCJ9LCJ2aWV3Ijp7InF1ZXJ5IjoiU0VMRUNUIEFQUFJPWF9DT1VOVF9ESVNUSU5DVChuYW1lKSBGUk9NIGBzaG9sbHltYW4tZGVtby10ZXN0LmRhdGFzZXRfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAwMS50YWJsZV8yMDE5MTAyOF82NjkwNjU5MDA5MzY1OV8wMDAxYCIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:08 GMT" + ], + "Etag": [ + "1a06HZtgBjvaM+E52VYphA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "73dcf15f72046f29", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_view_standardsql?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:08 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "8f7c14edaa1ce301", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0001?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:08 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "de3d3e08c604b81c", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "366" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im1vZGUiOiJSRVBFQVRFRCIsIm5hbWUiOiJudW1zIiwidHlwZSI6IklOVEVHRVIifSx7ImZpZWxkcyI6W3sibmFtZSI6ImJvb2wiLCJ0eXBlIjoiQk9PTEVBTiJ9XSwibmFtZSI6InJlYyIsInR5cGUiOiJSRUNPUkQifV19LCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRhYmxlXzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDIifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:08 GMT" + ], + "Etag": [ + "Sqn5ZaQqM5uZ6kSzqV4eAw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "25e7e6880f82d40d", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0002?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:09 GMT" + ], + "Etag": [ + "Sqn5ZaQqM5uZ6kSzqV4eAw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "949d602f771a3353", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "302" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im5hbWUiOiJkYXRlIiwidHlwZSI6IkRBVEUifV19LCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRfbWV0YWRhdGFfcGFydGl0aW9uX25vY2x1c3Rlcl8wIn0sInRpbWVQYXJ0aXRpb25pbmciOnsidHlwZSI6IkRBWSJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:09 GMT" + ], + "Etag": [ + "/9ZgIqtBre0gTvY495t1AA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42Sy07DMBBF/8VsoXZS+kgkFq1AqFJBqIRFQSgyyTQ1JHawp0BV9d8Zh7YgHqIra8Z37j0eecWelM5ZzB5U8bwAuzxA+VACO2SAsqA+j26L0TMOLYgieZkeRx0MBoOTE1IoP+fmpiyXldRHOVTmCMFhnEuUDjANRRAFIuyn3W4kup1IiKhNRyqECFqYVhThpWktLSpURqfaZOXCIdhUUICDcjZW+oli5oi1iznfYrYKY4oSZK1cKzPVrs9fQl5b8wgZOv4LG9+wOb4PJG+W4fgerI1yAjOwoDNg8YptMEZ/bIlmNgiNYh+cbUwz8C/TmhaYzaGSHmamoMwdi+9WTMuK+D4OMlzWvrpOJqPLc5rZ3ZPzl/vTQXLG1vfkiaqCq22g0oV334mmPlUvquGSnkgdvxkqx0YXCdjv7Yl53VaZBekNE9WEB51eGPZ7PRGF4th/xrda2Z+Cflv0aDEkKKXDC5Mremf+w6Mdis+XJIPh+MxPmKwxpNbNNVu/A063LnIJAwAA" + } + }, + { + "ID": "56b227398f0c30ea", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_metadata_partition_nocluster_0?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:09 GMT" + ], + "Etag": [ + "/9ZgIqtBre0gTvY495t1AA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "4176229c3cdc06af", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "333" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjbHVzdGVyaW5nIjp7ImZpZWxkcyI6WyJuYW1lIl19LCJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im5hbWUiOiJkYXRlIiwidHlwZSI6IkRBVEUifV19LCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRfbWV0YWRhdGFfcGFydGl0aW9uX2NsdXN0ZXJfMCJ9LCJ0aW1lUGFydGl0aW9uaW5nIjp7InR5cGUiOiJEQVkifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:09 GMT" + ], + "Etag": [ + "yedqPy1Zkhz/hCIcO9Y15w==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "935482881ea36a18", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_metadata_partition_cluster_0?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:09 GMT" + ], + "Etag": [ + "yedqPy1Zkhz/hCIcO9Y15w==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "0afa71eb8a71812c", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_metadata_partition_nocluster_0?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "32" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJyZXF1aXJlUGFydGl0aW9uRmlsdGVyIjp0cnVlfQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:10 GMT" + ], + "Etag": [ + "hMOSCWlX5GKYUPYQ/XU40w==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "a904db128d354ce7", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_metadata_partition_nocluster_0?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "32" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJyZXF1aXJlUGFydGl0aW9uRmlsdGVyIjp0cnVlfQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:10 GMT" + ], + "Etag": [ + "SZfujLFgKyd7haukqhQKlw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "dea634411117aae5", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "324" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im5hbWUiOiJkYXRlIiwidHlwZSI6IkRBVEUifV19LCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRfbWV0YWRhdGFfcGFydGl0aW9uX25vY2x1c3Rlcl8xIn0sInRpbWVQYXJ0aXRpb25pbmciOnsiZXhwaXJhdGlvbk1zIjoiMTAwMCIsInR5cGUiOiJEQVkifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:10 GMT" + ], + "Etag": [ + "R5OBB6v5jqD4cvp5U45csA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "18a74cb64db8020c", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_metadata_partition_nocluster_1?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:11 GMT" + ], + "Etag": [ + "R5OBB6v5jqD4cvp5U45csA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42SXU/CMBSG/0u9VdpNxtgSLyASY4IfwXFhjFlqdxiFrZ1rQQnhv3s6Ab8jV835et/nnHRN5lJlJCZPMn9eQL06svypAHJMwPIc86Pgpt/vLIPZ83lbLKtg3A6E6Z2dYYd0c2aqi2JVcnWSQalPLBgbZ9xyAzb1mRd5zO+mnU7EOkHEWHSKT8oY81o2LdHCtaYVr620UqtUaVEsjIU69dDAQDEZSjVHm6m1lYkp3WG2cq3zAnglTUvocp+nS59WtZ6BsIb+wka3bIYeAkmbYxh6AGvTOYIJ1KAEkHhNthiXf1wJZ7YITcchODubZuBfpg0eUEyh5A5mIqHIDIkf1kTxEvneHxRcVS66S0aX1xc4s6+j8qf6eS8ZkM0jalpZwu3OUKrcqe+b7t3Hea1kzV31Cg2Jh+SORS3K/goXxxQjTTjUKk+g/p4e6ZddJGpohBLZIHlB6PvdMPRYNwi/OH1p6J6y0Jkek4Ibe6UzidtnPzQiP/zYL+n1hwM3oUUjiKnxHdm8AYs0pW0fAwAA" + } + }, + { + "ID": "72c3f8f5da79ab24", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "355" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjbHVzdGVyaW5nIjp7ImZpZWxkcyI6WyJuYW1lIl19LCJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im5hbWUiOiJkYXRlIiwidHlwZSI6IkRBVEUifV19LCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRfbWV0YWRhdGFfcGFydGl0aW9uX2NsdXN0ZXJfMSJ9LCJ0aW1lUGFydGl0aW9uaW5nIjp7ImV4cGlyYXRpb25NcyI6IjEwMDAiLCJ0eXBlIjoiREFZIn19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:11 GMT" + ], + "Etag": [ + "8m4hqWfphAvrKD22YeJv8A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "636377dfb40ad235", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_metadata_partition_cluster_1?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:11 GMT" + ], + "Etag": [ + "8m4hqWfphAvrKD22YeJv8A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "99b89f6b096e557d", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_metadata_partition_nocluster_1?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "32" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJyZXF1aXJlUGFydGl0aW9uRmlsdGVyIjp0cnVlfQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:12 GMT" + ], + "Etag": [ + "ors7Ie/+Jrme10hRIhQsSg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "162574a9830d41af", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_metadata_partition_nocluster_1?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "32" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJyZXF1aXJlUGFydGl0aW9uRmlsdGVyIjp0cnVlfQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:12 GMT" + ], + "Etag": [ + "X62OLE2TahFdIQbWC+Rx3A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42S207jMBCG38VcArWT0qaNxEXZLahSOWwJghVaRW4yTQ2OHWwHWlW8+45DWxbEil5FHv+Hz6OsyKNQOYnJVBRPNZjlnuNTCeSAgOMFzu+64eV4GCZ8fpqPfk1vf+xPFu3B8TEqhPfZuZZyWXJ1mEOpDx1YF+fccQsuDVnQD1jYS7vdPut2+oz12/hJGWNBy6UlVnhpWnHjhBNapUpnsrYOTBpggQU5Gwv1iDVz5yobU7rBbBVaFxJ4JWwr0+V2Tp9DWhn9AJmz9As2umazdBdI2izD0h1YG+UEZmBAZUDiFVljjP6zJfSsERrFLjibmsbwLdMrLjCbQ8k9zEyAzC2J71dE8RL53j4YuKz86TqZjC7O0LO9x+R/7n8OkiF5/YOZTpRwtSkUqvDpW9Fv/+MsKmG4vz3HQhIgOU4NPNXCvDtPhURMEjtTA6aqujxZ4lrQ4NV4HGtVJGA+jyf6ZXPKDDQ1iWiAg04Uhr0oClivE33g+CDotVn0hiS5dec6F7ib/HNGeNQ+en99MjgZD71DZ00gjm6uv3vUX6/OeGpbAwAA" + } + }, + { + "ID": "7dbfbda208b1c486", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "332" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im5hbWUiOiJkYXRlIiwidHlwZSI6IkRBVEUifV19LCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRfbWV0YWRhdGFfcGFydGl0aW9uX25vY2x1c3Rlcl8yIn0sInRpbWVQYXJ0aXRpb25pbmciOnsicmVxdWlyZVBhcnRpdGlvbkZpbHRlciI6dHJ1ZSwidHlwZSI6IkRBWSJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:12 GMT" + ], + "Etag": [ + "zH3uptlELKNbbZuQe4DlHg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "d6b7e7a4d1020e41", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_metadata_partition_nocluster_2?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:12 GMT" + ], + "Etag": [ + "zH3uptlELKNbbZuQe4DlHg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42S0U/bMBDG/xfvFWonpU0TiQcQ3UAUBCV7GNMUuck1NTh2sC9Aqfjfd8nagsYm+mTd+fu++/nkFbtXpmAJm6nyoQG3/IJypoHtMUBZUv/ltN/UqMeT88vZ7La5hoMTfVoeHpJCtT6/sFovK2n2C6jsPoLHpJAoPWAWiiAORDjKhsNYDAexEHGfjkwIEfQwq2hEK81q6VChsiYzNteNR3BZSAM86PlEmXsas0CsfcL5BrNXWltqkLXyvdxW2z5/DHnt7B3k6Pk/2PiazfNdIHm3DM93YO2UU5iDA5MDS1ZsjXH2ny2RZ43QKXbB2YzpDJ8yvdIC8wVUsoWZK9CFZ8nPFTOyIr4/BwUu67a6Sadnl9/Is72n5Hf3J0fpmL3+okxUFVxtBipTtulb0Q9yOHholHvTfFWagFiCrgHym6Y6XtICSC9YV06sKVNwf7en9mlT5Q5kG5WqDi0YRGE4iqIgHBxE7Vd9rpX7KBj1RURrI4GWHi9soWgLxYeMYRC/vTM9Op6MW4fNu0Bqfb/57FG/AcvAUy5FAwAA" + } + }, + { + "ID": "b7a1a05804c4db09", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "363" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjbHVzdGVyaW5nIjp7ImZpZWxkcyI6WyJuYW1lIl19LCJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im5hbWUiOiJkYXRlIiwidHlwZSI6IkRBVEUifV19LCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRfbWV0YWRhdGFfcGFydGl0aW9uX2NsdXN0ZXJfMiJ9LCJ0aW1lUGFydGl0aW9uaW5nIjp7InJlcXVpcmVQYXJ0aXRpb25GaWx0ZXIiOnRydWUsInR5cGUiOiJEQVkifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:13 GMT" + ], + "Etag": [ + "9HsBS6c1OUU7Wi7IObMI+w==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42S3U7jMBCF38VcstROKpomUi+oloVKZUFtqtUKochNpqnBsYPtLFRV351x+gNiQXAVeXzOmc9HWZMHoQqSkLkoHxswqyPH5xLIDwKOlziPL+1w2suD69ks+iOi0fX8anT8NBigQnifXWopVxVXJwVU+sSBdUnBHbfgspAFccDCftbrxax3GjMWd/GTMcaCjssqXOGlWc2NE05oleWysQ5MFmK8BbkYC/WAS5bO1TahdA/ZKbUuJfBa2E6uq8Oc/gtpbfQ95M7SD8jojszS7yDStgpLvyRtdRNYgAGVA0nWZAcx+qQh9OwAWsV3YPZrWsMXRBssL19CxT3KQoAsLElu10TxCum2H4xb1f40TSej3xfoOdxj7pv7n2fpOdncYaYTFdzs1wlV+vSD6C86DDw2wrxqfgmJQCRxpgH0q6YarvD5qGekPY61KlMw78cT/bQ/5Qa4j0pFixacRmHYj6IgjFnf/6TPtTD/C/pdFmFpKJDcuitdCGyheJ/Rxapf35meDcfn3qHzNhBHs6kn2Na6e++hzW1Zd5vNCx0B1uxCAwAA" + } + }, + { + "ID": "d5bc9af784dd4fc8", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_metadata_partition_cluster_2?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:13 GMT" + ], + "Etag": [ + "9HsBS6c1OUU7Wi7IObMI+w==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "9affe0731b3a4f40", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_metadata_partition_nocluster_2?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "33" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJyZXF1aXJlUGFydGl0aW9uRmlsdGVyIjpmYWxzZX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:13 GMT" + ], + "Etag": [ + "5sU7NtKUea+MywanKU3aAw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "9ef1fdbea03d3c74", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_metadata_partition_nocluster_2?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "33" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJyZXF1aXJlUGFydGl0aW9uRmlsdGVyIjpmYWxzZX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:13 GMT" + ], + "Etag": [ + "5sU7NtKUea+MywanKU3aAw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "a0b285c02b2703d5", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "369" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im5hbWUiOiJkYXRlIiwidHlwZSI6IkRBVEUifV19LCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRfbWV0YWRhdGFfcGFydGl0aW9uX25vY2x1c3Rlcl8zIn0sInRpbWVQYXJ0aXRpb25pbmciOnsiZXhwaXJhdGlvbk1zIjoiMTAwMCIsImZpZWxkIjoiZGF0ZSIsInJlcXVpcmVQYXJ0aXRpb25GaWx0ZXIiOnRydWUsInR5cGUiOiJEQVkifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:14 GMT" + ], + "Etag": [ + "jPXOPS5eOIfOz/1rTfnDYQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42Sa2/TMBSG/4v5ymo7pZdE2odNG6hSR0sbpE0TirzkJPXm2JntAKXqf+c464VNIPrJOpf3fR8deUOepC5IQh5k9dyCXb/z4kEBeU/Aiwr7j/Pb2Xw5gNmknP2i3Kalvrr7cn6OGzLo3Moota6FPiugNmcenE8K4YUDn0WMx5xF42w4jNlwEDMW9/HJGGO857MaI8Jq1gjrpZdGZ9rkqnUebNbHAAeqnEr9hDEr7xuXULrH7FXGVApEI10vN/WhT79HtLHmEXLv6F/Y6I7N0VMgaXcMR09g7TYXUIIFnQNJNmSHMfnHlVCzQ+g2TsHZx3SC/zJt8YD5CmoRYEoJqnAkud8QLWrke3nQcN2EapkuJp8/oeYwR+c/5lcX6TXZfkNPL2uY7wOlroL7YekufJyfjbQiTG8wkHAkx24HcLS18NxKezT6KBVSk8TbFjBEt/XlGq+EgiDGcmp0lYJ9216YH/sqt9ClprLj54NRFI1HI96PB/wV1quFcZ+NXgiVcP7GFBJJi7ceH1jEj8dILy6n10Fh8s4QW1+XZPsbGqa4hkwDAAA=" + } + }, + { + "ID": "b0491c13f2cfcb3e", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_metadata_partition_nocluster_3?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:14 GMT" + ], + "Etag": [ + "jPXOPS5eOIfOz/1rTfnDYQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42Sa0/bMBSG/4v3ddR2ul4SiQ8g2FSprF2bSUNoikxykhocO9jORlfx33ccegG0iX6yzuV93ydH2ZB7qQuSkFtZPbRg1x+8uFVAPhLwosL+3fzHbL4cwGxSzv5QbtNSX1x/Oz3FDRl0bmWUWtdCnxRQmxMPzieF8MKBzyLGY86icTYcxmw4iBmL+/hkjDHe81mNEWE1a4T10kujM21y1ToPNutjgANVTqW+x5iV941LKN1h9ipjKgWika6Xm3rfp78i2lhzB7l39B9sdMvm6DGQtDuGo0ewdpsLKMGCzoEkG7LFmPznSqjZInQbx+DsYjrBu0xPeMB8BbUIMKUEVTiS3GyIFjXyPT9ouG5CtUwXk69fULOfo/OL+cVZekmefqKnlzXMd4FSV8F9v3QdfpzHRloRplcYSDiSY7cDONhaeGilPRh9lgqpSeJtCxii2/p8jVdCQRBjOTW6SsG+bS/M712VW+hSU9nx88EoisajEe/HA/4K69XCuM9Gz4RKOH9lComkxVuPTyzih2OkZ+fTy6AweWeIre/L9z7qLzM78v1qAwAA" + } + }, + { + "ID": "00a9957de4c2948b", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "400" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "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" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:14 GMT" + ], + "Etag": [ + "0T5ZkW3wj1HKjwQqST7u3Q==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "a029148b82625564", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_metadata_partition_cluster_3?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:14 GMT" + ], + "Etag": [ + "0T5ZkW3wj1HKjwQqST7u3Q==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "7ba557d43113b6f5", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_metadata_partition_nocluster_3?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "33" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJyZXF1aXJlUGFydGl0aW9uRmlsdGVyIjpmYWxzZX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:15 GMT" + ], + "Etag": [ + "jXlEkPcyZpPt/vdyy8xxIw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "0455d09eee791c07", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_metadata_partition_nocluster_3?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "33" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJyZXF1aXJlUGFydGl0aW9uRmlsdGVyIjpmYWxzZX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:15 GMT" + ], + "Etag": [ + "jXlEkPcyZpPt/vdyy8xxIw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "16579c8f7469ad6f", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_metadata_partition_nocluster_3?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:15 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "7ea0df705f752418", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_metadata_partition_nocluster_2?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:15 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "f6fb6ad58a1f3be9", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_metadata_partition_nocluster_1?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:15 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "3305dfab8cd99722", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_metadata_partition_nocluster_0?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:16 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "946d03804e0c508e", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0002?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:16 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "f3548433f3d748dd", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "246" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRhYmxlXzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDMifSwidGltZVBhcnRpdGlvbmluZyI6eyJleHBpcmF0aW9uTXMiOiI4NjQwMDAwMCIsInR5cGUiOiJEQVkifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:16 GMT" + ], + "Etag": [ + "aYCSY0ris6vF95xjwQk65A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42Ry27CMBBF/8XdAnYSkpBIXUAfUiWQWqALVsgkQzAkcWqbR4T499pWqERfijf2XN+Ze2Sf0Y6VKYrRimUfexD1naKrHFAHgaKZ1uniYbYggsng8Bz5p+3xbRf4w/t77WCmT254ntcFLbspFLyrQKo4pYpKUEuXOJFD3MEyCCIS+BEhkae3JSHE6dmc/yyejpCQr8es3OmgjVKVjDG+gvYyzrMcaMVkL+HFl44PLq4E30KiJP6FDjd0ErfBxBZT4la01jSFNQgoE0DxGTUgL3+8lO5pIKyjDdA1xja0oLroR0w2UFCNo8+KFfBKhWKK8ZKVmYFUdaVh0eNwYb79VDFBze1EanEQ9IlZZk65L0a1xtYyQbYc8zKbg/guT/nxWiUC7LC5ztWS44euOwhDJ+i73k3ajWHgkdCEdlBOpZrwlK0ZpD9m+J6xNPjz4Wj8ZDp4Ygdq6X2GLp9VTpwQ4QIAAA==" + } + }, + { + "ID": "d323529b2485cade", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0003?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:16 GMT" + ], + "Etag": [ + "aYCSY0ris6vF95xjwQk65A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42RXW+CMBiF/0t3q7aAgJDsQveRLNFkU3fhlanwilWgrK0fxPjf1za4xH2F3jQ9Pec9T9oz2rEyRTFasexjD6K+U3SVA+ogUDTTOl08zBZEMBkcniP/tD2+7QJ/eH+vHczk5IbneV3QsptCwbsKpIpTqqgEtXSJEznEHSyDICKBHxESeXpbEkKcnu35z+LpCgn5eszKnS7aKFXJGOMraC/jPMuBVkz2El586fjg4krwLSRK4l/ocEMncRtMbDElbkVrTVNYg4AyARSfUQPy8sdL6UwDYR1tgK41NtCC6qL9rIBXKhRTjJeszAyYqisNiB6HC/PVp4oJam4nUouDoE/MMtlyX4xqjaplguxxzMtsDuK7POXH6ykRYIfNda+WHD903UEYOkHf9W7abgwDj4SmtINyKtWEp2zNIP0xw/eMpcGfD0fjJ5PgiR2opfcZunwCsYG+D9UCAAA=" + } + }, + { + "ID": "8cac08485ab3feec", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0003?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "87" + ], + "If-Match": [ + "aYCSY0ris6vF95xjwQk65A==" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJ0aW1lUGFydGl0aW9uaW5nIjp7ImV4cGlyYXRpb25NcyI6bnVsbCwicmVxdWlyZVBhcnRpdGlvbkZpbHRlciI6ZmFsc2UsInR5cGUiOiJEQVkifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:17 GMT" + ], + "Etag": [ + "Q8hVT33taI/7sP2nLAhDAw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42QXW+CMBSG/0t3O22BCULihcYtMWGJc27JrkyFA3RCi22dM8b/vgPTLXEf8Yr0zfvxcPZkJWRKIrIU+XoDendl+bIEck3A8hz1h37xPPc8yyc0MFNXxsNiPNwOBugQTc4Uqix3FZedFCrVsWBslHLLDdiFy5zQYW5/4fsh83shY6GHnwVjzOm2O/9ZPJwwUGaxkCscKqytTUTpCbSbK5WXwGthuomqvnT65tJaq1dIrKG/0NEjnaGXYNIW09CLaFvTDDLQIBMg0Z4cQSZ/XAozR4jWcQnQaaYNXEB1QL+oYMq1FVYoKWTegNldjYBkPHzBQg3rjdDfnjtRWtAkynhpAAvkphrtkBcDjLTPWMl8Dvpcnqnt6ZVo4E3XHMdRcnqB6/aDwPFv3OZU8F4L/dPQ91iA2GgoubH3KhWZgPS8I3Bcv7nD5z/Mh6P4tkmopC1E6emRHD4AnT+vw9oCAAA=" + } + }, + { + "ID": "bfd4ce24c91cd4bf", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0003?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:17 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "1152dee9028a6971", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "112" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJkYXRhc2V0UmVmZXJlbmNlIjp7ImRhdGFzZXRJZCI6ImRhdGFzZXRfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAwMiJ9LCJmcmllbmRseU5hbWUiOiJuYW1lIiwibG9jYXRpb24iOiJFVSJ9Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:18 GMT" + ], + "Etag": [ + "em8j2Aev8yrSn6pl3yNEpA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/41RW2vCMBT+L9lr7U3sDYQ5VoawKXQbPowhMT2t0TTpktRRxP++VKrsQcWnwHe+2znZoy3lOUrQipY/Dcj2IccaK9DIQqBxaSZQRRt/Aruole88qNmwnaX1ZDw2DNop1Vow1laYD3KoxECD0klvsvRdL/ZcP1oGQewGo9h146F5lq7r+kavgBWvlG+Ny1rrWiWOc+phl0KUDHBNlU1Edcadne/UUmyAaOVciHb6aOXc2aGnZVCABE4AJfsTNu3Wu9Om7zS9chF0sFAhKfCctTNcmRTEu8dCmBBQCiVfeyQF6waLbPqRZt15aiAUsxcpmtrgfcRCUg1SGcezYr6Y3RDMf/kVfqNAPrVphSkzaNdzIMVK6McLG9gUV3ZpBDtKwJQWDdfdz/z3zdLJ840iGeD82OTbQkQC1lTwD3o8hjcKfT8KQy+MQs8YMKz0m8hpQSG/RhHk6GBG6Sc6/AEaYK+sygIAAA==" + } + }, + { + "ID": "e454119731b44203", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0002?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:18 GMT" + ], + "Etag": [ + "em8j2Aev8yrSn6pl3yNEpA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/41RW2vCMBT+L9lr7U3sDYQ5VoawKXQbPowhMT2t0TTpktRRxP++VKrsQcWnwHe+2znZoy3lOUrQipY/Dcj2IccaK9DIQqBxaSZQRRt/Aruole88qNmwnaX1ZDw2DNop1Vow1laYD3KoxECD0klvsvRdL/ZcP1oGQewGo9h146F5lq7r+kavgBWvlG+Ny1rrWiWOc+phl0KUDHBNlU1Edcadne/UUmyAaOVciHb6aOXc2aGnZVCABE4AJfsTNu3Wu9Om7zS9chF0sFAhKfCctTNcmRTEu8dCmBBQCiVfeyQF6waLbPqRZt15aiAUsxcpmtrgfcRCUg1SGcezYr6Y3RDMf/kVfqNAPrVphSkzaNdzIMVK6McLG9gUV3ZpBDtKwJQWDdfdz/z3zdLJ840iGeD82OTbQkQC1lTwD3o8hjcKfT8KQy+MQs8YMKz0m8hpQSG/RhHk6GBG6Sc6/AEaYK+sygIAAA==" + } + }, + { + "ID": "8d3d9e6b3a3a89bb", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0002?alt=json\u0026deleteContents=false\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:19 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "71a529607d51c3ba", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:19 GMT" + ], + "Etag": [ + "gs3AYtwXmh7aF/dUsSnjCA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42RbWvCMBSF/0v2VZu0vtQWhLnNDWEvUBU3xpCYXmu0TbokVUT870ulyj6o+Clwcs65T252aMVFjEI048lvAWp7F1NDNRhUQ2BoYm8S3eh9mc1ntvDpM47HeiiWj71u1zp4mdQLmabbjIp6DJmsG9AmrEqmHnEDl3idabsdkHYrICRo2GNKCHFtXkM6f+ViZVsWxuQ6xPjI4SRSJinQnGuHyeyk47WHcyWXwIzGZ0bjarTGNzJUtgjmoEAwQOHuqA3K591YUzENLmwE7WuIMgZao/B7h5RM7SA0iQajflQuIgfGafqiZJFbvSqbKG5AaZs9JT4m71cCHxtxwV9oUA/bfkZ5atWSqK7kTJr7M6wOp5mT2MCaM7DQshCm/IP/vVG/93QFJAIaH0h+aogpoIZLMeJZmXRbvud1fJ/4zWbTFqRUmzcZ8zmH+JJFskODvRoP0f4PCVPOULQCAAA=" + } + }, + { + "ID": "dd0fee87e150af29", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/does_not_exist?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 404, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:19 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/62OsQ7CMAxE935FlJlKDJ06Vx3bBSaEKkNMqZTEUuxKoKr/ThIy8AFM1vnsd7dVSmkMgYJu1RZFlHcyGFVzbA7fhUNmmNNODyTqQas3repAgFEUP8natwNfG3RUC7K0hpAnTzLha2HRhZNzOGIuWasS+M+MzDLkYPEJNVu6gf31AgJT9uJrn1J0Mfc8r6UrC8jKuc54mvrxPHTpcK/26gOm62vXNAEAAA==" + } + }, + { + "ID": "ad5a63405b6cae67", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "74" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJkYXRhc2V0UmVmZXJlbmNlIjp7ImRhdGFzZXRJZCI6ImRhdGFzZXRfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAwMyJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:20 GMT" + ], + "Etag": [ + "BsNiNGQ6iMsm3h86/XQ0Pw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42RUWvCMBSF/0v2qm2ss2pB2GQiwtTZORyMITG91jvTpktSRcT/vlSq7EHFp8DJOed+udmTNaYRCcgC498c1O4hYoZpMKRCwLDY3nT1CEf9iY9DndRXLd/9nNC3badjHVgk9UoKsUtYWo0gkVUD2gRlydyjtXaNeq2577ep32hT2q7bY04prdu8BrF8xXRtW1bGZDpw3ROHE0sZC2AZaofL5Ky7G8/NlPwBbrR7YbRbjtbunQylLYQlKEg5kGB/0gbF8+6sKZkGVzZCDhXCOAetSfC1J0oKO4jMwsG0FxaLyIAjE30l88zqZdlMoQGlbfacGM9GNwLjbXrFn2tQ3V0vYSisWhBVlVxI83SB1UGWOLENbJCDhZZ5aoo/+N8b9p5fboCEwKIjyXeFcAXMoEynmBTJWqPpea1m06PeY7E4wbQZygiXCNE1i+THBnv18U4Of/r/Bp+0AgAA" + } + }, + { + "ID": "ff9c4499e0d0f8f2", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0003?alt=json\u0026deleteContents=false\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:20 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "5216747da6c55790", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "74" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJkYXRhc2V0UmVmZXJlbmNlIjp7ImRhdGFzZXRJZCI6ImRhdGFzZXRfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAwNCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:21 GMT" + ], + "Etag": [ + "xEvfhxdEvTOWvagy/brMPw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42RXWvCMBiF/0t2q/3I/GpB2MbKEOYcnaMXY0hM39bMtOmStFrE/75UquxCxavAyTnnffJmh9Ysj5GPliz9LUHWdzHRRIFGHQSapOZmG1TJahsH1XwWVSSt7aWcvm/GY+NgTVKtBOd1RvJuDJnoalDab0sW2HE918GjxWDgOYO+5zjevTkWjuP0TF4BT15ZvjYtK60L5dv2kcNKhUg5kIIpi4rspNsVtgspfoBqZZ8ZbbejlX0jQ2sLIQEJOQXk747apHnejTUt0+TCRtC+gwiloBTyv3ZICm4GoSiczIOwWUQBlBH+IkVZGL0tiyTTIJXJnhKz6O1KYLbJL/hLBfKpDjLCuFEboq4US6EfzrBajGRWagIVo2CgRZnr5g/+94bB4/MVkBBIfCD57iAqgWgm8jnLmqTbH2I8Gg6xi3vYFHCi9FTELGEQX7IIemgwV58faP8HYF01VLQCAAA=" + } + }, + { + "ID": "c37fe938a3b20714", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0004/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "153" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDQiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRhYmxlXzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDQifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:21 GMT" + ], + "Etag": [ + "+5BPv6XuuESE0Eks2iCBbA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42QX2+CMBTFv0v3uGlLJygkPsjCwxKXLOqSvZkKV+yEltHiQozffZdG9rB/4ant6Tk9v94zOUqVkYjsZP7eQN3eWLErgNwRsCJH/daPn0/Ba9Mk64QlR8PlQ7xbzOfokF3OHHRRtKVQowxKPbJgbJQJKwzYLWde6DE+2wZByAI/ZCy8x2XLGJuMXc+/FqwwUOyXUh2x6GBtZSJKe9BxrnVegKikGae6/NLpidOq1m+QWkN/oaNXOkOHYFKHaeggWmdawR5qUCmQ6EyuII9/TAozVwjnGALU17jAAKoLDjE9QCkQB/eqKeMWqzHMiDsutco3UH+XV/qjP6U1CCu12sgSP0U8f8r5bDrl3iSY4XUhjH3SmdxLyH5YAr+z2Lbq5M0iXiZdQqfuQZRe1uTyCfc+2hGEAgAA" + } + }, + { + "ID": "0333c5be8413e358", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0004?alt=json\u0026deleteContents=false\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 400, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:21 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/72PQQuCQBCF7/6KYc8JY5lkt6AIoTxEdYmQLQcTVhd21kOE/7119dAv6DS892b43nwCAEHGaCPW8HHCyacuyakYcTYaDTHLavDEVlrJZIFfWql3I9uwpEaHltiuyzEr5hilEc5XRZKkmCxTxHThRoGIMdQMbGuloG6hYxITwldgR7h5DVOXP+E9ptSNrNuBUin9kOo3MyRZ+8wQ6848KWsv7nza6P28T7+wlbYbfhFZft0csm2xOe0vx11+Hvb7oA++nXKyHnYBAAA=" + } + }, + { + "ID": "96d76e422e436cad", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0004?alt=json\u0026deleteContents=true\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:22 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "2436c3369263bad2", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:22 GMT" + ], + "Etag": [ + "gs3AYtwXmh7aF/dUsSnjCA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42RbWvCMBSF/0v2VZu0vtQWhLnNDWEvUBU3xpCYXmu0TbokVUT870ulyj6o+Clwcs65T252aMVFjEI048lvAWp7F1NDNRhUQ2BoYm8S3eh9mc1ntvDpM47HeiiWj71u1zp4mdQLmabbjIp6DJmsG9AmrEqmHnEDl3idabsdkHYrICRo2GNKCHFtXkM6f+ViZVsWxuQ6xPjI4SRSJinQnGuHyeyk47WHcyWXwIzGZ0bjarTGNzJUtgjmoEAwQOHuqA3K591YUzENLmwE7WuIMgZao/B7h5RM7SA0iQajflQuIgfGafqiZJFbvSqbKG5AaZs9JT4m71cCHxtxwV9oUA/bfkZ5atWSqK7kTJr7M6wOp5mT2MCaM7DQshCm/IP/vVG/93QFJAIaH0h+aogpoIZLMeJZmXRbvud1fJ/4zWbTFqRUmzcZ8zmH+JJFskODvRoP0f4PCVPOULQCAAA=" + } + }, + { + "ID": "a7e5815df464a0e7", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "41" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJkZXNjcmlwdGlvbiI6ImQyIiwiZnJpZW5kbHlOYW1lIjoibjIifQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:23 GMT" + ], + "Etag": [ + "YzOg8uDabREdMsJ19QQPCA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "da31b5eda2068596", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "39" + ], + "If-Match": [ + "gs3AYtwXmh7aF/dUsSnjCA==" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJkZXNjcmlwdGlvbiI6ImQiLCJmcmllbmRseU5hbWUiOiJuIn0K" + ] + }, + "Response": { + "StatusCode": 412, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:23 GMT" + ], + "Etag": [ + "YzOg8uDabREdMsJ19QQPCA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6vmUlBQSi0qyi9SslKoBnKA3OT8lFQgz8TAQAcikJtaXJyYDhJTCihKTc7PS8ksyczPU0jOSE3OVkhLzMxJTdFTgioGG1YMVBsN5itATSXZILCGlPzcxMw8kPr0nPykxBxkuaLUxOJ8sBxEI7KJSlBltWA6Fuq04pLEklKQ05TcHD19XF3iA4Jcnf39XDxDPP39QFpquWq5AH1JwmMSAQAA" + } + }, + { + "ID": "faea53f38565dc75", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "37" + ], + "If-Match": [ + "YzOg8uDabREdMsJ19QQPCA==" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJkZXNjcmlwdGlvbiI6IiIsImZyaWVuZGx5TmFtZSI6IiJ9Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:24 GMT" + ], + "Etag": [ + "yNL/q8jRoElmNa7RVFBHzQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "bdc51f83de22e1d1", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:25 GMT" + ], + "Etag": [ + "yNL/q8jRoElmNa7RVFBHzQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "11b10e65685e63d0", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "39" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJkZWZhdWx0VGFibGVFeHBpcmF0aW9uTXMiOiIzNjAwMDAwIn0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:25 GMT" + ], + "Etag": [ + "82fDkwNf6G0lWINzlSWb2A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "04e2e7bc83a46cd3", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "23" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJmcmllbmRseU5hbWUiOiJ4eXoifQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:26 GMT" + ], + "Etag": [ + "7RnTP/b60fUeA//pVhQgAg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "666f6234d8f9226a", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "34" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJkZWZhdWx0VGFibGVFeHBpcmF0aW9uTXMiOm51bGx9Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:27 GMT" + ], + "Etag": [ + "Ju4EHHqB6coSrRM7CG640A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/41R3U7CMBh9l3oLrMyxwRISQYlgBJOB4cIYUrqPUe3W0XboJL67LRnEGDBcNTk9fz3doXeWxShES5ZsCpDlVUw0UaBRDYEmibl5KLzBcLjp+1RMZTQObu99D/e6XcNgVqnWgvMyJVk9hlTUNSgdViYLFzc7Tey2F77fwX6rg3Hn2hwLjHHT6BXw1SPL3o3LWutchY5z6NFIhEg4kJypBhXpEXe2rpNL8QZUK+dEtFNFK+fCDhUtghVIyCigcHfARvZ5F9pUnUZnFkHfNbSSDLKYlxOSmhT0WX7ZeFBUslwzkRnMAIRSUAqFLzskBbfEeTSaDSI7Vw6UEX4vRZEbvIqcS6ZBKpNwVDzNJ/8Inj6yM/xCgeyXg5QwblDbuy7FUuibEy9qMJI2EiPYMgqmtCgybX/qt2806N39UyQCEu+bvNYQlUDsCDO2H6fZCly3HQQ48DzPGHCi9FjEbMUg/kNxAy8ILEVQUs34PEXfP5i88/LaAgAA" + } + }, + { + "ID": "b135c79f00d9ca1a", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:27 GMT" + ], + "Etag": [ + "Ju4EHHqB6coSrRM7CG640A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "eb71c152631f03cd", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "299" + ], + "If-Match": [ + "Ju4EHHqB6coSrRM7CG640A==" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJhY2Nlc3MiOlt7InJvbGUiOiJXUklURVIiLCJzcGVjaWFsR3JvdXAiOiJwcm9qZWN0V3JpdGVycyJ9LHsicm9sZSI6Ik9XTkVSIiwic3BlY2lhbEdyb3VwIjoicHJvamVjdE93bmVycyJ9LHsicm9sZSI6Ik9XTkVSIiwidXNlckJ5RW1haWwiOiJ0ZXN0LXJvYm90QHNob2xseW1hbi1kZW1vLXRlc3QuaWFtLmdzZXJ2aWNlYWNjb3VudC5jb20ifSx7InJvbGUiOiJSRUFERVIiLCJzcGVjaWFsR3JvdXAiOiJwcm9qZWN0UmVhZGVycyJ9LHsicm9sZSI6IlJFQURFUiIsInVzZXJCeUVtYWlsIjoiSm9lQGV4YW1wbGUuY29tIn1dfQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:28 GMT" + ], + "Etag": [ + "gssiuE7itlrIEvMCm3TuRA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "802f8f50ceceb493", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "249" + ], + "If-Match": [ + "gssiuE7itlrIEvMCm3TuRA==" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJhY2Nlc3MiOlt7InJvbGUiOiJXUklURVIiLCJzcGVjaWFsR3JvdXAiOiJwcm9qZWN0V3JpdGVycyJ9LHsicm9sZSI6Ik9XTkVSIiwic3BlY2lhbEdyb3VwIjoicHJvamVjdE93bmVycyJ9LHsicm9sZSI6Ik9XTkVSIiwidXNlckJ5RW1haWwiOiJ0ZXN0LXJvYm90QHNob2xseW1hbi1kZW1vLXRlc3QuaWFtLmdzZXJ2aWNlYWNjb3VudC5jb20ifSx7InJvbGUiOiJSRUFERVIiLCJzcGVjaWFsR3JvdXAiOiJwcm9qZWN0UmVhZGVycyJ9XX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:29 GMT" + ], + "Etag": [ + "8RdOge1OhUaADc100cxRQA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "a50d859181ddb439", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:29 GMT" + ], + "Etag": [ + "8RdOge1OhUaADc100cxRQA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "afa006c3d0ad4b33", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "29" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJsYWJlbHMiOnsibGFiZWwiOiJ2YWx1ZSJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:30 GMT" + ], + "Etag": [ + "jJzAA3MMxMe9v3HYhRxLYg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "48e0ff121d859e9f", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "26" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJsYWJlbHMiOnsibGFiZWwiOm51bGx9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:31 GMT" + ], + "Etag": [ + "vzd7TsU8YT5pVc4MbQo+LQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "5ee1731832c8d12e", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "366" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im1vZGUiOiJSRVBFQVRFRCIsIm5hbWUiOiJudW1zIiwidHlwZSI6IklOVEVHRVIifSx7ImZpZWxkcyI6W3sibmFtZSI6ImJvb2wiLCJ0eXBlIjoiQk9PTEVBTiJ9XSwibmFtZSI6InJlYyIsInR5cGUiOiJSRUNPUkQifV19LCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRhYmxlXzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDUifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:31 GMT" + ], + "Etag": [ + "hUw6Vl9tApa5+6B9jBEojQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42Q0W/aMBDG/xfvcS12EiWQSH0gq1UhMdjStC9ThUxyBFMnTmO3HUL8772k0Exlm5AfrPvu++5+uh15lFVOIrKUxdMzNNsvViwVkAsCVhSor+9eg3sV2nEt/K9BHG5irjc/r67QIducWWultqWoLnMo9aUFY6NcWGHALlzmhA5zR4sgCFngh4yFHn4Lxpgz6Pb8z+LjCgNqNZXVYwtibW0iSo+gg0LrQoGopRlkuvzQ6YtL60ZvILOG/oWOHugMPQeTdpiGnkXbmRJYQQNVBiTakQPI5B+XwswBonOcA3Rc0wXOoNrjEbM1lKLFWUlQuSHRrx2pRImE7x+O3NZtdZsmk9kNZvr+c2n6/mSW8hueoFDqvBUS/oOPU379Z6SBrE8k/Ns8ucb6dPVSa9Ub4/l8ysczsn/Ad9Hujbd4Iuww0pVTXRUpNJ/lRL8eq6wBYaWuUtnNd/yh646GQ8/xRu3Z4Hctm1PDyGNDvBQalDD2u84louYnM3zP62HTcTzlbUJn3UCU7m7J/g3mAd7CTQMAAA==" + } + }, + { + "ID": "df4b4c7baf5fcf95", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0005?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "29" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJsYWJlbHMiOnsibGFiZWwiOiJ2YWx1ZSJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:32 GMT" + ], + "Etag": [ + "7ASXQwdJXGCOW5NOB487Ew==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "1c4ebfa02243e306", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0005?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "26" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJsYWJlbHMiOnsibGFiZWwiOm51bGx9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:32 GMT" + ], + "Etag": [ + "F6B0udglhnhjow75plio6Q==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "995fbf2a7dda2f92", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0005?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:32 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "d7c755e681860cf4", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "366" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im1vZGUiOiJSRVBFQVRFRCIsIm5hbWUiOiJudW1zIiwidHlwZSI6IklOVEVHRVIifSx7ImZpZWxkcyI6W3sibmFtZSI6ImJvb2wiLCJ0eXBlIjoiQk9PTEVBTiJ9XSwibmFtZSI6InJlYyIsInR5cGUiOiJSRUNPUkQifV19LCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRhYmxlXzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDYifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:32 GMT" + ], + "Etag": [ + "sarVs1dSxhUPgWc9KMRosQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "93775ac713a86d6a", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026pageToken=\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:33 GMT" + ], + "Etag": [ + "f+PJntftwjCWqzFVVi1pZQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "3ede34b17f792ec4", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0006?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:33 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "17ee9c9f9de84e79", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "366" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im1vZGUiOiJSRVBFQVRFRCIsIm5hbWUiOiJudW1zIiwidHlwZSI6IklOVEVHRVIifSx7ImZpZWxkcyI6W3sibmFtZSI6ImJvb2wiLCJ0eXBlIjoiQk9PTEVBTiJ9XSwibmFtZSI6InJlYyIsInR5cGUiOiJSRUNPUkQifV19LCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRhYmxlXzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDcifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:33 GMT" + ], + "Etag": [ + "SRdCDuNO1r3eNAp+7oGKQw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "ac124c9b205fb704", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0007/insertAll?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "215" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJyb3dzIjpbeyJpbnNlcnRJZCI6ImEiLCJqc29uIjp7Im5hbWUiOiJhIiwibnVtcyI6WzBdLCJyZWMiOnsiYm9vbCI6dHJ1ZX19fSx7Imluc2VydElkIjoiYiIsImpzb24iOnsibmFtZSI6ImIiLCJudW1zIjpbMV0sInJlYyI6eyJib29sIjp0cnVlfX19LHsiaW5zZXJ0SWQiOiJjIiwianNvbiI6eyJuYW1lIjoiYyIsIm51bXMiOlsyXSwicmVjIjp7ImJvb2wiOnRydWV9fX1dfQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:33 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTMK04tKnHMyQlKLS7IB3KUagGmFzWCLgAAAA==" + } + }, + { + "ID": "8a3a3e932a264223", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0007/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:33 GMT" + ], + "Etag": [ + "5qAbjVirb+RatOqJ1QsTEA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qbFjomZYVlFiVpByWW+Bd6GQYWh7g62toCVZTklyTmBOWXFwOVGSjVAgARmFAuUwAAAA==" + } + }, + { + "ID": "44ad7d83bc7ac128", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0007?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:33 GMT" + ], + "Etag": [ + "SRdCDuNO1r3eNAp+7oGKQw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWKk7OSM1NVLKqVkrLTM1JKVayiq5WykvMTVWyglA6SiWVBSBecEiQp5+7Uq0OQr40txgh7+kX4uruGgQUyM1PAQkEuQa4Ooa4uiBrKUpNRugIcnX2D3IB8jGtTsrPz0EodPL393F19FOqjQXCWgCN1fK3tQAAAA==" + } + }, + { + "ID": "d6e5c03edcae9556", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0007/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:35 GMT" + ], + "Etag": [ + "JgR2QcJCb27Nx/hOahTsUw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8p7pQcZBSZ7OScZmftV6Gf4J2aEFIeW29oCVZTklyTmBOWXFwOVGQD5RWBmdLVSGpgsAwonKtXqgFlQvoFSbSxUBFlZSVFpKkgGIokQT0LTbkia9mQ07UYEtcfWAgDAGmPnGQEAAA==" + } + }, + { + "ID": "10bdc9b0f4fd10a5", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0007?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:35 GMT" + ], + "Etag": [ + "SRdCDuNO1r3eNAp+7oGKQw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWKk7OSM1NVLKqVkrLTM1JKVayiq5WykvMTVWyglA6SiWVBSBecEiQp5+7Uq0OQr40txgh7+kX4uruGgQUyM1PAQkEuQa4Ooa4uiBrKUpNRugIcnX2D3IB8jGtTsrPz0EodPL393F19FOqjQXCWgCN1fK3tQAAAA==" + } + }, + { + "ID": "4539880260cb2197", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0007/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:35 GMT" + ], + "Etag": [ + "JgR2QcJCb27Nx/hOahTsUw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8p7pQcZBSZ7OScZmftV6Gf4J2aEFIeW29oCVZTklyTmBOWXFwOVGQD5RWBmdLVSGpgsAwonKtXqgFlQvoFSbSxUBFlZSVFpKkgGIokQT0LTbkia9mQ07UYEtcfWAgDAGmPnGQEAAA==" + } + }, + { + "ID": "f328ec00ac6bf196", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0007?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:35 GMT" + ], + "Etag": [ + "SRdCDuNO1r3eNAp+7oGKQw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWKk7OSM1NVLKqVkrLTM1JKVayiq5WykvMTVWyglA6SiWVBSBecEiQp5+7Uq0OQr40txgh7+kX4uruGgQUyM1PAQkEuQa4Ooa4uiBrKUpNRugIcnX2D3IB8jGtTsrPz0EodPL393F19FOqjQXCWgCN1fK3tQAAAA==" + } + }, + { + "ID": "61f45cfa5330d4a6", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "317" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7ImRlZmF1bHREYXRhc2V0Ijp7ImRhdGFzZXRJZCI6ImRhdGFzZXRfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAwMSIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifSwicXVlcnkiOiJzZWxlY3QgbmFtZSwgbnVtcywgcmVjIGZyb20gdGFibGVfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAwNyIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoib3VRbm1MWlpRY1gwRkN4U0dqU3czUU9DTkR0IiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:35 GMT" + ], + "Etag": [ + "HjFq6yhHO+fcTDSBWHm4Pg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "537f1bc2805777c2", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/ouQnmLZZQcX0FCxSGjSw3QOCNDt?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:36 GMT" + ], + "Etag": [ + "4JaijwfgkwEW+eURZNb6FA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/22RUW+CMBSF/8vd4zAxcdkDiQ+I1bkQkKLZ4rKHUi4ItpTREkeM/33FLWEPpg/tSc9377ntBU5lnYELaVl8ddj2DwWaeDhQ1J0w2m6NqjWCA2hYYZ1Pr6ysznlxOpO3R9zTQ5g+r7z53Do0P6Jk4F4gL1FkGtyPC9RMosVumwOmbwaV7OgmXFstVTbocB8E3iIgcHVGopN6JDbhjqwJHRFKtsTbkeV/pEU+EpT4EV3e6eHciZcqJUZ0EUUB8cJ7+T7tcqBSKcUcW6w5DvM2raqQm83wlPqohOglqycZSjUxqA3ciNut6uJaBodDzN+nK/87WVfJeRZHfrgcXEJxZkpVW+M+sZOBUYYJqs42LMzgTy96W3TbKo5a41B0+tvAV7IRaGwi03boAGf2Q15KA27OhMbrD53IeR7uAQAA" + } + }, + { + "ID": "96816cb3efe657dd", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anond13e8789_5ef6_44f7_ae8e_78e4e7bfb3e0/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:36 GMT" + ], + "Etag": [ + "9xxCEEYwkv1ewcgeOLRqlg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8pbVlQ4u7pGlmeXGaaWJ6en+vsEFeak29oCVZTklyTmBOWXFwOVGQP5RWBmdLVSGpgsAwonKtXqgFlQvoFSbSxUBFlZSVFpKkgGIokQT0LTbkia9mQ07UYEtcfWAgAnKK9AGQEAAA==" + } + }, + { + "ID": "75d1f70d0cc24547", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "317" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7ImRlZmF1bHREYXRhc2V0Ijp7ImRhdGFzZXRJZCI6ImRhdGFzZXRfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAwMSIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifSwicXVlcnkiOiJzZWxlY3QgbmFtZSwgbnVtcywgcmVjIGZyb20gdGFibGVfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAwNyIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiNHlUSUNXMUlpVjZsbFIzY3hsdkNYaXJYa2NHIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:37 GMT" + ], + "Etag": [ + "U0IxqCCb5F6Vnn+txcTriw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "727bfdc6907eaed6", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/4yTICW1IiV6llR3cxlvCXirXkcG?alt=json\u0026fields=configuration%2CjobReference%2Cstatus%2Cstatistics\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:37 GMT" + ], + "Etag": [ + "U0IxqCCb5F6Vnn+txcTriw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "a7f698816766a65e", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/4yTICW1IiV6llR3cxlvCXirXkcG?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:37 GMT" + ], + "Etag": [ + "/35mPTToGRSOe2xHaoijag==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/22RTW/CMAyG/4t3LdoH2w6VOECJoFLVslA2pGmHkJpSSOquSTcqxH9fyiZ1B5SD8yp+7NfOCQ5FmYEPmyL/bLBub3K0L92Fo2mUNS5UVBoED9CK3GXeDp/0Ik1pxpcJPhzngoq9yEcjl2HkDrUA/wTbAlVmwH8/QSk0OuwSPLBt1allysN45rSmrNPxKorGk4jB2euJRpueCOOUzRjvEc4WbJyy6X+kRtkTnAUJn17p4V2xtyFSPTpJkoiN42v+PtzxYE8bjlussZTYzVvVtEdpw26VZkdKtVqUgww1DSwaCxfi8vrYpmHwdh8Wr89K8aE8qq9gXdTrg+zWoUgKW1DpEldLNxlYskJx+nZmYQh/etK6oouaJBqDXdG73wYB6UqhdY5s3aAHUrgPmRcW/K1QBs8/T8bkgO4BAAA=" + } + }, + { + "ID": "05ce8bfa16bbaee1", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon45da6c1e_b71e_45e9_8302_3fb1a2c7db5d/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:38 GMT" + ], + "Etag": [ + "hoEQtF68hWR8Sjgk+/Q1RQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8pn5LsGlriZWWSEB1kEZ6Vna+sHGgYF2toCVZTklyTmBOWXFwOVGQP5RWBmdLVSGpgsAwonKtXqgFlQvoFSbSxUBFlZSVFpKkgGIokQT0LTbkia9mQ07UYEtcfWAgAAy5uSGQEAAA==" + } + }, + { + "ID": "00cfdf95526acab9", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/4yTICW1IiV6llR3cxlvCXirXkcG?alt=json\u0026fields=status%2Cstatistics\u0026location=US\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:38 GMT" + ], + "Etag": [ + "0lSl6hqGDmj6EW4bJ6khrg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "01032ad8f0d10781", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0007/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:38 GMT" + ], + "Etag": [ + "JgR2QcJCb27Nx/hOahTsUw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8p7pQcZBSZ7OScZmftV6Gf4J2aEFIeW29oCVZTklyTmBOWXFwOVGQD5RWBmdLVSGpgsAwonKtXqgFlQvoFSbSxUBFlZSVFpKkgGIokQT0LTbkia9mQ07UYEtcfWAgDAGmPnGQEAAA==" + } + }, + { + "ID": "cbee37495f0eaeba", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0007?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:38 GMT" + ], + "Etag": [ + "SRdCDuNO1r3eNAp+7oGKQw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWKk7OSM1NVLKqVkrLTM1JKVayiq5WykvMTVWyglA6SiWVBSBecEiQp5+7Uq0OQr40txgh7+kX4uruGgQUyM1PAQkEuQa4Ooa4uiBrKUpNRugIcnX2D3IB8jGtTsrPz0EodPL393F19FOqjQXCWgCN1fK3tQAAAA==" + } + }, + { + "ID": "bf1bacedfc1135fb", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0007/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:38 GMT" + ], + "Etag": [ + "JgR2QcJCb27Nx/hOahTsUw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8p7pQcZBSZ7OScZmftV6Gf4J2aEFIeW29oCVZTklyTmBOWXFwOVGQD5RWBmdLVSGpgsAwonKtXqgFlQvoFSbSxUBFlZSVFpKkgGIokQT0LTbkia9mQ07UYEtcfWAgDAGmPnGQEAAA==" + } + }, + { + "ID": "3f9e21e5ad8a6b35", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0007?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:38 GMT" + ], + "Etag": [ + "SRdCDuNO1r3eNAp+7oGKQw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWKk7OSM1NVLKqVkrLTM1JKVayiq5WykvMTVWyglA6SiWVBSBecEiQp5+7Uq0OQr40txgh7+kX4uruGgQUyM1PAQkEuQa4Ooa4uiBrKUpNRugIcnX2D3IB8jGtTsrPz0EodPL393F19FOqjQXCWgCN1fK3tQAAAA==" + } + }, + { + "ID": "e0cc36762fd4ee1f", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0007/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:39 GMT" + ], + "Etag": [ + "JgR2QcJCb27Nx/hOahTsUw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8p7pQcZBSZ7OScZmftV6Gf4J2aEFIeW29oCVZTklyTmBOWXFwOVGQD5RWBmdLVSGpgsAwonKtXqgFlQvoFSbSxUBFlZSVFpKkgGIokQT0LTbkia9mQ07UYEtcfWAgDAGmPnGQEAAA==" + } + }, + { + "ID": "892d67e651508440", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0007?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:39 GMT" + ], + "Etag": [ + "SRdCDuNO1r3eNAp+7oGKQw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWKk7OSM1NVLKqVkrLTM1JKVayiq5WykvMTVWyglA6SiWVBSBecEiQp5+7Uq0OQr40txgh7+kX4uruGgQUyM1PAQkEuQa4Ooa4uiBrKUpNRugIcnX2D3IB8jGtTsrPz0EodPL393F19FOqjQXCWgCN1fK3tQAAAA==" + } + }, + { + "ID": "a9f2c96c0ac634ba", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0007?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:39 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "ca1d768edd21972c", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "2077" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "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" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:39 GMT" + ], + "Etag": [ + "W0kLF+Aew/VCOw2KtSvzYA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/+2WUXOaQBSF/8v2sYkgxijM5AEVHaaoKWA7mU7H2cCKVGDpssZaJ/+9C0ExsEFt+tgn5u7cb8/hcljYgZUfuUABj773c43I9gOFjwECVwBR6LH1r+LKGH5U0Ub40p9upE/Uevr9oN7dsQ4/5ZIlDoJtCKNrF4X4mqKEKi6kMEF0LolNuSlK3fntrSzetmVRlFvsMhdFsdnIdOpaukwiQcHC8KMVE1pSGieKIOyNNjyMvQDB2E8aDg4P68KTJMQE/0AOTQSOOyF3lwjn2BQym4lwltusyUQLRFDkIKDsQG5Ef2NSjMlNZB3nGNrLZMAZrp7ZEJ0lCmFqZ+GjwE2A8m0HIhgyh2CSXtiW2zitLNvUJyNWh9hNa1P7PNNNbcB2ORC9LXNeIL0HW7PqCT2iyEOkYPSJrY00s54aBhjSghkaU9U+4QxjlofoyNt0amjqpJ6y/ZA9CRjGBWfrY82y1fF9PTmA9Gh2A9XWTiu9Fjm9/2sm1TjNTdYhIr5TYJPZWDP1fj01QtgjMF5uL4uDRYkfeSohsBa815h1XipKJCcaVTSLRgms5KOK5fkogZyQVNFDSEowNylVPH2SJbIcF74mR+60EgfkBacK58EpsZz0VNFDev4iCSZyMHELxtT6U3PAid0V5wB7yd9lmX2X4CWn2feKaGk8VeV8PO9X/rfa/8f85piZOojW4ct3UQEiyEoDR56NSHnZxJt95RAEqY+j7IhXQLPdkaRup9OSb27Snwn0K/ZJtaHbEjvsw84aApjQMXZ9dgduZY+2JB8dG2rPSF/9ADvZhmxpZoHnP5Sf6BD8CQAA" + } + }, + { + "ID": "3ad32e1bacd89174", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0008/insertAll?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "1350" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "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" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:39 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTMK04tKnHMyQlKLS7IB3KUagGmFzWCLgAAAA==" + } + }, + { + "ID": "70d2cca5d44e0d9c", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0008?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:39 GMT" + ], + "Etag": [ + "W0kLF+Aew/VCOw2KtSvzYA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/+3Uz2qDMADH8XfJ2SfwZmsqgRq7mB7G6CFoZgX/EbODiO++uolpk0xx3XGnksOnP4lf7EGbXHnJgNuD95wXaQvctx5UrOTABXj8cYDsmvEUU4JwcDuXdTqeCXw5IwJ9MDiz2HWSt4rsXimMlwWqJM+4UAZhCgNIltWhqJlU5nCMPLryZHVdcFbdPVsUHaGHlxXNS95KVjbKURTCmHrhaVn6TN7dne9RuL70OLL+/49m3Fh3+KPkIk8Uw+cQErRfVgGvM8Gaa7cth1iKvMo8IdgiPMHbo9uq0KQlDZN+paFBow+TTX1o0BKJSedINGwtxeTjm9Sknot90zK3vmSBtnBMPIWjWUs9Jp3r+UUJhCe1SJUhcB8R35KdY/mAffe3rdmnBrd8zS7GqHY95vJ0Pc8v/+32/zX/eM2XYfgEGv3PqmQHAAA=" + } + }, + { + "ID": "f7c0b0e8a9c60fa9", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0008/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:40 GMT" + ], + "Etag": [ + "a468H12rjAJ6Z9aUebIkYg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "f2262f6538de5759", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0008/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:40 GMT" + ], + "Etag": [ + "a468H12rjAJ6Z9aUebIkYg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "b9aa8b7ac378c11d", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0008?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:40 GMT" + ], + "Etag": [ + "W0kLF+Aew/VCOw2KtSvzYA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/+3Uz2qDMADH8XfJ2SfwZmsqgRq7mB7G6CFoZgX/EbODiO++uolpk0xx3XGnksOnP4lf7EGbXHnJgNuD95wXaQvctx5UrOTABXj8cYDsmvEUU4JwcDuXdTqeCXw5IwJ9MDiz2HWSt4rsXimMlwWqJM+4UAZhCgNIltWhqJlU5nCMPLryZHVdcFbdPVsUHaGHlxXNS95KVjbKURTCmHrhaVn6TN7dne9RuL70OLL+/49m3Fh3+KPkIk8Uw+cQErRfVgGvM8Gaa7cth1iKvMo8IdgiPMHbo9uq0KQlDZN+paFBow+TTX1o0BKJSedINGwtxeTjm9Sknot90zK3vmSBtnBMPIWjWUs9Jp3r+UUJhCe1SJUhcB8R35KdY/mAffe3rdmnBrd8zS7GqHY95vJ0Pc8v/+32/zX/eM2XYfgEGv3PqmQHAAA=" + } + }, + { + "ID": "0cb1cee7003b654d", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0008?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:40 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "446ee1667ae24250", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "667" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "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" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:40 GMT" + ], + "Etag": [ + "LlogGDUyln0N6GmOz/nUhw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "19afe4a505946726", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0009/insertAll?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "207" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJyb3dzIjpbeyJpbnNlcnRJZCI6InJZNUFWUXpJVlF4V1JFTFFEYzdCZjFHWjJDcyIsImpzb24iOnsiQm9vbGVhbiI6bnVsbCwiQnl0ZXMiOm51bGwsIkRhdGUiOm51bGwsIkRhdGVUaW1lIjpudWxsLCJGbG9hdCI6bnVsbCwiR2VvZ3JhcGh5IjpudWxsLCJJbnRlZ2VyIjpudWxsLCJTdHJpbmciOm51bGwsIlRpbWUiOm51bGwsIlRpbWVzdGFtcCI6bnVsbH19XX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:40 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTMK04tKnHMyQlKLS7IB3KUagGmFzWCLgAAAA==" + } + }, + { + "ID": "d01641ed7408ddd6", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0009/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:41 GMT" + ], + "Etag": [ + "nh/yC0Of4zcCB0TxUk2s5g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8rnZehXOhv4p5lUJTs7GYRUhGYbFZum29oCVZTklyTmBOWXFwOVGQD5RWBmdLVSGpgsU7LKK83JqdUZKGYsEAIASQ+aU+gAAAA=" + } + }, + { + "ID": "994533755987eab3", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0009?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:41 GMT" + ], + "Etag": [ + "LlogGDUyln0N6GmOz/nUhw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/23RwWrDMAwA0H/RuV+Qm9uonqGxi+PBytjBpFoaiOPguIcQ+u/rdpidbOgk9CSBtMDU3MhZKBb47Ki/TlC8LzBYR1BAHUM3tLCDOI8/udFCcnjsfsV+jjQlsL8YrPO6GCK1FJIQ0iBHnZtj721M4nhSzKx2eN+THbItSp2QydyYztEUrRuTMqLC2rDqnLvSRkqkZAa3U9YDtr1r8d2/VfLuKHRNQvK1Qi0OueHk22DH25wUR8U1O79ccqep8eGakMaD0uUz//uqt39O/PGMxxcmuQC34gEAAA==" + } + }, + { + "ID": "cdb966ca9b1fc949", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0009/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:41 GMT" + ], + "Etag": [ + "nh/yC0Of4zcCB0TxUk2s5g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8rnZehXOhv4p5lUJTs7GYRUhGYbFZum29oCVZTklyTmBOWXFwOVGQD5RWBmdLVSGpgsU7LKK83JqdUZKGYsEAIASQ+aU+gAAAA=" + } + }, + { + "ID": "30636bb05db80032", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0009?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:41 GMT" + ], + "Etag": [ + "LlogGDUyln0N6GmOz/nUhw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/23RwWrDMAwA0H/RuV+Qm9uonqGxi+PBytjBpFoaiOPguIcQ+u/rdpidbOgk9CSBtMDU3MhZKBb47Ki/TlC8LzBYR1BAHUM3tLCDOI8/udFCcnjsfsV+jjQlsL8YrPO6GCK1FJIQ0iBHnZtj721M4nhSzKx2eN+THbItSp2QydyYztEUrRuTMqLC2rDqnLvSRkqkZAa3U9YDtr1r8d2/VfLuKHRNQvK1Qi0OueHk22DH25wUR8U1O79ccqep8eGakMaD0uUz//uqt39O/PGMxxcmuQC34gEAAA==" + } + }, + { + "ID": "cf7b1f678bd34d5a", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0009/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:42 GMT" + ], + "Etag": [ + "nh/yC0Of4zcCB0TxUk2s5g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8rnZehXOhv4p5lUJTs7GYRUhGYbFZum29oCVZTklyTmBOWXFwOVGQD5RWBmdLVSGpgsU7LKK83JqdUZKGYsEAIASQ+aU+gAAAA=" + } + }, + { + "ID": "40b537bd9ad8dcdd", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0009?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:41 GMT" + ], + "Etag": [ + "LlogGDUyln0N6GmOz/nUhw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/23RwWrDMAwA0H/RuV+Qm9uonqGxi+PBytjBpFoaiOPguIcQ+u/rdpidbOgk9CSBtMDU3MhZKBb47Ki/TlC8LzBYR1BAHUM3tLCDOI8/udFCcnjsfsV+jjQlsL8YrPO6GCK1FJIQ0iBHnZtj721M4nhSzKx2eN+THbItSp2QydyYztEUrRuTMqLC2rDqnLvSRkqkZAa3U9YDtr1r8d2/VfLuKHRNQvK1Qi0OueHk22DH25wUR8U1O79ccqep8eGakMaD0uUz//uqt39O/PGMxxcmuQC34gEAAA==" + } + }, + { + "ID": "c979e263c9592f62", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0009?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:42 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "fb5501deddc50357", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "667" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "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" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:42 GMT" + ], + "Etag": [ + "PMfCB7YDCQa3Nn7uDu/xiQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "ed2779d65db61dd9", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0010/insertAll?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "207" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJyb3dzIjpbeyJpbnNlcnRJZCI6IjdRMmZBM0QzNG9EN0o5cFNmUDZVc3I0VkEzNCIsImpzb24iOnsiQm9vbGVhbiI6bnVsbCwiQnl0ZXMiOm51bGwsIkRhdGUiOm51bGwsIkRhdGVUaW1lIjpudWxsLCJGbG9hdCI6bnVsbCwiR2VvZ3JhcGh5IjpudWxsLCJJbnRlZ2VyIjpudWxsLCJTdHJpbmciOm51bGwsIlRpbWUiOm51bGwsIlRpbWVzdGFtcCI6bnVsbH19XX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:42 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTMK04tKnHMyQlKLS7IB3KUagGmFzWCLgAAAA==" + } + }, + { + "ID": "61df195aaa5fc1bb", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0010?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:42 GMT" + ], + "Etag": [ + "PMfCB7YDCQa3Nn7uDu/xiQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/23RwWrDMAwA0H/RuV+Qm9uonqGxi+PBytjBpFoaiOPguIcQ+u/rdpidbOgk9CSBtMDU3MhZKBb47Ki/TlC8LzBYR1BAHUM3tLCDOI8/udFCcnjsfsV+jjQlsL8YrPO6GCK1FJIQ0iBHnZtj721M4nhSzKx2eN+THbItSp2QydyYztEUrRuTMqLC2rDqnLvSRkqkZAa3U9YDtr1r8d2/VfLuKHRNQvK1Qi0OueHk22DH25wUR8U1O79ccqep8eGakMaD0uUz//uqt39O/PGMxxcmuQC34gEAAA==" + } + }, + { + "ID": "986acf56a18b37a1", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0010/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:42 GMT" + ], + "Etag": [ + "wIC4LkcvUWLDDKbQ80B2PA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qXezqb+GQnl4WG+7i4eCcFWhg4GQU42toCVZTklyTmBOWXFwOVGQD5RWBmdLVSGpgsU7LKK83JqdUZKGYsEAIAUG9l1ugAAAA=" + } + }, + { + "ID": "d530bfd23d74d044", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0010/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:43 GMT" + ], + "Etag": [ + "wIC4LkcvUWLDDKbQ80B2PA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qXezqb+GQnl4WG+7i4eCcFWhg4GQU42toCVZTklyTmBOWXFwOVGQD5RWBmdLVSGpgsU7LKK83JqdUZKGYsEAIAUG9l1ugAAAA=" + } + }, + { + "ID": "930383573429ad49", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0010?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:43 GMT" + ], + "Etag": [ + "PMfCB7YDCQa3Nn7uDu/xiQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/23RwWrDMAwA0H/RuV+Qm9uonqGxi+PBytjBpFoaiOPguIcQ+u/rdpidbOgk9CSBtMDU3MhZKBb47Ki/TlC8LzBYR1BAHUM3tLCDOI8/udFCcnjsfsV+jjQlsL8YrPO6GCK1FJIQ0iBHnZtj721M4nhSzKx2eN+THbItSp2QydyYztEUrRuTMqLC2rDqnLvSRkqkZAa3U9YDtr1r8d2/VfLuKHRNQvK1Qi0OueHk22DH25wUR8U1O79ccqep8eGakMaD0uUz//uqt39O/PGMxxcmuQC34gEAAA==" + } + }, + { + "ID": "9eaacda204d03b05", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0010/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:43 GMT" + ], + "Etag": [ + "wIC4LkcvUWLDDKbQ80B2PA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qXezqb+GQnl4WG+7i4eCcFWhg4GQU42toCVZTklyTmBOWXFwOVGQD5RWBmdLVSGpgsU7LKK83JqdUZKGYsEAIAUG9l1ugAAAA=" + } + }, + { + "ID": "4b2c8e4216cfc48e", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0010?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:43 GMT" + ], + "Etag": [ + "PMfCB7YDCQa3Nn7uDu/xiQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/23RwWrDMAwA0H/RuV+Qm9uonqGxi+PBytjBpFoaiOPguIcQ+u/rdpidbOgk9CSBtMDU3MhZKBb47Ki/TlC8LzBYR1BAHUM3tLCDOI8/udFCcnjsfsV+jjQlsL8YrPO6GCK1FJIQ0iBHnZtj721M4nhSzKx2eN+THbItSp2QydyYztEUrRuTMqLC2rDqnLvSRkqkZAa3U9YDtr1r8d2/VfLuKHRNQvK1Qi0OueHk22DH25wUR8U1O79ccqep8eGakMaD0uUz//uqt39O/PGMxxcmuQC34gEAAA==" + } + }, + { + "ID": "96d76d9aa89a3f61", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0010?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:43 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "7b74af6b043ff349", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "667" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "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" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:43 GMT" + ], + "Etag": [ + "l0WxJ0QYhQ6Nqv7MErhT9g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42SbW+bMBCA/4v3tQ2GLG9I/UAaN2NKSEuoumiaIhcu4BUwtZ22UbT/PkOTQpJuiviA7nju7uHsLXpieYRs9Mji5zWIzRdFH1NAFwgUjXU+xQ9v3/HdIrnres8vvSkRSTCIr640wco6mfA03WQ0v4wg45cKpLIjqqgEtbSwOTCx1V92uwPc7QwwHrT1a4kxNlvVnP8gpqlHSEhXE5Y/6UGJUoW0DWMv2oo5j1OgBZOtkGcfeePFMgrBf0OopPGJnbGzk8Y5mkalKY2zbCvIhxUIyENA9hbtRNx/bErX7CQq4hyh/Ziq4AyrP3qJYQIZLXVWDNJIIvvnFuU004ZorgTL47LppqjiwHe9sa76IIYbbVoDw0VA5s3vbq4gBlETrheQMfGbzE3KqaqJm8nMCQ5mcK5PMm9Mmc0mxPGaTMAyvTGaFTUVuFMyD5zpbZMbUQU1MnICctzlsMFx7SFR1h9T3joDwcIa8u6nxHevm8wYeCxokWxqakxmY9+5/bZocj6EXEQ15JPrmT/S8elR/fhkxb/0c4HydfZ+SjbCqAonPI8DEMdpn7/uo1AAVYzn1e/ayOz0LKvf631td9rlHYO3golToN/GPX0LNZBSqaY8YtozOunRbVuNJTvDCSkreFg11Kl7fYP+AmFW7WF6BAAA" + } + }, + { + "ID": "dc31bfdb538f69ed", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0011/insertAll?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "344" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJyb3dzIjpbeyJpbnNlcnRJZCI6Imp0YVhyNUQyblQxcUZaTzY3SHFXSTE1VmJDNSIsImpzb24iOnsiQm9vbGVhbiI6dHJ1ZSwiQnl0ZXMiOiJBUUlEIiwiRGF0ZSI6IjIwMTYtMTEtMDUiLCJEYXRlVGltZSI6IjIwMTYtMTEtMDUgMTU6MDQ6MDUuMDAwMDA2IiwiRmxvYXQiOjIuMywiR2VvZ3JhcGh5IjoiUE9JTlQoLTEyMi4xOTg5MzkgNDcuNjY5ODY1KSIsIkludGVnZXIiOjEsIk51bWVyaWMiOiIwLjMzMDAwMDAwMCIsIlJlY29yZCI6eyJYIjo0fSwiU3RyaW5nIjoieCIsIlRpbWUiOiIxNTowNDowNS4wMDAwMDYiLCJUaW1lc3RhbXAiOiIyMDE2LTExLTA1VDA3OjUwOjIyLjAwMDAwMDAwOFoifX1dfQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:43 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTMK04tKnHMyQlKLS7IB3KUagGmFzWCLgAAAA==" + } + }, + { + "ID": "ca42cb8c1b6078e7", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0011/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:44 GMT" + ], + "Etag": [ + "kEU0nDtnorkiHoSe7huI5g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/3WPywrCMBBFf0XiRsGGiWnSB3QhVLAgPutKXESMtbS0WFMfSP/dqNi60GEY7p05cJk7SuJsh1y0jaNjKYtbW4ltKn2hxDg+KdRDUolI35PhCjJfZXmRxKN8Ka1DGbDI8zShciXSRX45aQy0L15yfUf71zzr9RVVvbcazAO/NqRWfUxrrYpSNohp2ZT2dWFoaCDcIMQA1nDMBdMFhuFZ/Aca/kMA0yZ8Ng0mYccgOo84tkOdlmlhzh2bs+4H+v7MRNWm0r2pHvDdH2VLAQAA" + } + }, + { + "ID": "641f5cdebbe03252", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0011?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:44 GMT" + ], + "Etag": [ + "l0WxJ0QYhQ6Nqv7MErhT9g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/23RwWrDMAwA0H/RuV+Qm9uonqGxi+PBytjBpFoaiOPguIcQ+u/rdpidbOgk9CSBtMDU3MhZKBb47Ki/TlC8LzBYR1BAHUM3tLCDOI8/udFCcnjsfsV+jjQlsL8YrPO6GCK1FJIQ0iBHnZtj721M4nhSzKx2eN+THbItSp2QydyYztEUrRuTMqLC2rDqnLvSRkqkZAa3U9YDtr1r8d2/VfLuKHRNQvK1Qi0OueHk22DH25wUR8U1O79ccqep8eGakMaD0uUz//uqt39O/PGMxxcmuQC34gEAAA==" + } + }, + { + "ID": "8d97bc62cc5076ab", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0011?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:44 GMT" + ], + "Etag": [ + "l0WxJ0QYhQ6Nqv7MErhT9g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/23RwWrDMAwA0H/RuV+Qm9uonqGxi+PBytjBpFoaiOPguIcQ+u/rdpidbOgk9CSBtMDU3MhZKBb47Ki/TlC8LzBYR1BAHUM3tLCDOI8/udFCcnjsfsV+jjQlsL8YrPO6GCK1FJIQ0iBHnZtj721M4nhSzKx2eN+THbItSp2QydyYztEUrRuTMqLC2rDqnLvSRkqkZAa3U9YDtr1r8d2/VfLuKHRNQvK1Qi0OueHk22DH25wUR8U1O79ccqep8eGakMaD0uUz//uqt39O/PGMxxcmuQC34gEAAA==" + } + }, + { + "ID": "282c22bdc2ba11d4", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0011/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:44 GMT" + ], + "Etag": [ + "kEU0nDtnorkiHoSe7huI5g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/3WPywrCMBBFf0XiRsGGiWnSB3QhVLAgPutKXESMtbS0WFMfSP/dqNi60GEY7p05cJk7SuJsh1y0jaNjKYtbW4ltKn2hxDg+KdRDUolI35PhCjJfZXmRxKN8Ka1DGbDI8zShciXSRX45aQy0L15yfUf71zzr9RVVvbcazAO/NqRWfUxrrYpSNohp2ZT2dWFoaCDcIMQA1nDMBdMFhuFZ/Aca/kMA0yZ8Ng0mYccgOo84tkOdlmlhzh2bs+4H+v7MRNWm0r2pHvDdH2VLAQAA" + } + }, + { + "ID": "7f78f3bc04f23a0c", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0011/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:45 GMT" + ], + "Etag": [ + "kEU0nDtnorkiHoSe7huI5g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/3WPywrCMBBFf0XiRsGGiWnSB3QhVLAgPutKXESMtbS0WFMfSP/dqNi60GEY7p05cJk7SuJsh1y0jaNjKYtbW4ltKn2hxDg+KdRDUolI35PhCjJfZXmRxKN8Ka1DGbDI8zShciXSRX45aQy0L15yfUf71zzr9RVVvbcazAO/NqRWfUxrrYpSNohp2ZT2dWFoaCDcIMQA1nDMBdMFhuFZ/Aca/kMA0yZ8Ng0mYccgOo84tkOdlmlhzh2bs+4H+v7MRNWm0r2pHvDdH2VLAQAA" + } + }, + { + "ID": "29d94ea00cc7cd50", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0011?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:45 GMT" + ], + "Etag": [ + "l0WxJ0QYhQ6Nqv7MErhT9g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/23RwWrDMAwA0H/RuV+Qm9uonqGxi+PBytjBpFoaiOPguIcQ+u/rdpidbOgk9CSBtMDU3MhZKBb47Ki/TlC8LzBYR1BAHUM3tLCDOI8/udFCcnjsfsV+jjQlsL8YrPO6GCK1FJIQ0iBHnZtj721M4nhSzKx2eN+THbItSp2QydyYztEUrRuTMqLC2rDqnLvSRkqkZAa3U9YDtr1r8d2/VfLuKHRNQvK1Qi0OueHk22DH25wUR8U1O79ccqep8eGakMaD0uUz//uqt39O/PGMxxcmuQC34gEAAA==" + } + }, + { + "ID": "c38f590e1aacba44", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0011?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:45 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "def7df2ab3b7858c", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "366" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im1vZGUiOiJSRVBFQVRFRCIsIm5hbWUiOiJudW1zIiwidHlwZSI6IklOVEVHRVIifSx7ImZpZWxkcyI6W3sibmFtZSI6ImJvb2wiLCJ0eXBlIjoiQk9PTEVBTiJ9XSwibmFtZSI6InJlYyIsInR5cGUiOiJSRUNPUkQifV19LCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRhYmxlXzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMTIifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:45 GMT" + ], + "Etag": [ + "1i0CY1MkXrbTixhAJOUBRQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42S0U7CQBBF/2V9FXZbhEITHig2BoOgtSYaY8jSDmWl7dbuqhDCvzutYI2oafqwmTv3zpxMuiUrkYbEJnMRvbxCvjnRfB4DOSWgeYS6Idjwwbha3edzX6yXg8vpnePd9PvoEEVOLWUcbxKeNkJIZEOD0nbINVegZyYzegYzu7NOp8c67R5jvRY+M8aY0Sz3/GMxTFyhIF6MRbrCRUutM2VTegBtRlJGMfBMqGYgky+dvpk0y+UzBFrRX+jonk7ROpi0xFS0Fm1p8mABOaQBEHtL9iCjPy6FmT1E6agDdFhTBmpQ7fCIwRISXuAsBMShIvbjlqQ8QcLPB0dusqK69b3R5AIzVf81UVV/NPHdC9dDIZFhIXjutTvw3fPvkRyCKuG5w6l3jvXx6rmUcWV0ptOxO5iQ3RN+p8VeZ4Mnwg4jZTmWaeRD/lP25PuhCnLgWsjUF+V8o22ZZteyztqdtlX80OtM5MeGbotZeFg0xFzpKxkKRA2PZlimVcH6A2fsFgkZlANRursluw9+EJdSTQMAAA==" + } + }, + { + "ID": "003b5be24f39193c", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0012?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:45 GMT" + ], + "Etag": [ + "1i0CY1MkXrbTixhAJOUBRQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "d00dd89cc00f0049", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0012?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "78" + ], + "If-Match": [ + "1i0CY1MkXrbTixhAJOUBRQ==" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJkZXNjcmlwdGlvbiI6Im1vcmUiLCJleHBpcmF0aW9uVGltZSI6IjE1NzIzNzQ3MDcwMDAiLCJmcmllbmRseU5hbWUiOiJtb3JlIn0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:46 GMT" + ], + "Etag": [ + "/i1JBShzIyD2yYicBdiZdw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "60c0b980faae6d42", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0012?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "21" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJmcmllbmRseU5hbWUiOiJ4In0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:46 GMT" + ], + "Etag": [ + "tdQ8f+rEaSgmViqeU7Navg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "fc7268185c0ac1a9", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0012?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "21" + ], + "If-Match": [ + "/i1JBShzIyD2yYicBdiZdw==" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJmcmllbmRseU5hbWUiOiJ5In0K" + ] + }, + "Response": { + "StatusCode": 412, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:46 GMT" + ], + "Etag": [ + "tdQ8f+rEaSgmViqeU7Navg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6vmUlBQSi0qyi9SslKoBnKA3OT8lFQgz8TAQAcikJtaXJyYDhJTCihKTc7PS8ksyczPU0jOSE3OVkhLzMxJTdFTgioGG1YMVBsN5itATSXZILCGlPzcxMw8kPr0nPykxBxkuaLUxOJ8sBxEI7KJSlBltWA6Fuq04pLEklKQ05TcHD19XF3iA4Jcnf39XDxDPP39QFpquWq5AH1JwmMSAQAA" + } + }, + { + "ID": "709e9c0327d9aec7", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0012?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "293" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7ImZpZWxkcyI6W3sibmFtZSI6Im5lc3RlZCIsInR5cGUiOiJCT09MRUFOIn0seyJuYW1lIjoib3RoZXIiLCJ0eXBlIjoiU1RSSU5HIn1dLCJuYW1lIjoicmVjMiIsInR5cGUiOiJSRUNPUkQifSx7Im1vZGUiOiJSRVBFQVRFRCIsIm5hbWUiOiJudW1zIiwidHlwZSI6IklOVEVHRVIifSx7ImZpZWxkcyI6W3sibmFtZSI6ImJvb2wiLCJ0eXBlIjoiQk9PTEVBTiJ9XSwibmFtZSI6InJlYyIsInR5cGUiOiJSRUNPUkQifV19fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:47 GMT" + ], + "Etag": [ + "2k+dS8/NweEIP0snP6EXRg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "24692315f7c847e6", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0012?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "14" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJzY2hlbWEiOnt9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:47 GMT" + ], + "Etag": [ + "2k+dS8/NweEIP0snP6EXRg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/41TX2/aMBD/Lt7jWuyEkpBIfYA1qpBYQCGTJlUVMskRPBI7s921EeK7185g6Wg35cm6u98/++QD2jOeoxBtWPHzCWTzSdNNCegKgaaF6bv7z/lqjONniGZLovjSi74nxe2tQTDLUztRlk1F+XUOlbjWoHSYU00V6LVLnMAh7njteQHxRgEhwdAca0KIM2h9/gNxXGOhoNzOGd8bo53WtQoxPgcdFEIUJdCaqUEmqj99/MvFtRQ/INMKf5AOn9Ip3CcmbmMq3CttC0pgCxJ4Big8oFOQ2T9eynBOIVpEn0Bnm5bQI9XxCm0lA56XTUwrEwq9WFdQmWS1ZoKbTiWk3bjKdlBRG3vLoMwVCh8OiP8mtYexbmpbrdJkFt8b7W7+VKluPovT6D5KTKMSuW0k0TKapNHdW4qErGMk0ZdFcmfq99YbIcoOOF0s5tEkRsfHv6XcXlrcPDrkH6h1WkLvQL6/6qM1tNecNmZzZkBQW84FL1KQl+1EPJ+rTAK1D52yVt8Z+a479v2bkTfy7T97qZm8BAz9G5/4Zt8GUFKlv4qcmdvklxr+0A26rOlkOo8sQ2T0tNpvK3R8BUBVLhfkAwAA" + } + }, + { + "ID": "fb23ad8a16ca5b66", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0012?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "311" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJzY2hlbWEiOnsiZmllbGRzIjpbeyJtb2RlIjoiUkVRVUlSRUQiLCJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im1vZGUiOiJSRVBFQVRFRCIsIm5hbWUiOiJudW1zIiwidHlwZSI6IklOVEVHRVIifSx7ImZpZWxkcyI6W3sibmFtZSI6ImJvb2wiLCJ0eXBlIjoiQk9PTEVBTiJ9XSwibmFtZSI6InJlYyIsInR5cGUiOiJSRUNPUkQifSx7ImZpZWxkcyI6W3sibmFtZSI6Im5lc3RlZCIsInR5cGUiOiJCT09MRUFOIn0seyJuYW1lIjoib3RoZXIiLCJ0eXBlIjoiU1RSSU5HIn1dLCJuYW1lIjoicmVjMiIsInR5cGUiOiJSRUNPUkQifV19fQo=" + ] + }, + "Response": { + "StatusCode": 400, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:48 GMT" + ], + "Etag": [ + "2k+dS8/NweEIP0snP6EXRg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/92QzU6EQBCE7zxFZ87uZkAlsjfMoiFBorh4MYb0Mi2QzE/CjJuYDe/ugBw87QN46lRVd1JfnwMARuNoRraDsxdetkaQVzecX/0aiqzFbvbY82hOgyABr21PCkEYsqCNA4Wu7eGAR0lgeyPlt0K9EaTMxpF1O4EOLbkm4mES8uiuieOEx7cJ58m1Hw3nPNy6+fzCShht4WEgKUCjIujRQtuj7nwf5UvD52gUlHVRpPdFBs5Alb3UeZXt2UqykFoP8r5oWJH/F+VCI4zCQc8wnTRHlH+zkdCaJRv0CeUg2JpNy/xYn2Uduq/5WSwv39Ii3zdp9Vg/ZeVh3p+CKfgBUCscXD4CAAA=" + } + }, + { + "ID": "94bad9152ebf96c7", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0012?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "342" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im1vZGUiOiJSRVBFQVRFRCIsIm5hbWUiOiJudW1zIiwidHlwZSI6IklOVEVHRVIifSx7ImZpZWxkcyI6W3sibmFtZSI6ImJvb2wiLCJ0eXBlIjoiQk9PTEVBTiJ9XSwibmFtZSI6InJlYyIsInR5cGUiOiJSRUNPUkQifSx7ImZpZWxkcyI6W3sibmFtZSI6Im5lc3RlZCIsInR5cGUiOiJCT09MRUFOIn0seyJuYW1lIjoib3RoZXIiLCJ0eXBlIjoiU1RSSU5HIn1dLCJuYW1lIjoicmVjMiIsInR5cGUiOiJSRUNPUkQifSx7Im1vZGUiOiJSRVFVSVJFRCIsIm5hbWUiOiJyZXEiLCJ0eXBlIjoiU1RSSU5HIn1dfX0K" + ] + }, + "Response": { + "StatusCode": 400, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:48 GMT" + ], + "Etag": [ + "2k+dS8/NweEIP0snP6EXRg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/92Qz0rEMBDG732KoScFt6RVi+1tUZEFXUR3vYiU2WZsA/mDSXZRlr67SezBkw/gafjm+4aZ3xwzgJysNTZv4RhEkL3hFNQFY2c/DUXO4RB7+aM1B8GJw3M/kkLghhxo40Gh70fY4E4SuNFI+aVQLzgps/DkfMvRoyPfVaxsSlZddXXdsPqyYaw5D6VjjJWFj+N/RMqqgGvUcR9yDpY+9sKGY94FSe7AG0AN9CmcF3oAl04s4CTZbYyf5jNSQnaB6DVpmNn/KW7C4kah0JFqkGaH8rdnCZ1JntAHlILnszel+jZ/zXn0+/i1fLV+Wd6vbrrl09324Xa9ifkpm7JvvtAZEVACAAA=" + } + }, + { + "ID": "8bb5c03e938ca416", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0012?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "182" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im1vZGUiOiJSRVBFQVRFRCIsIm5hbWUiOiJudW1zIiwidHlwZSI6IklOVEVHRVIifSx7ImZpZWxkcyI6W3sibmFtZSI6ImJvb2wiLCJ0eXBlIjoiQk9PTEVBTiJ9XSwibmFtZSI6InJlYyIsInR5cGUiOiJSRUNPUkQifV19fQo=" + ] + }, + "Response": { + "StatusCode": 400, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:48 GMT" + ], + "Etag": [ + "2k+dS8/NweEIP0snP6EXRg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/9WQT0vDQBDF7/kUw57bsokaTG8FqxS0iFYvImGaHZKF/QM7a0VKvrubNQdP3j0Nb94M/N47FwCCQvBBrOGcRJKdV5TUpZSLn4UlZuynnXgM/qQVKXjuBrIIyhOD8xEsxm6AAx4NAQ/emC+LbqnI+mUkjmuFEZliW8myKWV13dZ1I+urRsrmIo1WSlmu4vT+x0lZreBWk1EQqKtAM1jNrF0P2oGjT+BMJWbunIsT9lvWMAf8z5kyu/IWtZvQe+OPaH57gZB99rQ7odFKzN6Y5/tcDUeMH1M1Yrd/3dzvbtrN093Lw3Z/mO7HYiy+AQQhsgMaAgAA" + } + }, + { + "ID": "de4ab341ea7c116f", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0012?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "260" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im1vZGUiOiJSRVBFQVRFRCIsIm5hbWUiOiJudW1zIiwidHlwZSI6IklOVEVHRVIifSx7ImZpZWxkcyI6W3sibmFtZSI6ImJvb2wiLCJ0eXBlIjoiQk9PTEVBTiJ9XSwibmFtZSI6InJlYyIsInR5cGUiOiJSRUNPUkQifSx7ImZpZWxkcyI6W3sibmFtZSI6Im5lc3RlZCIsInR5cGUiOiJCT09MRUFOIn1dLCJuYW1lIjoicmVjMiIsInR5cGUiOiJSRUNPUkQifV19fQo=" + ] + }, + "Response": { + "StatusCode": 400, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:49 GMT" + ], + "Etag": [ + "2k+dS8/NweEIP0snP6EXRg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/9WQS0vEQBCE7/kVzZzdMIkazN4WfLCgi+jqRST0ZppkYB4wPa7Ikv/uZMzBk3dPTXV1Q311KgAEheCDWMMpiSR7ryipCynPfhaWmHGYd+Ix+KNWpOC5H8kiKE8MzkewGPsR9ngwBDx6Y74supUi61eROK4VRmSKXS2rtpL1Vdc0rWwuWynb8zQ6KWVVxvn9j5OqLuFWk1EQqK9LH0cKoBmsZtZuAO3A0SdwziaW9JmOU/i3rGHB/P9kmUB5i9rNAIPxBzS/vUDIPnvaHdFoJRZvyvN9KYgjxo+5ILHdvW7ut9fd5unu5eFmt5/vp2IqvgF1KIWvJgIAAA==" + } + }, + { + "ID": "07308d9cf03734c9", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0012?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "214" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im1vZGUiOiJSRVBFQVRFRCIsIm5hbWUiOiJudW1zIiwidHlwZSI6IklOVEVHRVIifSx7ImZpZWxkcyI6W3sibmFtZSI6ImJvb2wiLCJ0eXBlIjoiQk9PTEVBTiJ9XSwibmFtZSI6InJlYyIsInR5cGUiOiJSRUNPUkQifSx7Im5hbWUiOiJyZWMyIiwidHlwZSI6IlJFQ09SRCJ9XX19Cg==" + ] + }, + "Response": { + "StatusCode": 400, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:49 GMT" + ], + "Etag": [ + "2k+dS8/NweEIP0snP6EXRg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6WOMQvCMBCF9/6KI7NDESe3YqsIWqGoi4ikzdEG0kZyqSCl/90kZnB3Ot69e9+9KQFgaIw2bA2TE042WqBTqzRdfBc9EvHW79hWohJgsFmCJLDvJ0JVbE5VDvVooeMEgwZqOuw5i+lAJxe+BQ3xzf/kQBC653LwgFbpmqtfzyAnHTw5vLiSgkVvDvMeC5LldvQF2b68Zod9/siq3eVYlGd/Pydz8gEioPfmJgEAAA==" + } + }, + { + "ID": "b84a64376d6e8840", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0012?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:49 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "36f9de46847c78f2", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "273" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im5hbWUiOiJudW1zIiwidHlwZSI6IklOVEVHRVIifV19LCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRhYmxlXzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMTMifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:35:49 GMT" + ], + "Etag": [ + "auan5KHKNRTv/BJ3TG/aEg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42QwW6CQBCG32V7re4CBYTEQ02ItVoPlJ6axqww4lZgKbvaEuO7d6Bak9o2nCYz8/8z38yebESREJ8sRfq2haq+0nyZAbkmoHmKdb7lhT29m87DaEdH91Y0pjxIh0NUiMan1jLL6pwXvQRy2dOgtJ9wzRXohckMz2DmYOE4HnNsjzHPwrBgjBn9ds8/EsPCFQqy1UwUG1y01rpUPqUn0H4qZZoBL4XqxzL/rtOdSctKvkKsFf2Fjh7pFO2CSVtMRTvRtqIQVlBBEQPx9+QIMvnjU+g5QrSKLkCnNa2hA9UBnxivIecNzkpAlijiP+9JwXMk/Ao4si6b7DEKJ/Mxes79ba7O/ck8CsZBSA4vOBZboxqvwDojbTqTRRpB9bMcyvdTFlfAtZBFJNrphu2a5sB1bzzbah4IH6WoLgUDi7l4OwoyrvSDTAQeklzMcEx2Ro1uR7Ogcci4HYilp0dy+AT9/pl38AIAAA==" + } + }, + { + "ID": "4f4f73da0245f272", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/upload/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false\u0026uploadType=multipart", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "multipart/related", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7ImxhYmVscyI6eyJ0ZXN0IjoiZ28ifSwibG9hZCI6eyJkZXN0aW5hdGlvblRhYmxlIjp7ImRhdGFzZXRJZCI6ImRhdGFzZXRfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAwMSIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QiLCJ0YWJsZUlkIjoidGFibGVfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAxMyJ9LCJ3cml0ZURpc3Bvc2l0aW9uIjoiV1JJVEVfVFJVTkNBVEUifX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6ImJhZG5zMmE2Ujk0cU1EcUdGeFJTa0JNRHIzdyIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K", + "YSwwCmIsMQpjLDIK" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "no-cache, no-store, max-age=0, must-revalidate" + ], + "Content-Length": [ + "902" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:01 GMT" + ], + "Etag": [ + "\"CRkpyt4RXWzE4lvoHDbioIbWdUA/qFUD9S14fSBWTBqL6jZlkwdcMkM\"" + ], + "Expires": [ + "Mon, 01 Jan 1990 00:00:00 GMT" + ], + "Pragma": [ + "no-cache" + ], + "Server": [ + "UploadServer" + ], + "Vary": [ + "Origin", + "X-Origin" + ], + "X-Guploader-Uploadid": [ + "AEnB2Uq2LpGScI81hWG_bxudjNkicrHFEpIvFlhk4739YxsirO_YWbC-cKOy2jllCYtPgT03q5Jtt8ud_dSchAdpB5Ib8audYg" + ] + }, + "Body": "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" + } + }, + { + "ID": "03535bf9d1b44e09", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/badns2a6R94qMDqGFxRSkBMDr3w?alt=json\u0026fields=status%2Cstatistics\u0026location=US\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:01 GMT" + ], + "Etag": [ + "9fMO76bx2CXuFfOb8KaraA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWKi5JLMksLslMLlayqlZKLkoFcvPzQjJzU5WslAxNzY2MLMzNzQxMLIyVdECKi0rQ5QwNzEyVasGSJaVgU0AskJKgUD8/Tz93pdpaAIxHndZoAAAA" + } + }, + { + "ID": "3b6f714709e14694", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/badns2a6R94qMDqGFxRSkBMDr3w?alt=json\u0026fields=status%2Cstatistics\u0026location=US\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:02 GMT" + ], + "Etag": [ + "9fMO76bx2CXuFfOb8KaraA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWKi5JLMksLslMLlayqlZKLkoFcvPzQjJzU5WslAxNzY2MLMzNzQxMLIyVdECKi0rQ5QwNzEyVasGSJaVgU0AskJKgUD8/Tz93pdpaAIxHndZoAAAA" + } + }, + { + "ID": "2ab07b4504675cc1", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/badns2a6R94qMDqGFxRSkBMDr3w?alt=json\u0026fields=status%2Cstatistics\u0026location=US\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:03 GMT" + ], + "Etag": [ + "sXLavZRpATxDVKZU6SI8Ow==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/22QzWrDMBCE32XPDthybAcfQ1rIIQm46an0oFrbIlAkI60TitG7R+vS0IbcpG9m9m+CQJJ0IN0HaCfoPaavs0d9QmihqBohVk1T58tVCRmbPd1rRV5XSUOr7hUhymVSencaDHLZjotDW2RgnFTcUNthpGdtMHAwmW9g/U0/UCTqRkq4cxcm5Q38ekpGH1J12DuvmOQQMyBH0rwYRztGVVUnl8eA/jwv+RrkV5r3bQIr58EVfsrR0GLQAxptkTf+m47v//Jb9SgT5zPRON+TX1x5c9g/QYxXUiozhG8BAAA=" + } + }, + { + "ID": "90f0dd8e1fd62b02", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0013/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:03 GMT" + ], + "Etag": [ + "3lOtnbfXMYJfQqviTcwcww==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8ob5/iX5CWlRfhGeqUFFpZlhiSXJ5eX29oCVZTklyTmBOWXF4OUAflFYGZ0tVIamCwDCicq1epAWAZKtbEgNkIuCS5niCGXDJczAsnF1gIAKKQr4bAAAAA=" + } + }, + { + "ID": "8f8e046c42df9da4", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0013?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:03 GMT" + ], + "Etag": [ + "ghJrG2Y2u9RwCjWPqd/mVw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWKk7OSM1NVLKqVkrLTM1JKVayiq5WykvMTVWyglA6SiWVBSBecEiQp5+7Uq0OQr40txgh7+kX4uruGqRUG1tbCwCcp8mLWAAAAA==" + } + }, + { + "ID": "14885471cea2e09e", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0013?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:03 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "546ac038ad89c85a", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "366" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im1vZGUiOiJSRVBFQVRFRCIsIm5hbWUiOiJudW1zIiwidHlwZSI6IklOVEVHRVIifSx7ImZpZWxkcyI6W3sibmFtZSI6ImJvb2wiLCJ0eXBlIjoiQk9PTEVBTiJ9XSwibmFtZSI6InJlYyIsInR5cGUiOiJSRUNPUkQifV19LCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRhYmxlXzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMTQifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:03 GMT" + ], + "Etag": [ + "Vrc2NOHDTr0sOMJMkvk0gg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "83ad23a4ed32277c", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "429" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "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" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:04 GMT" + ], + "Etag": [ + "4sqmJZkdp2ClS3/MPtebqQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "2528e3efbf7c282f", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/b1b0CHGaPEnSHJoWyx4Gw7tgJwR?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:06 GMT" + ], + "Etag": [ + "84LSdI+69VCnmMaBR4lTIg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/2VQy07DMBD8l+VIKhVR8YjUQ5taaarSFifAAXFwkk2a4keIHZWo6r+zKYcgIR/WOzuzHs8JPiudgw9pVX612HRXJbrn/sLRttJZKrXRFsEDdKIk5sNkHefR9d3ja6DVk5jziUyicjolhs32qAT4JygqlLkF//0EWigk2aV44Lq67+KER5sQzt4wb5Ud5tEmYSHjBCiT9wBnOzZL2OKvpMFsUHAWbPmC+v9Pp8bIgTjfbtdstoHzBx0PDiblWGCDOsPeed2YA2Yu6kOxeyNlp4Qe5ajMyKF1cFFcpulNOg6WodgxHS9X5q37noTHe1eujr1vaTLhKqOJ+BKTa3DGCTnvaMmuMRlai/2S8e/CwKhaoiMHrmnRg0xQlMvKgV8IaQmgeBZKzoqCvGHOzZF+CLdw/gF37PJYwQEAAA==" + } + }, + { + "ID": "806bd4526b37c2f7", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/b1b0CHGaPEnSHJoWyx4Gw7tgJwR?alt=json\u0026fields=status%2Cstatistics\u0026location=US\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:06 GMT" + ], + "Etag": [ + "7JIdIMolJrIzDrLmaj1ftw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/7VXf2+jNhj+KhGqdJvUq/wDA0baH7k206otl4pQnabtFLnwpmUjkGHnelXV7z7bQEMISfrHVZXeGr+/7cePnWdHKqEyqbJEOuGzk1SgP8sizlbghA5mPiGB73uU+9w5N8aV6utc7GGtgyLta5iPXa1RpRL5pycF8qYqE5ASUm2FtOa/DVRPJq8d3OSicMK/np1C2DhzhMLRdbHeKG2atT62hqncqYD4QV1Bf56byh5FpiLT1vjbvROiC4Q8l1PWkbw2mkpr4ew4TcX3E07Wwjrp1Us7meqJNirqGtRRW4M6gjFIypXuF3bKxdwNENvKV6s2Mu05tiUfcawzGsfHKjuZz9p0s22dDudqnLaZ5MNmucxhtlG6BosHreDDmvk6y/NXnFSQlFUqI71YuzNfdA4FRZNgLSqhvXKLGdnsiWk5BwXpzZDWwH9jPi5n05s/JvHEzsFaWiD+mxVpo7utVZu7VuucYTQKfxlNx79PFvM4ur2Mfzoj7Hx0Rtyfna8v56fcqXX/ID5oxRnF5mMcReM//94gRJOLiws7AKslRovfEtWto97ZqO7RqG4T1QypGaK3JGB1gsQmYEcTsIGyv0TXQytpls0KbAQxwuxoPBstFnqP7gGhRWnhoaPZeK8kgcPRZSlykAm0PIEP8AS1Qfd5wqXGIzPAmJtktiq9GvvcgYOAYuy9SrLLHIQPUAfBLgkMFzbS3yUOSt+NOQjjvtuR3h51uAeogwWui9lW7lEHH6IOTL2dP9ajDoKHuINQ6nteR/a5w/uB5EHfTB4MHWUPht5KH9FkfNVD/K/RbHoa2SQc1V21uCYHcO26fBDXeuf2cY33cY179x9z92CMe7edNXkf1PYuWsL3UIv7ri1sj7k2haMh4Po88BEmrfR4D7iYDN56h92aZOTgvYfeEbk/6NobwO1hpt5BNN4i+gTznyB90j0aGragX6orobsafE5qHeRZAbYJyMVaq+yJ8DBv36HzvKxPD8XEHKe1PjVZcX9bZEp2MGmXrp1kxlAkKvsGWzvTWTcHZuQdknxtIupdVJl5me83ffB1vdV86qLqTn/oYuIMKnusBytORPIAv2XKCZcil2CQt4QKigTSWNzlUANlXZX/QKKuTWj5UOb500oUH1NYlR91VkNbqVBCQm3RjBdEPxYxIsHC8zjyGEeIU/1vgRAy2FQmvnWwoyPm+teFWaBis7pa5ePlUpcCaVQ+yvbBqVEOKyhU/LQ2jHr9eT6JYr1zQz2/bE/Fc+2pNVezzxPn5eV/zT2XOycNAAA=" + } + }, + { + "ID": "706bb8baeeddb223", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0014/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:06 GMT" + ], + "Etag": [ + "7AnLO5LPfaExsuI+fa5vAA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qbO+b5+Jv6BKQlulYUl3pqpyWaljk62toCVZTklyTmBOWXFwOVGQP5RWBmdLVSGpgsA5muVKsDZkH5hkq1sVARZGVpiTnFqSApiCxCIhFNvwF2/SVFpVi1J6NpNyKoPbYWAP2nsZEaAQAA" + } + }, + { + "ID": "a3d8e2bfa9bc4202", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0014?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:06 GMT" + ], + "Etag": [ + "Vrc2NOHDTr0sOMJMkvk0gg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWKk7OSM1NVLKqVkrLTM1JKVayiq5WykvMTVWyglA6SiWVBSBecEiQp5+7Uq0OQr40txgh7+kX4uruGgQUyM1PAQkEuQa4Ooa4uiBrKUpNRugIcnX2D3IB8jGtTsrPz0EodPL393F19FOqjQXCWgCN1fK3tQAAAA==" + } + }, + { + "ID": "1c5ed291f4493301", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0014?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:06 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "253a4156bd4595e5", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "327" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoiZCIsInR5cGUiOiJEQVRFIn0seyJuYW1lIjoidCIsInR5cGUiOiJUSU1FIn0seyJuYW1lIjoiZHQiLCJ0eXBlIjoiREFURVRJTUUifSx7Im5hbWUiOiJ0cyIsInR5cGUiOiJUSU1FU1RBTVAifV19LCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRhYmxlXzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMTUifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:06 GMT" + ], + "Etag": [ + "iCEGhKL92T60QIOimIgP3w==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "f404fc1099480976", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0015/insertAll?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "164" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJyb3dzIjpbeyJpbnNlcnRJZCI6IjBucDBrTVZXVktNd3dEc3Npa2pFNHB0WEl5ZyIsImpzb24iOnsiZCI6IjIwMTYtMDMtMjAiLCJkdCI6IjIwMTYtMDMtMjAgMTI6MzA6MDAuMDAwMDA2IiwidCI6IjEyOjMwOjAwLjAwMDAwNiIsInRzIjoiMjAxNi0wMy0yMFQxNTowNDowNVoifX1dfQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:06 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTMK04tKnHMyQlKLS7IB3KUagGmFzWCLgAAAA==" + } + }, + { + "ID": "50aee77ed10305fb", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0015/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:06 GMT" + ], + "Etag": [ + "4mwRyGcPntjsq9s9nnsVfw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qb5JYHVbonB+SVZBUXWhZb5uUVh6WV29oCVZTklyTmBOWXFwOVGSjVAgDtIhrCUwAAAA==" + } + }, + { + "ID": "474e6ef7132e0375", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0015?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:06 GMT" + ], + "Etag": [ + "iCEGhKL92T60QIOimIgP3w==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWKk7OSM1NVLKqVkrLTM1JKVayiq5WykvMTVWyUkpR0lEqqSwAMV0cQ1yVanXgUiUIqRBPXxSplBJUbejyJcWoeoNDHH0DlGpja2sB5wvkN44AAAA=" + } + }, + { + "ID": "8bc7f78f38dae130", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0015/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:08 GMT" + ], + "Etag": [ + "JlGmsv2RwTxUb/iBrQsr4g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8p75bjnFpcZBZWHVIQm6Wc6FQUWF5mk29oCVZTklyTmBOWXFwOVGQD5RWBmdLVSGpgsAwobGRia6RoY6xoZKNXqQIQMjayMDawMDPQMQMAMLo5QGoJLiaGJqYWJhZmRiake0LxYIAQA3yIimscAAAA=" + } + }, + { + "ID": "c44869640f24639a", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0015?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:07 GMT" + ], + "Etag": [ + "iCEGhKL92T60QIOimIgP3w==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWKk7OSM1NVLKqVkrLTM1JKVayiq5WykvMTVWyUkpR0lEqqSwAMV0cQ1yVanXgUiUIqRBPXxSplBJUbejyJcWoeoNDHH0DlGpja2sB5wvkN44AAAA=" + } + }, + { + "ID": "20fd213e7772ef33", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "338" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiSU5TRVJUIGRhdGFzZXRfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAwMS50YWJsZV8yMDE5MTAyOF82NjkwNjU5MDA5MzY1OV8wMDE1IChkLCB0LCBkdCwgdHMpIFZBTFVFUyAoJzIwMTYtMDMtMjAnLCAnMTI6MzA6MDAuMDAwMDA2JywgJzIwMTYtMDMtMjAgMTI6MzA6MDAuMDAwMDA2JywgJzIwMTYtMDMtMjAgMTU6MDQ6MDUnKSIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiMzBFdVRPVzIyQ2Z3NkRLWHRUVzJ5Q1NTZ09EIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:08 GMT" + ], + "Etag": [ + "OdpcQIiVoACdnVyK8dgnBw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "a6889bef635c5251", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/30EuTOW22Cfw6DKXtTW2yCSSgOD?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:09 GMT" + ], + "Etag": [ + "w64RN8LDGjiWcFsF5tQ1Lw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/12Q3U7CQBCF32W8LQmgEtOEC2xBiSDQ1mBivFi201Lcn9qdpmlI392pJhq82sl+55w9O2f4KEwKPhyK/LPGqr3KkXb9EKGrFTk+SmscggdIImdlM7mJnu9W4cOp2MuFW9zSbrRqplNWOHlELcA/Q1agSh34b2cwQiPbUubUlv0YzpI5dN4voj+ULNcXKKVL239O7tIbJ7P1Frr3zoOTPUSYYYVGYl+prOwJJS3737qjVarVwgxS1HZA6Pp32PFNr4fzOtnsx+Mgaybh0ysl+3EbxHG+CVmlrBRUWMPCl5i7AFkS6r7lkG1lJTqHfcjwJzCwulRI3ICqGj2Qgnf0WBD4mVCOL0ytQ61mWcbdMI1sw1uDEXRfNqSr6JoBAAA=" + } + }, + { + "ID": "047e5d13c3a23f56", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/30EuTOW22Cfw6DKXtTW2yCSSgOD?alt=json\u0026fields=status%2Cstatistics\u0026location=US\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:10 GMT" + ], + "Etag": [ + "eeqHgcTRL3dBHglfyCQYdA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "cecec5d4e209f186", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0015/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:10 GMT" + ], + "Etag": [ + "oGrIUjPFenpUGe38J5rMvw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8rnuxd5hmYFuKXmFYS6pxpbeJkW+ZaV29oCVZTklyTmBOWXFwOVGQD5RWBmdLVSGpgsAwobGRia6RoY6xoZKNXqQIQMjayMDawMDPQMQMAMLo5QGoJLiaGJqYWJhZmRiake0LxYkDC9rIqtBQB/LmJ8MgEAAA==" + } + }, + { + "ID": "5e34c0a7756e2031", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0015?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:10 GMT" + ], + "Etag": [ + "iCEGhKL92T60QIOimIgP3w==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWKk7OSM1NVLKqVkrLTM1JKVayiq5WykvMTVWyUkpR0lEqqSwAMV0cQ1yVanXgUiUIqRBPXxSplBJUbejyJcWoeoNDHH0DlGpja2sB5wvkN44AAAA=" + } + }, + { + "ID": "548fb773b2fd966e", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0015?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:10 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "680249a39c8c4b7c", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "159" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIDEiLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6IndoZXJFeFlobzdSSWFtanZxSTk2cXZKMkdPYSIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:10 GMT" + ], + "Etag": [ + "TwBvc51yO4M6eQFf03UeZQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "6322e94355d8a56f", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/wherExYho7RIamjvqI96qvJ2GOa?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:11 GMT" + ], + "Etag": [ + "BxdpyrM1O05FLog7gj2rLQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P3U7CQBCF32W8hQRIlEjChTUVaypIlQtjjFna6Z+7nbI7BZqm7+4UvJo9s9+cOdPBb1ElsIB9kR0atO1NhrwdHhG6RrOTUlPlEEaArDIhvXNSt/Z1upncPoWUzbNyZsPtcimEi3M0ChYdpAXqxMHiq4NKGZSxdPIjBLf1IIL1h7/yI2kYSobGeheGD17oQ//dj6CkfYQpWqxiHNxqSyXGHAxBXU5at0ZV4wQNjRkdw2Xi8nvK0frnz5zmUaBMeTwE93eH48tstVFCaYoVF1QJuHsHWcTESkd0kqQwhX/ttWL6ZilG53AwnVwXPJKpNbIkYtvgCGIl5z4XfNX9HzXb6SFLAQAA" + } + }, + { + "ID": "94f20514082ef2dd", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon695cc71810ad4c55bb072df6e6a17690ff2b372f/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:11 GMT" + ], + "Etag": [ + "GWexNmViIavplSMAEOgtCg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8q7h6dW+OWGZXomlhXkBPs6uvqnlzin29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwvXxgIhACzXrDpuAAAA" + } + }, + { + "ID": "b865fc640bf0c6f5", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "161" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIDEuMyIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoic1M0UmJ3SFIzT2ZMZU8xUVpleGFhZWxxcTgxIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:11 GMT" + ], + "Etag": [ + "zRwl3x/rzBidgYZfBQLmVg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "93dd9cfa23fa6c66", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/sS4RbwHR3OfLeO1QZexaaelqq81?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:11 GMT" + ], + "Etag": [ + "71y9+62Z5vwbNLDmhaDsHg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/yWPy26DMBBF/2W6LJFC30XKImlaUQmFhjSbVFVlYHikNgY8KUWIf884rOwjn7lzPcBvWaXgQVzmzQnb/ipH2tpLhOYkyfBR68ogOIAkcjYf3f75+uHmcP/XxZtgrQqxNn6+WLBhkgKVAG+ArESZGvC+BqiEQh7L5j9sUF9beAvC5Sej0qnFzT4IlqvgFcbv0YGjjiPMsMUqQZtVt/qICb3bmqbQUvZKVLMUlZ4RGoLLxPS6u4vizo9uwyzA0N0e8F8IlE3z5LIldSKo1BWL+x3wItIkZKQ77glWuPCq59CPVidoDNrQ+bTgRataInEjak/oQCL4s35JE49n0/piG0kBAAA=" + } + }, + { + "ID": "86cc422f0736f093", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon1c5c0cf8ba1fdbcb418e365057b923a0bd76264f/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:12 GMT" + ], + "Etag": [ + "9yJIpaHjf1+w8g+bCJ9lQg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8pbVnp5FiR6ZKUZapdbpGsnOXtZ5gSm29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwnrGSvVxgIhAJVrFwJwAAAA" + } + }, + { + "ID": "6a28edf445146345", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "179" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIENBU1QoMS4zICBBUyBOVU1FUklDKSIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiN2EyeFNUUWo2SWRScDFTT1MzZk9RN3BYbVlYIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:12 GMT" + ], + "Etag": [ + "RYvKFUaeFArqMORStLz+eQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "efbbf8c52e45de87", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/7a2xSTQj6IdRp1SOS3fOQ7pXmYX?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:12 GMT" + ], + "Etag": [ + "9vJLN2n6Q5FhEy8pQ/afGw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2PW0/CQBCF/8v4ChEwgjbhQUjVmgq2lQRjjFna6QX3ZncQm6b/3Sn4NHtmvzlzpoWvSmfgwa4qvg9YNxcFUtQ/YnQHSY6LNdohDABJFEze/jyFq4meRtf3pd/c2OhS5A/H+ZwJl5aoBHgt5BXKzIH33oIWCnksH30yQY3txWrz7MfBkhvKZOdGGN4tQh+6j24Ae7OLMccadYq9m63NHlMK+qCuNFI2SuhhhsoMCR3BaeL0OxOT3+Q12k+DLLbjZJ1c5etoZrfqbcuUNKmgymgGNwnwIjIkZGyOnBTG8K8XDZu+1CZF57A3HZ0XLI2yEokTUX3AAaSCz32s6Ky7P1XeRQlLAQAA" + } + }, + { + "ID": "19af92fd937f8244", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anonab9a2a1335178bb586f5f047649cfe42ed908187/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:12 GMT" + ], + "Etag": [ + "hvLBYqVtCaXte/5R5DSPIQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8pnlPk4RRaGlTgnRpSk6psGmboEB3gG2toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwnrGSvVxgIhAFga5mdwAAAA" + } + }, + { + "ID": "c354e0039c93a7bf", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "172" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIE5VTUVSSUMgJzAuMjUnIiwidXNlTGVnYWN5U3FsIjpmYWxzZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiJYQkdVNHh6NExxUzhaNkRKSFpxalg5OFRNaFYiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0In19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:13 GMT" + ], + "Etag": [ + "436CKvzFMjVpfVToxL2c8g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "fe0ee3019698b88e", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/XBGU4xz4LqS8Z6DJHZqjX98TMhV?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:13 GMT" + ], + "Etag": [ + "pmJcnt84JtvgqNpAvB87vQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P3U7CQBCF32W8hQQTopWEC4pEIIVIEUIwxizbaSnuT9sdqrXpuzulXs2e2W/OnKnhKzURjOCUJvkVi+ouQdq0jxDdVZHjklnjEHqAJBImM72UhrzhksokX2eT0vcey814zISTZ9QCRjXEKarIwei9BiM08lg8+GSCqqwV691qFi6m3NA26hpBMPGDGTQfTQ8u9hRijAUaia1bVtgLSlq0Qd3ZKlVpYfoRatsndAS3idvvwX/ZDX9+h0G+9Y4Pz8v5Mb8cnry31XnPlLJSUGoNg7st8CKyJFRovzkp3MO/9is2fS2sROewNR10C6ZWZwqJE1FxxR5IwefOU+p08wcuBbyfSwEAAA==" + } + }, + { + "ID": "e0573a6f3db3f701", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anonf6dcdce8581b1f1c792b17dcba2342042199bede/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:13 GMT" + ], + "Etag": [ + "A/8NXo6FaEm2YMDaS+G49g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8o76lv4ReSbuSW65hpF+rokBmu7m1im29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwob6BmZKtXGAiEA1xSA7XEAAAA=" + } + }, + { + "ID": "bbebddcca13227b0", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "162" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIFRSVUUiLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6ImVGWkQ3WTQzS1Z1S1J6b0FPaUlaSUpXMGNjWiIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:13 GMT" + ], + "Etag": [ + "jBy7bR963Bg6IV4C/toHFA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "c8c775ce119daee1", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/eFZD7Y43KVuKRzoAOiIZIJW0ccZ?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:14 GMT" + ], + "Etag": [ + "hF5EOg7/+nwCjf5WCDdSug==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2PYU/CQAyG/0v9KESMEhISPgwYcbIwHUEixpjj1o3h7Tp3Xchc+O924Kfe23v69m0L37lNYAz7PPupsWpuMuTX7hGjqw07KSVZh9ADZJUJeVgM/Sgb3d3a0+yYDrezebKus8lECKcPWCgYt5DmaBIH448WrCpQxtLBlxDclJ2YRlHoeytpFJR0jdUmDL1p6MP589yDI+1jTLFCq7FzKys6ouagC+oOZExTKNtPsKA+o2O4TFx+cbGbj94fH5Zv9TL+JS/Kg13wvB1ovRPKkFackxVwswZZxMTKxHSSpHAP/3raiOlLRRqdw850cF0wo6I0yJKIqxp7oJWc+5TzVZ//ACZTwtdLAQAA" + } + }, + { + "ID": "895e5593f613b3f7", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon31263953e3d9ded3a9e1b641e57c49f8456fdf2b/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:14 GMT" + ], + "Etag": [ + "Xrf5H8p4GeP/MpXndIN69A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8pHFKWZelgUmLinBuj7FkTkpXj6mVk62toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwqXFJWmKtXGAiEA/0a8lXEAAAA=" + } + }, + { + "ID": "71e02ae0792f9ee3", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "163" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUICdBQkMnIiwidXNlTGVnYWN5U3FsIjpmYWxzZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiJzcGdqMlh3TnRyc0Y4dW9RWndBc2lNSGM1cEYiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0In19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:14 GMT" + ], + "Etag": [ + "PqKewwXdN+y9IYGWeDtt1g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42S227aQBCGX6XaXuSiBeMTxkiopWBSK9RqjGmS3qD1euwssb3Guw5CUd69Y0NQ1SZVJS7MzvfPP6cn8sDLhIxJzLNdA/Xh/VbE5CMBRTN8/b67gv3+Ngk+HFz/7vIG5krp2WSCBG9V8l7k+aGgZS+BQvQUSDVer/qyyrbG7T5QtVyMGnH9cz+V/NtXZlcLVErI0yUvH1B/r1Qlx5r24t7PhMhyoBWXfSaK87v2aGhVLbbAlNReMdWwagy8bfspF4wqLsrJeoUlNBLqDRSU51hEm6BXi1ioz6+k7nNa9DPkHzkDyphoStXWhlmYKFOeNXWXmIyfSFfrbx9k5S29WfTuYvpldoGCBPPxssMjGufQoqe2/DfG2aqoohKOxCYGMJxhnLi2rlt6Ohza9ojqjuWaLnMT2zKYCcbApKhTrUWnoqUoB7EzNBOaMhd/4MR6PLQck0KaGjoDOzFSd5TasUmesbEaqII5l5WQ/NgcmYXeNPI2/mITeN7cm6PBvuZ/Ujehj1AUroMZ0shUNReItcPwg8gLp7PI/+EdV7CEjLLDaodLSGkuAZ1xj9GhwsGQ67UX3pHjUwgp1FCy/xwYKo7Rf57hy0UgiDeBRlLhf1wQk61NN4N2Ubxoy9FtxzBGjuNY5sAkHVyrv2KWYWDsfAZtRiigVKeejudAnk9mjTxDGMSZBX5widFfxP0B5pUDAAA=" + } + }, + { + "ID": "8670320015dae37c", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/spgj2XwNtrsF8uoQZwAsiMHc5pF?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:14 GMT" + ], + "Etag": [ + "z4Lg4AtWFTTOlb2ey96Qyw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2PYUvDMBCG/8v5dYM5puhgHzaxblCn6zYURSRNr11rmovNlVLL/rtX66fkIc+996aDr9wmMIc4z75rrNqLDHnXXyL0tWEvhyPrEUaArDIxf2ZhNlvyS3A4PJl4iu3t9a5tFgsxvD5hqWDeQZqjSTzM3zuwqkQZSyefYnDretgfos32QbikpOftMQyXq/Aezh/nERQUR5hihVZjH+YqKlDzpu/pT2RMWyo7TrCkMaNn+JsYXl1WTF+bLVc+uKlp99Ysff641lcuEMuQVpyTFfG4B1nExMpE1EhRuIR/XrUS+lyRRu+xD50MC+6odAZZGnFV4wi0kt+ucx74/AsFQBIbSgEAAA==" + } + }, + { + "ID": "fd1727ed20e6bc69", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon0b763dafc9fc9e7b1b6473aeff21ce5d2f98f5b3/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:14 GMT" + ], + "Etag": [ + "BtqUgTOhmUHTXegWr7oUdg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8o7lRSGpof4Z+SGeoREpKaHF5nnh6ak29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwo7Ojkr1cYCIQCAg1BAcAAAAA==" + } + }, + { + "ID": "0265ddba6f22f4c5", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "178" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIENBU1QoJ2ZvbycgQVMgQllURVMpIiwidXNlTGVnYWN5U3FsIjpmYWxzZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiJpR3l4dGNGd0lkMHRzV2VZbjVKcVZQODBIQXkiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0In19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:15 GMT" + ], + "Etag": [ + "2t5a75k26+WA7RHv8u6SrA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "35aedafc33d2b22b", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/iGyxtcFwId0tsWeYn5JqVP80HAy?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:15 GMT" + ], + "Etag": [ + "i/lUk1IxYckS0pr2nS/mCg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P3WrCQBBG32V6GzEWCkXwwoitllBs0rRIKWXdTOKa/YnZEQ0h796JerV72DPffNtBpWwOU9ip8njCpn0okT6GS4L+pMnzUTvrEQJAEiWbaqyzarK+bGWVhnXzaNOxWZSzGRte7tEImHZQKNS5h+lPB1YY5LEi/GOD2nqAaPu5TBmNywd8z+J4HsVL6H/7AA5ul2CBDVqJQ1bduANKWg81/d5p3RphRzkaNyL0BNeJ66t6bS8kX87rPCT/jVv79Hb82jyHq3nLlnZSkHKWxSwFXkSOhE7cmXvCBO4ctRy6aZxE73EIDW8LFs7UGokbUXPCAKTgz64U3bj/BztM1StJAQAA" + } + }, + { + "ID": "c13f69754efe00f1", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anonfc8d2f8059b652e074481f28a7fdba22b7c2f9e1/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:15 GMT" + ], + "Etag": [ + "cjTd1Ashk9AiyCldTUt9Wg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8onZ4WkGDoWZ2RbOmZWOuekhISWWIan29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwpH5VqWKdXGAiEAuXln13EAAAA=" + } + }, + { + "ID": "c89c51b1d5fb9507", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "189" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIFRJTUVTVEFNUCAnMjAxNi0wMy0yMCAxNTowNDowNSciLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6Ijk3M2ZFbFlUWkQ0RFVZMEJkbGpwVXpNNWs1TyIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:15 GMT" + ], + "Etag": [ + "e2IXt3r3ntAXXpTjvmueCw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "95fb4a7629f589e4", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/973fElYTZD4DUY0BdljpUzM5k5O?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:15 GMT" + ], + "Etag": [ + "R2ZZ+4ZhyYKisJ8YTVrrTQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P0U7CQBBF/2V8tCSoEJWEBypNREGhtCatMWZpp7Cw7dbdIaY0/XdnwafZO3vmzp0WDrLKYQQbuf05ommutkgr9wjRHhVZLrWuLIIHSGLLZHibpteDdNckr9K+PCTRhzHRajxmwmY7LAWMWigkqtzC6LOFSpTIY0X/mwlqaiei2SJYR5PFklulzl3rLZ7PJ/48gO6r82CvNyEWaLDK0PnVRu8xo5mLandaqaYUVS/HUvcILcF54vz7eH9XBCqJ0ulgGid9P1f7Oj4thofhO1NKZ4KkrhiM18CLSJNQof7lrHAD/9pv2HRpdIbWojPtXxY86bJWSJyIzBE9yAQf/Czpors/mhapc00BAAA=" + } + }, + { + "ID": "2c9092387bf660e1", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anonddc369ee253afe8cc541004667fad730bcc3b146/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:16 GMT" + ], + "Etag": [ + "ZZYu21RieP64P5ZzIka7eg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8pHRUWWGhkGZaYGmJkEmEZVeWYnmqem29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwmbmFqYWJgZmZjqGSjVxgIhAFxk/CB5AAAA" + } + }, + { + "ID": "ea2d27a5290eda97", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "224" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIFtUSU1FU1RBTVAgJzIwMTYtMDMtMjAgMTU6MDQ6MDUnLCBUSU1FU1RBTVAgJzIwMTYtMDMtMjAgMTU6MDQ6MDUnXSIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiakVyR3BVWVNHM2JmVzRlTk5Gd1ZCYTc5ZkNRIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:16 GMT" + ], + "Etag": [ + "0Mya8IU2azX5iyMvu0m4Zg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "e5738af6ffd8d805", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/jErGpUYSG3bfW4eNNFwVBa79fCQ?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:16 GMT" + ], + "Etag": [ + "819MqO5nCRR33cplwA+emA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P3U7CQBCF32W8tCQQNEoTLgpW5AIsBTTGGLPdTkvr/pTuNE1DeHem4NXsmf3mzJkT/BUmBR+SIj82WHd3OdKmf8ToGkWOS2WNQ/AASeRMPo8mq+P7o5nH8XgsK9UG96iD6ZQJJw+oBfgnyApUqQP/+wRGaOSxbPjLBHVVL3bLVbjdBauIW9qmfSsOozDYhS9w/jl7UNokxgxrNBJ7v6q2JUpa9lHdwSrVaWEGKWo7IHQE14nrbxnWi2r/tV2Mk+zzAdfr1/ZjJp4m2XzDlLJSUGENg/st8CKyJFRsW84KI/jXs45No9pKdA570+FtwdzqSiFxIqob9EAKPvitoJs+XwA02RmKTQEAAA==" + } + }, + { + "ID": "01aa5a18e5d62863", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anonc959a9a6935a4673dcd391b8ab0692fd1bec3fcb/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:16 GMT" + ], + "Etag": [ + "h/p+c3Kb+mBdfNyGpruFnQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8pn6BdoJxt7J2nnOqWk+VW6FxSVuuUF2toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsg5FKhiamFiYWZkYmpnoGSrU62ARjwRAArOfkwZYAAAA=" + } + }, + { + "ID": "138fc8da4db90b35", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "200" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUICgnaGVsbG8nLCBUSU1FU1RBTVAgJzIwMTYtMDMtMjAgMTU6MDQ6MDUnKSIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiNkpyU1AxcVFuanJnY0lFUU8wU0lGRlp1cHBZIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:17 GMT" + ], + "Etag": [ + "PWv7r46rU9diCHiAfULZwA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/41SbW+bMBD+K5H3IZvUBEOAhEjVFqV0Y0qzNpBV7ZfImIO6BUxsp1VU9b/vIG01bV01Phnf83J+7h7JnagzMiWpKLY7UPsPtzIlRwQMK/D2/PJ+rFxfrYNMzL+JWb5eXD/Mjo8RIVqWvpFlua9YPcigkgMD2kzX8dD/ruJze3tR36qCR+HFDxpHp6fXu6a5QqaGMl+I+g75N8Y0empZL+7DQsqiBNYIPeSyer237h2rUfIWuNHWG6YWdq2td2w/l5IzI2R9vI6xhZ0GtYGKiRKbaAUGSqbSfHlDeihYNSwQfy84MM7lrjZtb6jCZZ2LYqc6YTJ9JF2vvx1IHC7CedL72L+BspT9o14SnYVxMjs77/UdavsDOho4tGd7U+pOqdf/hKoZmoq600xYWkKr9/z26B+ZtyxmmIYDYpMCOGM/zQLPtl07933PmzB77AajgAeZ5zp8BA4dMeSZ1qJjsVrWaRqkWc4D30td5ud5nrl85OfMm6TUD6g94dTzxpSSJ3y9AmbgROhGanFIgMxX4SwJN9HpZhmGJ+EJGjwo8SfqchUhKFmtl3NEI6ZRQiKsTSxaJuFqNk+in+FhTgsoGN/HW5xUzkoN6IzDTvYNBkMu1uHqihyuVpCDgpr/Z2DI6Krv7+rL2iAQFweNtMF/HBDXrU2XQTsoUbXt2N7YcSZj/OgoIB1Ymb9qju1g7XVXWkWooDbPbzrsDHl6NtvpVxAWMbNltPyK1V+y0B3IugMAAA==" + } + }, + { + "ID": "f1c09fb77760de4c", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/6JrSP1qQnjrgcIEQO0SIFFZuppY?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:17 GMT" + ], + "Etag": [ + "+08gTPak/XohbbDj9b7H3A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/22QyW7CMBCG38U9NqihlbogcWAJJRVLSILURRVynCEkOHawHVUR4t07DgekFvlg/+P/m+1I9rlISY8keXaoQTU3GZiVfYSga240XpUUGohDwNAMnbfucxYHdH/3LndJMi5ekqfpw6DfR4dmOygp6R3JNgeeatL7OhJBS0Bs627QYZrKitAbLcMx6lKmVi/Ws9lgOPMw8p/ctKFN94JHcegvXq/gJ+cvdX+hYn/uRfFgHlwDv/E4pJBJCFtQIBjYMSolC2DGtxvSO8l5U1LRSaGUHQPakJZofx/fVBR0DytRqIz53mrpRv5k8llX1Qe6uGTU5FKgcR1hl8RIQ3kof3BQ0g5m9bDBpIGSDLQGm9Q9FxjJsuJgsCOjanAIo7jnaW7O+vQL00g/EcQBAAA=" + } + }, + { + "ID": "04c67ce3f359af83", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anonbb9bdfc965b4a6fffd4c36fa58b069018c055700/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:17 GMT" + ], + "Etag": [ + "DWf2CqKOtHFXTtNDtYnmcQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8q7hKcZORd6+5d4uEWElPi5lETm5SYH2toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsU7JCYiplpObk5CvV6kB4hiamFiYWZkYmpnoGSrWxtUAUWwsAdAtlOpUAAAA=" + } + }, + { + "ID": "02d948abc01ca43f", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "199" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIERBVEVUSU1FKFRJTUVTVEFNUCAnMjAxNi0wMy0yMCAxNTowNDowNScpIiwidXNlTGVnYWN5U3FsIjpmYWxzZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiI5SlRJMjZZcFRZMktzWWJjTTVJT2Z1SG9mZHoiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0In19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:17 GMT" + ], + "Etag": [ + "Yxu09UMtBTazcyaBpBfplA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "e5b2b4eacfc94dfc", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/9JTI26YpTY2KsYbcM5IOfuHofdz?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:18 GMT" + ], + "Etag": [ + "hmmfL34hyyt8dewrxChJ9A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2PW2+CQBCF/8v0FRNrL6kkPqA1EYu9KD6QpmnWZRDsLkPZIZYS/3sH7dPsmf3mzJkOvooyBR92xf67wbq92iO/9Y81usawk1JR6RA8QFZ7IXNrs+jmNm9bfkjxWP/M8uU4mEyEcDpHq8DvICvQpA789w5KZVHGsuGnENxWvXgM4nkcrubSsZT2nedtFAXTaA6nj5MHB9qtMcMaS429XVXTATWHfVKXkzGtVeUgRUsDRsdwnjj/jpdxOLpPqjgZPblkp1d34UvWLChLf4UypBUXVAq43YAsYmJl1nSUqHAN/3raiulrTRqdw950eFkwI1sZZEnEdYMeaCX3Lgq+6NMfpLToLUwBAAA=" + } + }, + { + "ID": "b5551bcfb73c63ea", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon0797628fd778c717c2620296f1106da4f5099c98/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:18 GMT" + ], + "Etag": [ + "BOqxJjnumc3F2wdr/uajfw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8o7+RdWeGXlleYmG7sZlacU6ZcmZqWV29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwobGRia6RoY6xoZhBiaWhmYWBmYKtXGAiEAdUI0VIAAAAA=" + } + }, + { + "ID": "9aa2747173396412", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "195" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIERBVEUoVElNRVNUQU1QICcyMDE2LTAzLTIwIDE1OjA0OjA1JykiLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6InQ3VlpYdW5kRHdUMVRKNXZ6ZFp6MUQzd1ZvcSIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:18 GMT" + ], + "Etag": [ + "WmLkCQFQDSsL77CDjD5qbw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "a3e1a3f5ebde33bd", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/t7VZXundDwT1TJ5vzdZz1D3wVoq?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:18 GMT" + ], + "Etag": [ + "iSWojQNy4KVHxvQuAA6DvA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P3W6CQBBG32V6q4mkfwmJF1hMbEtMQbSNTdOsMCp02UF2wCLx3Ttor3ZP9sw333bwk5kUXNhku0ONVXuzQw77S4S21mzlKMlYhAEgq52Y2eKd8nDe3r2uZr9NWHveg99447EYNtljocDtYJuhTi24nx0YVaCMbUffYnBb9uB78VSooLSn+TIIvEkwhfPXeQA5bSLcYoUmwT6qrCjHhJ/7lnZPWreFMsMUCxoyWobLxOWVH1frj9qk/jF24pf75pSuT45/e1zRQSxNieKMjIjLBcgiJlY6oqPUBAf+edJK6FtFCVqLfejouuCJilIjSyOuahxAouSvs4yvfP4DguTA70gBAAA=" + } + }, + { + "ID": "dc2cf4102e358449", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon73bdd80e6e23451ff75acf01ecdf3f4c187c5595/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:18 GMT" + ], + "Etag": [ + "55aLywss8knVv/Jc8SvVMA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qbmib6VJYXF1tk54WV6XslWwSXhfk62toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwobGRia6RoY6xoZKNXGAiEA8IWd+XcAAAA=" + } + }, + { + "ID": "1d1c95863fae2608", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "195" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIFRJTUUoVElNRVNUQU1QICcyMDE2LTAzLTIwIDE1OjA0OjA1JykiLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6ImJQN2hzbXFqaVJ3QTFXRzhBVWlIOUJpTWlQbyIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:19 GMT" + ], + "Etag": [ + "lShrfmYZ9y9u2bJHws32nQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "58310ba59c94e020", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/bP7hsmqjiRwA1WG8AUiH9BiMiPo?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:19 GMT" + ], + "Etag": [ + "zjXAzkuT1Ma2p+A3NXouZA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P0U7CQBBF/2V8FBLQB7UJD4shQtISrBCJxpilHdotu53SnYaUhn93Cj7tnuyZO3c7OJgyhQB2Jjs2WLd3GfJ7f4nRN5a9HBWVHmEAyDoT81xs1fnQrMeRfqju1eNyS82XmkzE8EmOTkPQwd6gTT0E3x2U2qGM7Ue/YnBb9bBeRDMhR2lPy00Yqmk4g8vPZQAF7WLcY41lgn1UVVOBCS/6lj4na1uny2GKjoaMnuE6cX3drZ5y746FiU9q/Pn2rDZm/jI1kVmRWJYSzYZKETcfIIuYWNuYTlITxvDP01ZCVzUl6D32oaPbgldylUWWRlw3OIBEy1/nhm98+QNS+JF4SAEAAA==" + } + }, + { + "ID": "c8af0f80e29a40e0", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anonb9190f986114bd81e74ed6dd003c9f13782d94a8/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:19 GMT" + ], + "Etag": [ + "Dkkf1RAnz70opW6EE5Vizg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8q7ZGenGQY55lWZG+QXhJu5upqGZVal29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwmbWhmYWBmYKtXGAiEApv30XXUAAAA=" + } + }, + { + "ID": "dd6b02082e1c8063", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "164" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUICgxLCAyKSIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiZ3pKNndJcmJkS2ZveGJ1ZXpGWXlCZlBMYUZoIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:19 GMT" + ], + "Etag": [ + "yu8qsJBhsEZ8IoFXXozS0w==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/41SXW/aQBD8K9H1pZUSjL8xEmoTMJUThFowbdIXdD7W5hLbZ3znUIjy37tnCKraNOqbfTuzMzu7T+SBlyvSJwnPNg3Uu3f3IiHnBBTN8HXX9Dby+motwx+9SIxvb8V+3t0OBojgmiXXIs93BS0vVlCICwVS9RfzTra/9rZRnaxuUvEzaWA/vttdpV8mdLxGpoQ8nfDyAflrpSrZN4wX9U4mRJYDrbjsMFGc3o1Hy6hqcQ9MSeMVUQNdS+MN2Y+5YFRxUQ4Wc7TQSKiXUFCeownd4KIWiVCfXmnd4bToZIh/5AwoY6IplfaGXZgoU541dduY9J9I6/W3DzIPJ+EwPntvnp9ZH5Cxwoa8bPExTXLQ2ONc0T/y1CyqqIQDYpkAWL6XrALXNB0z9TzX7VHTdwI7YMHKdSxmg9W1KfKUlmhZtBSl6THbcgLX73q+abte13LsrpMGjudSqwfMcv2km6SMPONkNVAFIy4rIflhOjKchZdxuIzGy2kYjsIRCmxr/ifq+yxCUDxbTIeIRkxVc4EwnUY0jcPZ5TCOvoWHHUwgo2w33+AWUppLQGVcZLyrMBjydRHO7sjhaQYp1FCy/wwMGW317Tt8OQkE4lGgkFT4jwtiUsu0GehF8ULbMV3fsnq+7+vASAuu1V81z9G10x3ojlBAqY4zHe6BPB/FGnkCYREzm0bTz1j9Bej2E9mWAwAA" + } + }, + { + "ID": "50f3a6216a74e420", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/gzJ6wIrbdKfoxbuezFYyBfPLaFh?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:19 GMT" + ], + "Etag": [ + "RVzUTXjXFXOM0fcRvj1/aQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42QTU/CQBCG/8t4LRE8eCDhIFgUrXysYDDGkO12Wlq3ndrdioXw350tBxP1YPaw+86+z3wd4C0tIuhDmCbvNVbNWYJ24R4CTa2t4aukwiB4gFYm7BRP+9Vyna3H69lDN1biI+udy8VgwA6jtphL6B8gTlFHBvovByhkjozF3Q07bFM6IfzRTFyzzilyeroKgqth4HPkN7lpQ5veNz6ZLv0bX/zBH72f2MW/sFc+HmQUCoyxwkKhm6KsKENlJ25BZktaN7ksOhHm1LFoLLRE+5vs7y53kyqM7mP6DGvcj5+bYTwP5HjLLk1K2pQKNq4euUewZKUWtOM5oZ3L6WHDSecVKTQGXdLuqcCI8lKj5Y5sVaMHSvKab1N70scvfozYs8MBAAA=" + } + }, + { + "ID": "fd013e77e0381453", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon16c3249570671356024304f9465a28ec257b0bfc/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:20 GMT" + ], + "Etag": [ + "SLqlZudkMQFuOVU9GJOwKQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8oH+xTmRJWmZPsGupX6h4Vaunv5l3sH2toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsU7JCYgJV1OpAWEZKtbG1QBRbCwC1aXuHhgAAAA==" + } + }, + { + "ID": "c80528c33b995230", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "167" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIFsxLCAyLCAzXSIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiV1djU3lvUmRWUk5uUWppd2VJTkJGV2ZVNkpSIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:20 GMT" + ], + "Etag": [ + "4N3bWe4ZCd7zR9/MfzLIKg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "1c3ece54abcd8c06", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/WWcSyoRdVRNnQjiweINBFWfU6JR?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:20 GMT" + ], + "Etag": [ + "PG4J5YEy3IBXcXyPsNu5fw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y1PwW7CMAz9F+8KEtPGDpU4rFvHyqEqAQZomqaQuqVdGneNKxQh/n0J7GQ/+/m95zP81KaACA519Ttg7+4q5GVoBNpBs/WlI2MRRoAsK8/M54+L6T5xD2m8UzuX22yYlqfZzDOsOmIrITpDWaMuLESfZzCyRX9WTr49g10XQJqtk3ki/KClIgxEkifP6+QVLl+XETR0EFhij0ZhUOt6alBxGoLaI2ntWmnGBbY0ZrQM14vrdrtVK0ei+BCZWTb1CdMsftuWm6dFMNOkJNdkPHGzAm/ExFILOvmkcA//OHZeNO9JobUYRCc3gxdqO43sE3E/4AiU9O++13zDlz++As5TSwEAAA==" + } + }, + { + "ID": "8652524f8148b3a4", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon946b615b821b1d3e96f31d374a46e0460158b3c7/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:20 GMT" + ], + "Etag": [ + "Ie3yN7mzpVfifn8XeJV/IA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8p7phpX+pnnVhWEpWWm5VlEpHqF6Xs62toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsg5FAyVodCMsIzjJWqo0FQwCQysZEigAAAA==" + } + }, + { + "ID": "4eb32ca41d3166a0", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "177" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIChbMSwgMl0sIDMsIFs0LCA1XSkiLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6ImFEUXp6OFY1N2czY3RZZTJ2OWVQMlQ5VWdaZiIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:20 GMT" + ], + "Etag": [ + "Q8WG3DwnoAg4rMvsVcgZMA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "b711aea4ee87f1c3", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/aDQzz8V57g3ctYe2v9eP2T9UgZf?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:20 GMT" + ], + "Etag": [ + "Orr0QDx8q+DZX24h8PTiFA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42RYU/CMBCG/8v50ZHg0AgkfABWlYTAmJtRjCGlu43hto61qIPw372ORBJJjOmH9r2+z931uof3JA+hC8sk3myxrC5i1DNz8FBtU61oK2SuECxAzWNyTsuyOXO+2ptLZ/5sX6/arp/c9Xs9ciixwoxDdw9RgmmooPu6h5xnSFjUXJBDV4URHhtOPYd0JkOjJ8F43B+MGUXOyUUdWlyd8NHEZ/fMO/Eec1nfZw4crN+Y/Qf2U/Yca/2r2hstC9Zy6WGEJeYCzeOLUq5R6JGZq1rJNK0ynjdCzGRDo9JQE/Utd2a7Xfvp5jZuCf2C9kcHXdvvBPE8IlcqBdeJzMkYPFKPoKXmqSc/aTxQj8PoQUVJ3VIKVApN0uaxwFBmRYqaOtLlFi0QnH7nIdFHffgG9tzpl/oBAAA=" + } + }, + { + "ID": "7db4876859f5dd56", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anond805b24995abeed9900329ec121c99191fef03d4/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:21 GMT" + ], + "Etag": [ + "4qyaLd1DqyKRS6QBSpw7lQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qbFFYm+qQYuhRWegcFmwU6BReUm+cE2toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsU7JCYkJIoLpaHQjLSKk2FsY2holCVZnAVZmCVMXWggkAa3ZF1LQAAAA=" + } + }, + { + "ID": "765314c3c87caaf8", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "180" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIFsoMSwgMiwgMyksICg0LCA1LCA2KV0iLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6IkU2SThCeFRpZ2ZwSkx2N2l6Y1NweUNWV0tIeSIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:21 GMT" + ], + "Etag": [ + "xqFeUDgDXJU/qy1zifgLMw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "b3ad492daf884cea", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/E6I8BxTigfpJLv7izcSpyCVWKHy?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:21 GMT" + ], + "Etag": [ + "h/jBTO8OR17M3SPL5+Dg/A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/52RUU/CMBDHv8v56AgiUQgJDwwaQSdgGfpgDCndbRS3da5FnYTv7nU8kOiLMX1o/9f/7+563cOryiPowVolbzssq7ME7YM7cDS71BraCp0bBA/QioScm+bWD2fdGW917tuLeXB1Pkqag36fHEZuMBPQ20OsMI0M9J73kIsMCYsvVuSwVeEEZ8MZH5HOdHTUczYImYv8Jld1aNU64ZNpyG4YP/HTZRAM/IDBwfuJXf4Pa/8Je6HlwVavOcZYYi7RPb4o9Ralnbi5mo1O0yoTeSPCTDcsGgs1Ud+y60nX/wxVEhe3wXtHfclFUQ0fn+7GFblSLYVVOifjckE9gtVWpFx/0HigHofTfkVJ56WWaAy6pBfHAkOdFSla6siWO/RACvqdsbJHffgGE8/kCvoBAAA=" + } + }, + { + "ID": "d531c387927462f1", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon61492c831170fb5089347e12738e0a84aef02e8f/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:21 GMT" + ], + "Etag": [ + "yKrQ9L28x2wEp084BYagrA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8pXehcFWvoYWVQYlbsWGFiYOEUmphc52toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsg5FIAkB1tToQlhGcZaxUG1sL5SCrNYGrMIWzzMBqY8EQAC6z5IbEAAAA" + } + }, + { + "ID": "e599b261d68ae194", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "187" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIFsoWzEsIDIsIDNdLCA0KSwgKFs1LCA2XSwgNyldIiwidXNlTGVnYWN5U3FsIjpmYWxzZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiJ1VFNNNE9NdGR0U1Q3YnZ1dGg3aGRMOU1mUlUiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0In19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:21 GMT" + ], + "Etag": [ + "BMwT73iECIV2XoQR/GSPyw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/41SW0/bMBT+K5X3AlJp6lzbStXG2gxFaruRpGwTQpXjnKSGJC6xU1Qh/vtOUkDTxtCeEp/zXc7tkdyJKiUTkoj8voH68OFWJqRPQLMco5+XD7FnCX8WXJk/5GVoXETfDg/TKSJEy1JbWRSHklVnKZTyTIPSk3U0aOJoaX9d6lRHsZfsG731tulivMzCNTIVFNlCVHfI32q9UxPDeHEf5FLmBbCdUAMuy9e4sTeNXS1vgWtlvGFqYNXKeMf2YyE500JW03WEJTQK6g2UTBRYRCtwVstE6k9vSA8EKwc54veCA+NcNpVua0MVLqtM5E3dCZPJI+lq/e2HRP7Cn8W965Nr2u+Z/Z510+/Zp/3eybXT77n48E5vUChFH1F1MjFLCmglntsN/jHmlsU0U3BEbBIA03OTdOxQatPMdR1nxKhnj60xH6eObXILzKHFkKdbi47FKlk5PDWzoe16jmnZdATMzXjGbepaoyE1acaGLgNKh+QJG66BaZgLtZNKHJsms9A/j/1N8GWz8v25P0eDh1r8ifoeBgiKw/VqhmjE7GohEdYOKVjFfng+i4Mr/7iaBeSMH6J7XE7GCgXojPuNDzscDLlc++FPcgyFkEENFf/PgSGjy75/ni+XgkC8FTRSGt+4IK5am24G7aJE2ZZDHc80R543ovglHbjWf+VGzhBzr+fRKkIJlX7u6Xgm5OnZrFGvIEzizFbB6gKzvwBaSYn5rQMAAA==" + } + }, + { + "ID": "4792bc387f13bd5e", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/uTSM4OMtdtST7bvuth7hdL9MfRU?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:22 GMT" + ], + "Etag": [ + "6jj9a6FpRzqMnoVEP04K3Q==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/32QXU/CMBSG/8vxdiSoBAIJF4BViRsfZXhjDCnbGdvs2rGeaSbhv9uOCxM1phfte/o+5+sEb5mKYQT77HCssWquDkhr9+BoaknGXqVWBsEDJHGwzn6eD0X/vuSfx0DpZ7bq9p5u1+OxdZgoxULA6ARJhjI2MHo5gRIFWizp7qyDmtIJzmZLfmd1oeOLXrFJyFzkN7lrQ7vrb3y+CNkD43/wZ+8ndvMPttj6/mTqMzi/2uNBrvccE6xQReimKCudY0RztyCTaimbQqhOjIXuEBqClmh/63AT9JYBxbQJB/v3mtJBGvvDIOFb65I6EpRpZY3bje0RSJOQXH/YOaGdy+lpY5OuKh2hMeiSdi8FZrooJZLtiKoaPYiEXfNjRhd9/gKs2EHCwwEAAA==" + } + }, + { + "ID": "bd2595cd460657fa", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon5cd2f0467523418ea6fcfc416380121fa06ae110/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:22 GMT" + ], + "Etag": [ + "Lve18g7HfoccPjvTqV5b2w==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8r7lKUaWqSbe6TlJycHZJWFFIaZJhmV29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsg5EYAkDVtToQlhGcZaxUGwtjm4DYUA6mblO4HjMkPeZgPbFgCAAVG3Zr3gAAAA==" + } + }, + { + "ID": "9b0fb3e54a2be97c", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "186" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIEFSUkFZKFNFTEVDVCBTVFJVQ1QoWzEsIDJdKSkiLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6IngwSnB1RU9oTnVzR3ozM3pnS0RtOUJUM0hLQiIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:22 GMT" + ], + "Etag": [ + "saVQQ1CRTVqlBgCNeVShxA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/41SW0/bMBT+K8h7AQka4tyaSmgracYKKBNp2glNU+W4J6khiUPsMAriv+8kLWjaGNqbfc53ObcnciuqFRmRVOR3LTSbDzcyJYcENMsxqtji6soM4mRxV5zmQQSL2fphfHKCCNGx1FoWxaZk1dEKSnmkQenRfDZ4OD6v2/DrOmrV2aNlPeYXk9I/TawvF6fIVFBkl6K6Rf5a61qNDOPFfZBLmRfAaqEGXJavceOeGnUjb4BrZbxhamDVynjH9mMhOdNCVifzGZbQKmiWUDJRYBGdwFEjU6k/vSE9EKwc5Ii/FxwY57KtdFcbqnBZZSJvm16YjJ5IX+tvDzILL8Mg2RvH8fh6f/eZJfE8SPa/m4d79MfBAeqs0EZUvUrC0gI6hV23039MuWMxzRRsEcsUgHpuuvId07TNzHUdZ8hMz/Ytn/srx6bcAnpsMeTpzqJnsUpWpu24Weq4MDQ96oBPmelnlNqWTR1/BalHue8xNyPP2G8DTMNEqFoqse2ZBHE4TsLl9PMyCsNJOEGDn434E/UtniIIG48CRCOmboREWDejaZSE8ThIpotwu5lLyBnfzO5wNxkrFKAzrjfZ1DgYcjUP42uyDcWQQQMV/8+BIaPPvn+dL4eCQDwVNFIa/7ggrjqbfgbdokTZlWM6HqVDzxtS27VID270XznHpZh7vY5OEUqo9K6n7WGQ551Zq15BmMSZRdPoDLO/AIeOwr6sAwAA" + } + }, + { + "ID": "dba83faa76bb4d6e", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/x0JpuEOhNusGz33zgKDm9BT3HKB?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:22 GMT" + ], + "Etag": [ + "LBYDvCm2D6MxDSH5fmFQUg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/22Qy07DMBBF/2XYtlKgAolIXZAmNKXQR9ouEEKVm0wexY5DPIGmVf+dcbpgAfLCvuN7Zq59go+iTMCFXZF9Nli3VxnS0h4iNI0kw1ulS4PQAySRsfPZe/W/RurGv3s5+KvwNlWPy002HLLDxDkqAe4J0gJlYsB9O0EpFDKWOlt2UFtZEQWjeeSzVjq56EXwsA5s5S+57Urb6198MlsH4yD6hz+/8+rBXu8iTLHGMkYbp6r1HmOa2JeaXEvZKlH2E1S6T2gIOqK7PThPVRPM81ljxsfB4JhNfXXvrQfh1GOX1LGgQpds3KyAB5EmISP9zYGhC2i113LTRa1jNAZtU+cyYKRVJZE4EdUN9iAW/F9hQRd9/gEnATogjAEAAA==" + } + }, + { + "ID": "45f3ac1643a9832c", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon1456fb56e81725e92a19f22434259deb72c97a6f/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:23 GMT" + ], + "Etag": [ + "EribgkzIOJrGXAjsY6Aq3A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8q7FmUmpWdXefp7FblHOGYVR5o5Fho72toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsg5EYAkDVtToQlpFSbSwQgonYWgAPFC3ulgAAAA==" + } + }, + { + "ID": "d3c28e701e6a6459", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "158" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIDEiLCJ1c2VMZWdhY3lTcWwiOnRydWV9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiTEpVc1k4MFJFcjVoV0lYMjdFWVZPaE10Vmg0IiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:23 GMT" + ], + "Etag": [ + "jHZkLbDlzSumR3hmks37aA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "e912c77be9f5996c", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/LJUsY80REr5hWIX27EYVOhMtVh4?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:23 GMT" + ], + "Etag": [ + "2K+htbicSr6uw/FtgSe/bQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2PW0+DQBCF/8v4KE2x8ZYmfbAGFcVqQaqNMWZZhktdWNwd0hDCf3dofZo9s9+cOdPDT1mnMIekzH9bNN1JjrQeHyHaVpHl0ujaIjiAJHImZ0+nBSWljMxlu5/eUR7hNFkvFkxYWWAlYN5DVqJKLcw/e6hFhTyWud9MUNeMwl+9efdeyI1Kp2NjFQfBzTLwYPgaHNjpJMQMDdYSR7fG6B1K8segttBKdZWoJylWekJoCQ4Th9/gMbbbazf0zEXx7n/Mrrzt5qV4pk1xzpTSUlCpawbjCHgRaRIq1HtOCmfwr5cdm74aLdFaHE3d44JbXTUKiRORadEBKfjch5KOevgDCeOELksBAAA=" + } + }, + { + "ID": "f9235a108bb6347b", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anonccb74da42af2c39f1cff0f22272911e27b72e2e3/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:23 GMT" + ], + "Etag": [ + "RCuE/6G28BFNSkm6eGOBEA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8oHOZe66pu5G1k4ufkFZ+eapbr7O7k62toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwvXxgIhAFmpeK9uAAAA" + } + }, + { + "ID": "42251547c3c099a3", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "160" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIDEuMyIsInVzZUxlZ2FjeVNxbCI6dHJ1ZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiJUQU53Q1ozeW81d0ZwcXlWUENuZlJkWHFmMnEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0In19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:24 GMT" + ], + "Etag": [ + "COd2B/d3ZDVQU93Dp8oIcQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "55b0259a6cc20c4e", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/TANwCZ3yo5wFpqyVPCnfRdXqf2q?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:24 GMT" + ], + "Etag": [ + "7AnfuA91DQZFKaWiLZu6Ig==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P0U6DQBBF/2V8bZNWo0aSPlCU2Ehqi60ajDFbGCh12QF2CCGEf3dofdo92TN37vbwm5sEHDjkWdVg3V1lyNvxEqJtNFs5SjIWYQLIKhPz3jVp4z7MH7eR/6I+8iBq7lbZYiGGjY9YKHB6SHPUiQXnqwejCpSxdPYjBnflCH7w6u4EC0pGXO+DwF0GTzB8DxM40SHEFGs0MY5ZZU0njHk11rRH0rorlJkmWNCU0TKcJ86vO3fdetFNR7etX1bd+8YzaZh8Vul1JZamWHFORsT9G8giJlY6pFZ6whz+edlJ6KamGK3FMXR2WeBRUWpkacR1gxOIlXz2OecLD39rCn+YSQEAAA==" + } + }, + { + "ID": "bc7b748aa7413711", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anonbeeb0fe0d8c5174d079917fffaf0c704bc6209dc/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:24 GMT" + ], + "Etag": [ + "7NJewAPixiCWVFoeVMvHlA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qb+3mlljsGZFZkOoeHueWnhvmWeeQ42toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwnrGSvVxgIhAMqsCMxwAAAA" + } + }, + { + "ID": "b84842b0ee41d973", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "161" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIFRSVUUiLCJ1c2VMZWdhY3lTcWwiOnRydWV9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiTUxXVGVhVURiQW0wU01xVjJNOUxUUnpYeXh6IiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:24 GMT" + ], + "Etag": [ + "s1bQAZNws5kmhO6IjEDGtQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "8b5957519d01c73e", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/MLWTeaUDbAm0SMqV2M9LTRzXyxz?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:24 GMT" + ], + "Etag": [ + "L9IdeIlyj0I0Pc/6KSspMg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P3U7CQBCF32W8hVi9MKEJF6AkNm4BC4iJMWa7nZbW/SndIboQ3t0peDV7Zr85c+YE37UtIIa8rvYH7MJNhfTaPzL0B02eS+usRxgAkqyYFKOkwESHJkqipbp9eFn5Nq3GYya82qGREJ+grFEXHuKPE1hpkMfK6IsJCm0vpouFmE3m3DCu6BvzjRCTqZjB+fM8gMblGZbYoVXYu7Wda1BR0gf1O6d1MNIOCzRuSOgJLhOX31Rs1yg3T/nERKt0/3afjsQ6O76H3yNT2ilJtbMMblbAi8iR1Jn74aRwB/96Gth02TmF3mNvGl0XPDrTaiRORN0BB6Akn/tc01Wf/wChp7fwSwEAAA==" + } + }, + { + "ID": "1200b533f15e864d", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon22e86b5d626011c05dce26c51423c2bc29c6db0a/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:25 GMT" + ], + "Etag": [ + "h5mkha42Xdz57LSnwSVPiQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8pnmOZmZySaGEWkVJma+wTnlQeHBWQG2toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwqXFJWmKtXGAiEART5HNnEAAAA=" + } + }, + { + "ID": "0e46b355e9ca3aaf", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "162" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUICdBQkMnIiwidXNlTGVnYWN5U3FsIjp0cnVlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6ImZCYXVteVd2NTlFdlVpZ1dESnRZME5GT0s5eCIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:25 GMT" + ], + "Etag": [ + "KH4ockKDjHqQwOC/kNdG3w==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "027faea85f52fe8d", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/fBaumyWv59EvUigWDJtY0NFOK9x?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:25 GMT" + ], + "Etag": [ + "mM/FwkxZQqtvTLHwuaoXWQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2PTW+CQBCG/8v0iik99CCJh9pqtaW0ooZ+pGlWGBDdZZAdVGL47w7a0+6Tfeadd0+wzYsEPFjl2a7GqrnJkGfdJURba7ZylFRYBAeQVSamebsdH7bH79mO9wt/cqgVfUazwUAMG6/RKPBOkOaoEwvezwkKZVDGUvdPDG7KDuaLcBo8CxtKOg6Wvv8w9EfQ/rYObGgVYooVFjF2YWVFG4x52vW0a9K6MaroJWiox2gZLhOX13SoatNE+/v+aL/Ms+jphb/cYPz+2j+KpSlWnFMh4nIOsoiJlQ7pIEXhDv552EjoR0UxWotdqHtd8Eim1MjSiKsaHYiV/HaS85XbM3BbxhpKAQAA" + } + }, + { + "ID": "4a3a1ce8de7fa983", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anonbb0781d98c225bdbd86c980488a43078d08ab47e/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:25 GMT" + ], + "Etag": [ + "EYU8rQa2ftujQRgqoUU5Wg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8q7RoZaFAUmGqWVlGYFBqUX5oeGmoan29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwo7Ojkr1cYCIQDzYii+cAAAAA==" + } + }, + { + "ID": "ae49f1eb750aaf42", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "177" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIENBU1QoJ2ZvbycgQVMgQllURVMpIiwidXNlTGVnYWN5U3FsIjp0cnVlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6IkdBVm13RmxpUWhocmxMNnBzTVA3VlBDZ290WiIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:25 GMT" + ], + "Etag": [ + "fq8UN9+En5F4ruTdniwaEQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/41SYW/aMBD9K5X3oZu2EhJIQpCqjYFbIVFUSGDqviDHHMFtYgfbKUJV//sugVbT1lX7lvjeu/fu3T2RByHXpE9Ske0q0IcP9yolXwhYluHrZtdbTKPPVPpXXV0layn2jM4uLxEhapbZqjw/FExerKFQFxaM7S/i1vVgWeyvcjHbbnU+CUpzcxsub4eZsj+RaSDfTIR8QP7W2tL0HedFvZUpleXASmFaXBWv786j55Ra3QO3xnlD1EHXxnlH9muuOLNCyctFjBYqA3oFBRM5mqgbXGiVKvvtjdYtwYpWhvhHwYFxrippa2/YhSu5EVmlm8ak/0Qar799kJhO6DA5Gw7i5OP5Rqnzs0F89v0uofEn5K+xvZANO2FpDjXzNOX4H+nWLGaZgSNilQJ4YZCuI991u+4mCHy/x9ywG3UiHq39rsc74LU7DHm2lmhYTCoJnShlPOiBF3EObhh2wjRgURoF7a7X5m0WtCPXjTzyjHNqYBZGwpTKiOOsZDing4SuxlerKaUjOkKBvRZ/on7MxwhK5ovpENGIKbVQCKuzGU8TOh8Mk/GSHjcygYzxQ7zDnVhdAQrjVpNDibmQ2YLO78jxaQ4b0CD5f+aFjKb6/lG+3AcC8UJQyFj8x/1wU8s0EdR7EkVtx/VDz+uFYc8P2h5pwNr+XYtCrL0eRd0RCpD2NNPxOMjzSawyryAsYmTT8fQaq78Avo8reaMDAAA=" + } + }, + { + "ID": "79c8e8bb37570da0", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/GAVmwFliQhhrlL6psMP7VPCgotZ?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:25 GMT" + ], + "Etag": [ + "d7ZSHCvz0mr21D8cTvZ/NA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P3U7CQBBG32W8hQheiCHhAiqKSSVQfhJrjFm2Q1vc7dTdAVKbvjtT8Gr3ZM98820NP3mRwBB2efp7RFfdpcjL9hKhPxr2cpRUeIQOIKtUzGQQr2bB6a9n3UP/+UmvT/H9fDwaieF1hlbBsIZ9jibxMPysoVAWZWzf+xaDq7KFycd6uhK0lLQ434TheBJOoflqOnCgXYR7dFhobLNKRwfU/NbW9BkZU1lVdBO01GX0DNeJ6+vreGvPLyZfZpkz4WPp3xeD7SJIiWOxDGnFORUiblYgi5hYmYjO0hP68M+TSkIXjjR6j21o77YgIFsaZGnE7ogd0Eo+O8v5xs0FYU2TlEkBAAA=" + } + }, + { + "ID": "da535b357729f06a", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anone39bac68e29cce17737b6a9b960420c0a6091192/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:26 GMT" + ], + "Etag": [ + "9FV264sQR/PbALLr3jHgtA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8pbuoUZmZkUBwbpByQ5+vgUGWd5pJc42toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwpH5VqWKdXGAiEARWiz93EAAAA=" + } + }, + { + "ID": "793acf775966fa51", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "189" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIFRJTUVTVEFNUCgnMjAxNi0wMy0yMCAxNTowNDowNScpIiwidXNlTGVnYWN5U3FsIjp0cnVlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6IlBUNHpIM3JUTzZKU0pLRUdVeUd0ckpIaW9JSiIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:26 GMT" + ], + "Etag": [ + "oj/1FZ23HfgvP9daKUPhxg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "75ac779a407ed988", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/PT4zH3rTO6JSJKEGUyGtrJHioIJ?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:26 GMT" + ], + "Etag": [ + "imeJ7tDArqZ+RhVVqdWfuQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2PYU/CQAyG/0v9KCQYjSZL+AC6AHMojIGJxphj6+Dwbt3uuphJ+O924Kfe23v69u0RvnWZQwBbvasbdO3VDnnZPRL0jWEvpaLSI/QAWe2E1BajB34aufr9OtlvNnX+VjTL4VAIn+3RKgiOUGg0uYfg4wilsihjxeBLCG6rTqSzebhKR/OFtCzlXetlHcejcRzC6fPUgwNtEyzQYZlh51c5OmDGsy6q35MxrVVlP0dLfUbPcJ44/y7Su9/prUtf76NV9BxO1u2EXTTVNIuEMpQp1lQKuF6BLGJiZRL6kaxwA/963IrpwlGG3mNnOrgseCRbGWRJxK7BHmRKDp5qvujTHxfT5n1NAQAA" + } + }, + { + "ID": "171e54c4ce71fdb5", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anona0684ba8bb1794aa2027cb785392d7be303bc3ed/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:26 GMT" + ], + "Etag": [ + "nHV+kQHgLgep8nrTR0DWMg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8rneYRpZwd6pPukpxZY5BWFBBm4hPum29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwmbmFqYWJgZmZjqGSjVxgIhAExFsul5AAAA" + } + }, + { + "ID": "c3bd9ae149a45500", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "195" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIERBVEUoVElNRVNUQU1QKCcyMDE2LTAzLTIwIDE1OjA0OjA1JykpIiwidXNlTGVnYWN5U3FsIjp0cnVlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6IlBXaFRoY0V1b3FpVDNQYnpzV3BpM3E2TFBaUSIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:27 GMT" + ], + "Etag": [ + "/yQA9+xFSrt+P2WHop0dOg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "a9d7d90df292c82f", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/PWhThcEuoqiT3PbzsWpi3q6LPZQ?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:27 GMT" + ], + "Etag": [ + "WkzS2GJv8O7v1q+QG8LxbA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P0WrCQBBF/2X6WAWt0IrggxZJLcHGqAgtpWw2E7O6ySTZiW0U/92J9mn3sGfu3D3DweQxjCAyu7LGqnnYIS/bS4iutuzkKCh3CB1AVjsxt4fT6sl7Pw4/Xo798nHpDf2/aDIei+F0ipmC0RkSgzZ2MPo6Q64ylLGk9yMGN0ULq3U4X3jCGcUtLza+P5n6M7h8XzqwpyjEBCvMNbZhRUV71Dxve7qUrG0ylXdjzKjL6BhuE7fXYJuuUz2rqTTrQRCd3LYwg/LZDz6XYlnSig3lIm5WIIuYWNmQfqUo9OGfp42EBhVpdA7b0N59wStlhUWWRlzV2AGt5Ldvhu98uQKziqGbSgEAAA==" + } + }, + { + "ID": "28d1d90c20ebef1a", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon4bce78f0d8295d449ffffc9a13936295393df4af/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:27 GMT" + ], + "Etag": [ + "xBvEnnVOLs2PlnOpqfxhMQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8pXOJW55uWF+fsUGwXk5PkXFKZVZPgG2toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwobGRia6RoY6xoZKNXGAiEAlvSoiXcAAAA=" + } + }, + { + "ID": "0a1a092c0b9c4bbd", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "195" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIFRJTUUoVElNRVNUQU1QKCcyMDE2LTAzLTIwIDE1OjA0OjA1JykpIiwidXNlTGVnYWN5U3FsIjp0cnVlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6ImtnbmNscVY5dW52RHlKUGl6NDdzVGNBak1rTSIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:27 GMT" + ], + "Etag": [ + "y+hPQKE4Xztg8N4DbXaiqQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "e00639aff7bbd5f2", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/kgnclqV9unvDyJPiz47sTcAjMkM?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:27 GMT" + ], + "Etag": [ + "AJe2BAMA8g2yvHUlwpzARg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P0W6CQBBF/2X6iok1TdqS+ABtUzVgLIovTdOsy4DAsovsoEHCv3fQPu2e7Jk7d3soc52AC4c8O7XYdA8Z0td4idC2iiwftdEWwQEkkbHprXDme6H3ks268yJWl/rqRdl8zoaVR6wEuD2kOarEgvvdgxYV8lg6/WWDunqE7S5arj+ZK5OMvI6DwPODDxh+BgcKc4gwxQa1xDGsbkyBkpZjT3s0SnWV0JMEKzMhtAS3idtrmWmpTvvXVp/fu9Umvz492530irAM2VJGCsqNZjHeAi8iQ0JF5sJF4RH+2e84dNMYidbiGDq9L3gzVa2QuBE1LTogBf92kdOdhz/Nt2xpSgEAAA==" + } + }, + { + "ID": "57ad65330c0b17d0", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anoncbe087866dff60de61c8465defe86c762bf57a39/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:28 GMT" + ], + "Etag": [ + "l3d8H0EWWjSGZrFLFSnIHQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8rnGKdYeBi4hodnBbtHFbn5uAXneXoE2toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwmbWhmYWBmYKtXGAiEAbxEwWHUAAAA=" + } + }, + { + "ID": "86a734147395b230", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "261" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIEB2YWwiLCJxdWVyeVBhcmFtZXRlcnMiOlt7Im5hbWUiOiJ2YWwiLCJwYXJhbWV0ZXJUeXBlIjp7InR5cGUiOiJJTlQ2NCJ9LCJwYXJhbWV0ZXJWYWx1ZSI6eyJ2YWx1ZSI6IjEifX1dLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6InhJRFRacVVDaUFKNkhBNmNCbkZldG9PS1I1NiIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:28 GMT" + ], + "Etag": [ + "CDTm0lBumZ6odNjZuH8rGw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "2a17f360eca5ee13", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/xIDTZqUCiAJ6HA6cBnFetoOKR56?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:28 GMT" + ], + "Etag": [ + "bjFADPaTKgSWYpx6Rm3nuQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P3W7CMAyF38W7BYlpWi8qcVH+RgdiUEBom6YppG4pS+LSuBpV1XdfArtyjvP5+LiFn8KkEMKxyC81Vs1DjrzxjwRtrdi6UpKxCD1AFrknz7Nosha7Rb49vJfXINFPpt4Mh46w8oRaQNhCVqBKLYSfLRih0Y1lg29HcFN6Ea9205dp4hqaUt9Y7ZfLaLScQvfV9eBMxwQzrNBI9G5lRWeUHPug9kRKNVqYfoqa+oyW4TZx+73Gk93HZT8uotdgHgVyZGbI9LZIngNHKZKCCzIO3G/BLWJioRL6dUnhEf71qHGm64okWovedHBfMCZdKmSXiKsaeyCFO3de8F13fykSBSdLAQAA" + } + }, + { + "ID": "9bb4227ca5ffd5e8", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon6a9c1e2a76fd32f1093f3e0db866446259ba7069/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:28 GMT" + ], + "Etag": [ + "kpceRaS9m0FwAf1HUJInPQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8pnFySnBiUGW+YauJU7phl6hHp55gUE2toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwvXxgIhAEE5v9FuAAAA" + } + }, + { + "ID": "d8077e6a53eeaf2f", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "265" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIEB2YWwiLCJxdWVyeVBhcmFtZXRlcnMiOlt7Im5hbWUiOiJ2YWwiLCJwYXJhbWV0ZXJUeXBlIjp7InR5cGUiOiJGTE9BVDY0In0sInBhcmFtZXRlclZhbHVlIjp7InZhbHVlIjoiMS4zIn19XSwidXNlTGVnYWN5U3FsIjpmYWxzZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiJIZ3RqeTBNNEpwYTJ6UE5scmxRbTdLRjB1OU4iLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0In19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:28 GMT" + ], + "Etag": [ + "FTtwBPtW+4jcMdWej7jDZA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "ef5cba75941827f1", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/Hgtjy0M4Jpa2zPNlrlQm7KF0u9N?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:29 GMT" + ], + "Etag": [ + "9Dlos3T948RudU5fIirOZQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P0U6DQBBF/2V8pQlqjULSh1ZtWkXaYnnRGLOFgYK7DO4OMdj03x1an3ZP9syduwf4qpocQthV5XeHtr8okTfDJUHXaXZytNQ4BA+QVSlm8KDJXW+D8V3S5elNsazs6m0zmYjhsj0aBeEBigp17iB8P0CjDMpY4X+KwX07wDxaTbeChvIB4zSKprPoEY4fRw9q2iVYoMUmwyGrtVRjxsuhptuT1r1RzShHQyNGx3CaOL0uSq57/2X81Kqr33Wsrd6Y2+e53wWxWJoyxRU1IqavIIuYWOmEfqQnXMI/z3oJXVvK0DkcQv3zgnsyrUaWRmw79CBT8tlFxWc+/gHGMk6USQEAAA==" + } + }, + { + "ID": "22264fd1286e963f", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anonfd6a7f80f0f4a1bfe447f723414adcfff8984d45/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:29 GMT" + ], + "Etag": [ + "fmPDaAW+FhkH9eGHuJzpGg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qn5Qa4JDqGa7tlZHtYprp7lHpVFbin29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwnrGSvVxgIhAFOxj1ZwAAAA" + } + }, + { + "ID": "8061fbc4bd29c3bd", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "273" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIEB2YWwiLCJxdWVyeVBhcmFtZXRlcnMiOlt7Im5hbWUiOiJ2YWwiLCJwYXJhbWV0ZXJUeXBlIjp7InR5cGUiOiJOVU1FUklDIn0sInBhcmFtZXRlclZhbHVlIjp7InZhbHVlIjoiMS4zMDAwMDAwMDAifX1dLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6ImpnbUhTQkJsNnBZRmczZk9tWmNXV3dZSWpoRiIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:29 GMT" + ], + "Etag": [ + "1oVlbEdkfdoUw9Y/M0u3NQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "8cdcf94b53ee6ddd", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/jgmHSBBl6pYFg3fOmZcWWwYIjhF?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:29 GMT" + ], + "Etag": [ + "3MQ3YIqcZ2Yc6vRl1FcFeA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P3WrCQBCF32V6G0EreBHwwojBQGxrRCSWUtbN5K+72ZidVELIu3diejV7Zr85c6aHn6JKwIVbkd1bbLqXDOk4PiK0rSLLpTaVRXAASWRMLg/HZRzc5fU1lqvfSC186eNmvWbCyhy1ALeHtECVWHA/e6iERh5L599MUFeP4u182EXBlhvaJFMjDDdeuIPha3CgNLcIU2ywkji61Y0pUVIwBrW5UarTopolqM2M0BI8J56/Zab3J89Tqzr2s2X6rq/ycnnEQZn7TCkjBRWmYvB8Al5EhoSKzIOTwgL+tdex6UdjJFqLo+l8WrA1ulZInIiaFh2Qgs/dFzTp4Q+exbZmSwEAAA==" + } + }, + { + "ID": "88a1b354e410eca1", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anonc5e34387334449aa7014616835fabf4157efc596/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:29 GMT" + ], + "Etag": [ + "c9XTRKCuV7q/0DR2N8afjA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8onW0aEBHk7l4aZF+obuAQZ+VkkpmU52toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwnrGSvVxgIhAIkXbdhwAAAA" + } + }, + { + "ID": "3b512c73727b1a3c", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "263" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIEB2YWwiLCJxdWVyeVBhcmFtZXRlcnMiOlt7Im5hbWUiOiJ2YWwiLCJwYXJhbWV0ZXJUeXBlIjp7InR5cGUiOiJCT09MIn0sInBhcmFtZXRlclZhbHVlIjp7InZhbHVlIjoidHJ1ZSJ9fV0sInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiTWdYNWgwSHpteVlpSFVIVnhkbm9UdFpzNnRpIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:29 GMT" + ], + "Etag": [ + "nHk9tTrK51ZxbyVFbEI8vg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "25a24c100d1c987e", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/MgX5h0HzmyYiHUHVxdnoTtZs6ti?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:30 GMT" + ], + "Etag": [ + "cMe4UxitIviAQT4MMAgf2Q==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P3W7CMAyF38W7BYlNbBeVuCgTUpFaGIxO+9E0hdQtYUncNWajQ333ubAr5zifj49P8Gl8ARFsTfV1wKa9qpBX/WON4WA5SKnJB4QBIKtKSJ3hOD8ann+beLUZZ1lclTeryUSIoHfoFEQnKA3aIkD0dgKvHMpYOfoQgtu6F9PlMp3FC2k4KvrGIk/TeJrOoHvvBrCn7RpLbNBr7N3qhvaoed4HDTuytnXKDwt0NGQMDOeJ829WPd/uRsmva19MkidPx8LThl/DHRuhLGnFhryA+SPIIiZWdk0/khSu4V9PWzF9aEhjCNibji4L7snVFlkScXPAAWgl5yaGL7r7Aw78YW5LAQAA" + } + }, + { + "ID": "9843d83857eafa00", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon9fc30fe9ffe425b44148c66c1cfaf1c2848dbba4/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:30 GMT" + ], + "Etag": [ + "dxSHkKOAd4KsqW0FQm4mZg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qnVAR7ZHv7O6aYeBcXhhu4Beaa5Eal29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwqXFJWmKtXGAiEA9xmoHHEAAAA=" + } + }, + { + "ID": "adc08435ff40d901", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "264" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIEB2YWwiLCJxdWVyeVBhcmFtZXRlcnMiOlt7Im5hbWUiOiJ2YWwiLCJwYXJhbWV0ZXJUeXBlIjp7InR5cGUiOiJTVFJJTkcifSwicGFyYW1ldGVyVmFsdWUiOnsidmFsdWUiOiJBQkMifX1dLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6IjdHNFM3clM1VlNoZVBqNzhlNU5oYW50QXdTZCIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:30 GMT" + ], + "Etag": [ + "X0/LHROGCcSjAGN6gTif/w==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42Sb2+bMBDGv8rkvW1DQvgTIlVrlrIsUsQ6IN2maYqMOYhTsKntpIqqfPcd0HbT1lV7hfH9nnvuzvdAbrnIyZRkvLzbgzq+3cmMnBEwtMTbr0Nr9TH+tJizZDdbRF6Z8sK6v7hAgrcqvZVVdaypOM+hlucGtJmuk4G/cBJfJe5NsoXrnT8BN9pSYWb3SY5KDVWx4uIW9VtjGj21rCf3QSllWQFtuB4wWT/fWwfbapTcATPaesHUwqq19Yrtu0oyargUF+sES9hrUBuoKa+wiDbBuZKZNJcvpB5wWg9K5A+cAWVM7oVpa8MsTIqCl3vVJSbTB9LV+tuBJOEqnKdvLg+0Qj7HdFx0dEqzClrysavlP6bZqqihGnpikwHYvpflgTsaOaPC81x3Qke+E4wDFuSuY7Mx2MMxRZ1pLToVFVJ4OXV9h7pj6jFwAi+bOMU4CNzctQPHoRNgwwwy3yEn7EsBNXDFdSM173sj8zicpeFm+WETheFVeIUG94r/SX2Jlwil8TqaI41Mo7hErJ3FMkrDeDZPlzdh/wIrKCk7Jnf4BgWtNJz1Y7umitZgQGky/f5ABP6gup9g8xRLj003PtN9SZLGy2jR1v5M3NBq3yGH/kBm7+fkdPqBDC5Lryef12H8jfRXMRSgQLD/fBZUdNHXd/1p7RDExUMjbfAf14Dp1qabdLsOvGty5Pq2PfH9YOg6HulgZf6K+Z5Pzn7tWpsRahDmsad+57DV3myvnyEM4stE3aROPwHXrpdr+gMAAA==" + } + }, + { + "ID": "3ca3a29ac933fd51", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/7G4S7rS5VShePj78e5NhantAwSd?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:30 GMT" + ], + "Etag": [ + "w2RCs+V11RWRgVPCk4AvJg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P3WqDQBBG32V6WQOxJKQIuTBS0hQRuzbJRSllo+NPsu5ad6yI5N07Jr3aPeyZb74d4VLpDDw4VcVPh+3wUCC9TxeBtlNk+WiMtggOIMmCzf5JBPbx4LriKIpDHFwW/u9bsV6zYdMSawneCHmFKrPgfY6gZY08ls+/2aChmSD5ELtoy1ybbOJoH4b+JnyB69fVgbM5CcyxRZ3iFNa05owp7aaetjRKDbXUswxrMyO0BLeJ2+tqu0hWbbI8JCXG59UzLqNSavL7JGNLmVRSZTSL+wR4ERmSSpiei4IL/7wZODRuTYrW4hQ6vy8ITN0oJG5EbYcOpJJ/+1rRna9/F8V9qEoBAAA=" + } + }, + { + "ID": "2ba376fa2c915191", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon6da574a53a6ce496b84f3995d52944a8ec0beb74/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:31 GMT" + ], + "Etag": [ + "pXPF0HaBC9nGh4B2h1toxQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8oXRAS4GXgkOjlb5rlnmDgZZRiW5FcE2toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwo7Ojkr1cYCIQDOHZWmcAAAAA==" + } + }, + { + "ID": "291a7059bc437e0c", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "264" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIEB2YWwiLCJxdWVyeVBhcmFtZXRlcnMiOlt7Im5hbWUiOiJ2YWwiLCJwYXJhbWV0ZXJUeXBlIjp7InR5cGUiOiJCWVRFUyJ9LCJwYXJhbWV0ZXJWYWx1ZSI6eyJ2YWx1ZSI6IlptOXYifX1dLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6IjBFRVVUaTBwT0VZaldCNW1wV1JheEJ1c1h3biIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:31 GMT" + ], + "Etag": [ + "VQTSvfZeAuxFJfzX06AffQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "0b6cb470a6ff49df", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/0EEUTi0pOEYjWB5mpWRaxBusXwn?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:31 GMT" + ], + "Etag": [ + "o5M+5xutMzmwl/SRISxabg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2PTU+DQBCG/8t4lEY8cCHpQQyJTVo/oKQ2xpgFphTc3UF2SIuE/+7Qetp9ss+88+4I37UtIYS8rn567IabCvltviToes1OjpasQ/AAWVViUrC5Dc49b37NSd+lySo9q7xaLsVwxRGNgnCEQ426dBB+jGCVQRk7+F9i8NDOEO23cSpoqJzxOVuvH6J1DNPn5EFDeYIH7NAWOGe1HTVY8Gqu6Y6k9WCUXZRoaMHoGC4Tl1c/jrNt7bcv8b7ZRYFpd4k6R717P1mxNBWKa7IiZinIIiZWOqGT9IR7+OdokNDXjgp0Di+h1wWPZFqNLI2469GDQslnn2q+8vQHCZ2xXUkBAAA=" + } + }, + { + "ID": "47ae4302fd9a13a6", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon76d74b5be73927891ddbe361d8f2cfdfec9c9ae9/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:31 GMT" + ], + "Etag": [ + "6zjPuiNZCcmMgaPqh+EexA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qbVWUFlGb6RTkn5/qmJwYUZmi7plY42toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwpH5VqWKdXGAiEAHvgGyHEAAAA=" + } + }, + { + "ID": "0a9e2d776e9ff105", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "289" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIEB2YWwiLCJxdWVyeVBhcmFtZXRlcnMiOlt7Im5hbWUiOiJ2YWwiLCJwYXJhbWV0ZXJUeXBlIjp7InR5cGUiOiJUSU1FU1RBTVAifSwicGFyYW1ldGVyVmFsdWUiOnsidmFsdWUiOiIyMDE2LTAzLTIwIDE1OjA0OjA1KzAwOjAwIn19XSwidXNlTGVnYWN5U3FsIjpmYWxzZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiJtWkFCSmhHaE5PQ3RYUW02bFNZVW5Tcm9GVG8iLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0In19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:32 GMT" + ], + "Etag": [ + "tRJgAEsltOZCoP6L9dKPFA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "cf3ea2b10249c734", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/mZABJhGhNOCtXQm6lSYUnSroFTo?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:32 GMT" + ], + "Etag": [ + "wEb4r8g8wAqbe+ZOJubdww==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P3WrCQBCF32V6WQULpYjgRSK2VfxNFFpLKZtkTGJ3d+LuhBDEd+9EezV7Zr85c+YCv6XNYARJmZ9rdO1DjrztHhH6WrOXUpH1CD1AVrmQzTR5dsN82ATnBB8P63mdZE0zHgvh0wKNgtEFjiXqzMPo6wJWGZSx4+BHCG6rTuxmy2m8C5YbaRnKutZqv1gE4WIK1+9rD06URHhEhzbFzq9ydMKUZ11UX5DWrVG2n6GhPqNnuE3cfs0hCOfFW7FaT/hja150/Lm3saPXHQmlKVVckhVwH4MsYmKlI2okKzzBvw5bMd04StF77EwH9wUTMpVGlkTsauxBquTg95Lv+voHlDT19U0BAAA=" + } + }, + { + "ID": "9b9a03a9846584be", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon631846225e713c0414a12998076655cc11a31c9f/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:32 GMT" + ], + "Etag": [ + "PJzSqkZmDjY51CeDabfgeA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8oHeFUFF2ZH5bpkRZoaOgMVJKWlpzra2gJVlOSXJOYE5ZcXA5UZAvlFYGZ0tVIamCwDCZuYWphYmBmZmOoZKNXGAiEAlmZrgXkAAAA=" + } + }, + { + "ID": "97470ee9856725b8", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "374" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIEB2YWwiLCJxdWVyeVBhcmFtZXRlcnMiOlt7Im5hbWUiOiJ2YWwiLCJwYXJhbWV0ZXJUeXBlIjp7ImFycmF5VHlwZSI6eyJ0eXBlIjoiVElNRVNUQU1QIn0sInR5cGUiOiJBUlJBWSJ9LCJwYXJhbWV0ZXJWYWx1ZSI6eyJhcnJheVZhbHVlcyI6W3sidmFsdWUiOiIyMDE2LTAzLTIwIDE1OjA0OjA1KzAwOjAwIn0seyJ2YWx1ZSI6IjIwMTYtMDMtMjAgMTU6MDQ6MDUrMDA6MDAifV19fV0sInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiamZQcnRyckp1ZG0wbWxnRXF2ckJXbUFiSzczIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:32 GMT" + ], + "Etag": [ + "Ua8fssOygsr4QpDmAGK2+g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "2c05b964dcd7b199", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/jfPrtrrJudm0mlgEqvrBWmAbK73?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:33 GMT" + ], + "Etag": [ + "83dkhuH3Ku7WZ0KbVzyuHA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P3U7DMAyF38XcdlLRLoYq7aKDShvVpNIVJoEQSlv3b0nTJQ6oTH133I0r5zifj48vcGr7EgLI2/rs0Ix3NdLL/EjROkmWy6B7i+ABkqiZfFiWp8Ztl7FbHd/9OH/7Hd02XK+ZsEWDSkBwgapFWVoIPi7QC4U8VvlfTNA4zCLb7aNDFu4Tbildzq00SqIwi55g+pw86HSeYoUG+wJnv8HoDgvazVFto6UclegXJSq9ILQE14nrb1clhox5dqXylayj87fZHFWYx6slU1IXglrdM/h6AF5EmoRM9Q9nhXv415uRTROjC7QWZ1P/tuBRq0EicSIyDj0oBB+8bemmpz/bzJrMTQEAAA==" + } + }, + { + "ID": "0abf637163c0e021", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anonc71a90b68cd12e72943028236ad46be814413dfe/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:33 GMT" + ], + "Etag": [ + "qV6Ty3CsePmRIjlSQFwLWg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8oXhpmFVBo7F6cG5AZ5ZuUEB7qV+4Sn29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsg5FKhiamFiYWZkYmpnoGSrU62ARjwRAA2mrJiJYAAAA=" + } + }, + { + "ID": "531f33a22b0b1228", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "289" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIEB2YWwiLCJxdWVyeVBhcmFtZXRlcnMiOlt7Im5hbWUiOiJ2YWwiLCJwYXJhbWV0ZXJUeXBlIjp7InR5cGUiOiJEQVRFVElNRSJ9LCJwYXJhbWV0ZXJWYWx1ZSI6eyJ2YWx1ZSI6IjIwMTYtMDMtMjAgMTU6MDQ6MDUuMDAwMDAzIn19XSwidXNlTGVnYWN5U3FsIjpmYWxzZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiJ0RUhoNXBSakJQUjNWQ0lDS082WHlHc1dTcmsiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0In19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:33 GMT" + ], + "Etag": [ + "RXC7X9hj/Ft5Q+5/2gKyFQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "eb0bcbc6d2d530a6", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/tEHh5pRjBPR3VCICKO6XyGsWSrk?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:33 GMT" + ], + "Etag": [ + "nx1vnOWlIZlpLTw4I5vkpw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2PQU/CQBCF/8t4hQSieCDhQGsjjVWwFDEaY5btFArb3bU7pTaE/+4seJp9s9+8eXOCQ6lzGMOm3P40WHc3W6RX/0jRNYocF2u0Q+gBktgyqX+HRz1fq/hD2SRr7+LR8WDbyYQJJ3dYCRifoChR5Q7GnyfQokIeKwbfTFBnvXiYZlEWP0fcqUzuOy+rJJkGSQTnr3MP9maTYoE1aoneztZmj5Jin9TtjFJdJXQ/x8r0CR3BZeLyS9FsN7LpPlikt29hHD7N79+7R7de1gemlJGCSqMZXC2BF5EhoVLTclQYwr8OOjZd1Eaic+hNB9cFoamsQuJEVDfYAyn43llJV33+A4RNWM5MAQAA" + } + }, + { + "ID": "b9a271f14e108d65", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon70d736742ac25d9f445be6367a67bee36b33fc85/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:33 GMT" + ], + "Etag": [ + "fxmspMvMESqTkEM0r+XTCg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qnVeQWF/iW+boGF4Zku/oaFGlHhDin29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwobGRia6RoY6xoZhBiaWhmYWBmY6hmAgLFSbSwQAgA/ounPhwAAAA==" + } + }, + { + "ID": "ff0899ea448a3ea5", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "269" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIEB2YWwiLCJxdWVyeVBhcmFtZXRlcnMiOlt7Im5hbWUiOiJ2YWwiLCJwYXJhbWV0ZXJUeXBlIjp7InR5cGUiOiJEQVRFIn0sInBhcmFtZXRlclZhbHVlIjp7InZhbHVlIjoiMjAxNi0wMy0yMCJ9fV0sInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiQTJEbjVaZEc1aFowSUhZUmFETEhWUjloRVBHIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:33 GMT" + ], + "Etag": [ + "nXLLlyvkavk2JcTUG++7jw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "7248799baf41dd7c", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/A2Dn5ZdG5hZ0IHYRaDLHVR9hEPG?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:34 GMT" + ], + "Etag": [ + "YJwb4caWBuH1VqWhai1ccQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P3W6CQBBG32V6qwk09aIkXkAxYkMapVWjTdMsy/Bjl11khxhCfPcO6tXuyZ755tsB/iqdgQdpVZw7bPunAmkzXhK0nSLLR2O0RZgAkijYPLxf0hcp9kEXubvzvhSVK+VmPmfDyhJrAd4AeYUqs+B9D6BFjTyWO79sUN+MEPpfC6baZCN9bOPYD+IFXH+uEziZNMEcW9QSx6imNSeUtBpb2tIo1ddCTzOszZTQEtwmbq/+c6hnx2w5K4/OKjokIoyjXfJaLtZLtpSRgiqjWdx+Ai8iQ0Il5sI1wYUHBz2Hrlsj0VocQ537gjdTNwqJG1Hb4QSk4L9GFd35+g+lhsOHSAEAAA==" + } + }, + { + "ID": "98a9ea63df2755dd", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anona168c58f3d4ed39a7da999be51dac26bfc5f26f1/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:34 GMT" + ], + "Etag": [ + "vOyD2fkNLNp00/0rQoTvWA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qX+Ve6GKVl+/n4FRgY6BsUBeaHlIU72toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwobGRia6RoY6xoZKNXGAiEAFeEMeHcAAAA=" + } + }, + { + "ID": "eafe3b51c0cf5dca", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "274" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIEB2YWwiLCJxdWVyeVBhcmFtZXRlcnMiOlt7Im5hbWUiOiJ2YWwiLCJwYXJhbWV0ZXJUeXBlIjp7InR5cGUiOiJUSU1FIn0sInBhcmFtZXRlclZhbHVlIjp7InZhbHVlIjoiMTU6MDQ6MDUuMDAwMDAzIn19XSwidXNlTGVnYWN5U3FsIjpmYWxzZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiJ2WG81VkNXdkxtOHFSazhWMHRiVWpDQWxFNWoiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0In19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:34 GMT" + ], + "Etag": [ + "GMRSv6/xOoU06NMVKRtBFA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "169ee25ff277e0be", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/vXo5VCWvLm8qRk8V0tbUjCAlE5j?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:34 GMT" + ], + "Etag": [ + "hLnzuafks7Zo8lfk6yriow==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P3U4CMRBG32W8hWS9QDckXAAhkWQ1ugoajTGlO/vbdpbtLGQlvLtT8Ko96Zlvvp6gqVwGU9hVxb7HbrgpkF/CJUXfG/ZytOQ8wgiQVSFmmbjfXuWNv/+k2OTN3dBVdJzNxPC6RKtgeoK8QpN5mH6dwCmLMpZHP2Lw0AZ4Wz+uhCxlgZ42STJfJCs4f59HUNMuxRw7dBpDVNtRjZrXoaUvyZjBKjfO0NKY0TNcJi6vhw+abJfvh8TG+7SJtxHvNvVyblaTWixDWnFFTsTNK8giJlYmpaPUhFv458Ugoc8dafQeQ2h0XbAk2xpkacRdjyPQSv76UPGVz39p3CSrSAEAAA==" + } + }, + { + "ID": "e73c60e3687e7b60", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon72e44abebd6f4a20b51b296395a6ac2050a8b4af/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:35 GMT" + ], + "Etag": [ + "uaAZrbCrIaQIoDoJ+VKp8g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qXJjpGFSU5F3kmBnrmu+R7aYd5F1ik29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwmbWhmYWBmY6hmAgLFSbSwQAgCWElj9fAAAAA==" + } + }, + { + "ID": "46f7f4728a747204", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "936" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUIEB2YWwiLCJxdWVyeVBhcmFtZXRlcnMiOlt7Im5hbWUiOiJ2YWwiLCJwYXJhbWV0ZXJUeXBlIjp7InN0cnVjdFR5cGVzIjpbeyJuYW1lIjoiVGltZXN0YW1wIiwidHlwZSI6eyJ0eXBlIjoiVElNRVNUQU1QIn19LHsibmFtZSI6IlN0cmluZ0FycmF5IiwidHlwZSI6eyJhcnJheVR5cGUiOnsidHlwZSI6IlNUUklORyJ9LCJ0eXBlIjoiQVJSQVkifX0seyJuYW1lIjoiU3ViU3RydWN0IiwidHlwZSI6eyJzdHJ1Y3RUeXBlcyI6W3sibmFtZSI6IlN0cmluZyIsInR5cGUiOnsidHlwZSI6IlNUUklORyJ9fV0sInR5cGUiOiJTVFJVQ1QifX0seyJuYW1lIjoiU3ViU3RydWN0QXJyYXkiLCJ0eXBlIjp7ImFycmF5VHlwZSI6eyJzdHJ1Y3RUeXBlcyI6W3sibmFtZSI6IlN0cmluZyIsInR5cGUiOnsidHlwZSI6IlNUUklORyJ9fV0sInR5cGUiOiJTVFJVQ1QifSwidHlwZSI6IkFSUkFZIn19XSwidHlwZSI6IlNUUlVDVCJ9LCJwYXJhbWV0ZXJWYWx1ZSI6eyJzdHJ1Y3RWYWx1ZXMiOnsiU3RyaW5nQXJyYXkiOnsiYXJyYXlWYWx1ZXMiOlt7InZhbHVlIjoiYSJ9LHsidmFsdWUiOiJiIn1dfSwiU3ViU3RydWN0Ijp7InN0cnVjdFZhbHVlcyI6eyJTdHJpbmciOnsidmFsdWUiOiJjIn19fSwiU3ViU3RydWN0QXJyYXkiOnsiYXJyYXlWYWx1ZXMiOlt7InN0cnVjdFZhbHVlcyI6eyJTdHJpbmciOnsidmFsdWUiOiJkIn19fSx7InN0cnVjdFZhbHVlcyI6eyJTdHJpbmciOnsidmFsdWUiOiJlIn19fV19LCJUaW1lc3RhbXAiOnsidmFsdWUiOiIyMDE2LTAzLTIwIDE1OjA0OjA1KzAwOjAwIn19fX1dLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6InR4ckZBOGJGeWdiakxkeDZOTVg5S3VGa1VQbSIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:35 GMT" + ], + "Etag": [ + "vGfUgrpbmydQEq+rnQ4C1Q==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "dc9687f441d2fdc8", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/txrFA8bFygbjLdx6NMX9KuFkUPm?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:35 GMT" + ], + "Etag": [ + "N2sJBMS5YHkEHBaILy1pIg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6WSUU+DMBSF/0t9xWQz0eiSPcDGHAqIhSUaY0yBO8ZGKbYljiz77142M+KcLxoe4JTz3XPSdkNWeZmSAYnz7L0G2ZxloB/bDwqqLrTCVyVKBcQgoFmGTv9C3VleePk8XdlTizlu06+cbDhEh0oWwBkZbMg8hyJVZPCyISXjgNi894YO3VStoPbogY5Rc5G22p+5rmm5Nq78JKOcg9KMVx0fOZ4dRqYXnBixNQ5kqGVeZqaUrOnYMKKOf9uB1A5sM7LH38A6RrZO9B8r74N/z+zKvp5KPWp8HH1o/N/o9jHIUsQU5iChTKA9u0qKJSTaaa+FWoiiaDgrz1Pg4lzjQZAdsfur13JiXseTJouXbrq+8r2nm/t6spoFHF2FSJjORYnGWYi7S7TQrKDiA/uSPvnSVoNDAykSUAraob19wEjwqgCNjXBLwCAJw8s1zfVebz8B5wAJ8LkCAAA=" + } + }, + { + "ID": "8b98df71cc20f03d", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anonb75ff2f7282c54cd167a6d584579fe39da451147/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:35 GMT" + ], + "Etag": [ + "3tKwmoVejW2WF57RGiO40g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8obl3iX5+aHpWaFG4W7mZoHuWf6mxik29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsU7JCYioZmphamFiYGZmY6hko1eqABaFSiTC+UpJSbSyUjaw3GSSMogdZNgVJFlk8FSweCyMAVWdpk/MAAAA=" + } + }, + { + "ID": "35059da6526c8895", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "827" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "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" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:36 GMT" + ], + "Etag": [ + "JElTrp2vPaTxLLvpcXstmQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6VUa2/aMBT9K5X3cTzyIECQqhVBmKgoakPoQ9OEHMekbpM4dQxdVPHfd+0USgfrpu1D5Nj3nHNf9n1BjyyLUA+FLH5aUVF+euAhqiEqcQyn514SiNxaX+Lgx2SyzsltIdOr01NAMMUq7nmSlCnO6hFNeV3SQvbms4a4H/ZL3w7mt8+D6PymHN3ictwa8VHwCMyCJssJyx6Bfy9lXvSaza33Rsx5nFCcs6JBeLo7b66tZi74AyWyaB5x2oSoi+YHbr8knGDJeHY6n0EIq4KKBU0xSyAIJVAXPOTy7Ih0g+G0EQN+zQjFhPBVJlVsoEJ4tmTxSmhh1HtBOta9HzTzJt4gODlb46QRsBTkcJrXqv1sFc6kWBHZgIVlMQhGAGCZlgtwmFAl9Zr2+DflViwscUErxCKk1Oq0w8h1TLNlLtttx+lis9NybZe4kdOyiE0tw8bAk8qFZuGMZ8QgtGu7ZmgTHNrYse2uhd1lm4RL2sI4Ch3Dsa0wQhtIXFAs6ZAVOS9YlTwa+F4/8Bbj0WLqeUNvCA6eBfsVdeOPART48+kA0IDJBeMAU8UaTwPP7w+C8bVXtWhCY0zK2RM0aYmTgtaqul5igVMqqShQ79sLymADbCipktvagjLX5ZN6RTNwOQjU5dMlV9Z37F1zVF3eU4PxhTcL+heXaLOp7QhVz/pC4PKQ0vf9/h0cY2U+jGQ8/Qpa+2Lbq3Ao9afAd3fnkFe5+X7U0b8F/t+RwLfXo2ucrDSyUtTbQu3f6nHMWPmBv3XFR1hXc6+HezbLMNt1w65bxonp9IxWz3A+G0bPMBRHhwOjo8oUXc09/w5VRz5dUkEz8pdvEBja+vHk2w4hAMIY2qhSwh7ePNGZ6Wel3j7TBTWdjmV1Ox3X6UK4Gizkgc3tmqj2NnmUIk1pJl9zqiaQurratCp2IDDCM5xWvfkJXIDUAggGAAA=" + } + }, + { + "ID": "db2be932f840a045", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/rhDAyR3TUXwCdJWyFXayI4FoFTk?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:36 GMT" + ], + "Etag": [ + "7onp6EW68MtfjjprqRc5kA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/22QT08CMRDFv8t4XRKNioaEw4Kga4Dg7hJIjIfSHZYu/Uc7hDSE724XjF48tfP6fjNveoKd0BX0YC3q/QFduKmRPtpLjv4gycfDGu0REkBidXQ+GW27o2X3eUqbprFun/PHXdrvR4fnW1QMeifYCJSVh97nCTRTGLFSKPTElI0+CvYiZdNRUabTeZSUqVpptphM0sFkBOfklyzICV3/YUWZZ7PX/5ivcwKNWee4QYeaY5vEOtMgp6xd0m+NlEEx3alQmQ7FQHAhLq9u+5KG/L5crI7D6n0ZxisWsoexGZe76JKGMxJGR+OiiPGADDGZm2PcEu7gpx6E2HTuDEfvsW16ex0wNMpKpJiI3AET4Cx+1Zuga33+BkHFTECHAQAA" + } + }, + { + "ID": "cf21212b95aa8abf", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anonc0ce8391b3cab3a53382a9f6cbfe4aadb50532bd/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:36 GMT" + ], + "Etag": [ + "lhvxDnPw0Fo0dy3jEk+n/g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8rnZJRVuOQFlBu45RukVBpnuWZr5+mn29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwmbmFqYWJgZmZjqGSjV6kAEE5VqY4EQAFx01huDAAAA" + } + }, + { + "ID": "33a25680f232b5ee", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "233" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7ImRyeVJ1biI6dHJ1ZSwicXVlcnkiOnsicXVlcnkiOiJTRUxFQ1Qgd29yZCBmcm9tIGBiaWdxdWVyeS1wdWJsaWMtZGF0YS5zYW1wbGVzLnNoYWtlc3BlYXJlYCBMSU1JVCAxMCIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiVVF4cmQzWHR4VFMySEpZUjkwWDk5MVdDek5rIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:36 GMT" + ], + "Etag": [ + "C93D59g1oAOUTK6HSr3mbA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "91c39d7c74c6a9ac", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "711" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiXG5cdC0tIERlY2xhcmUgYSB2YXJpYWJsZSB0byBob2xkIG5hbWVzIGFzIGFuIGFycmF5LlxuXHRERUNMQVJFIHRvcF9uYW1lcyBBUlJBWVx1MDAzY1NUUklOR1x1MDAzZTtcblx0LS0gQnVpbGQgYW4gYXJyYXkgb2YgdGhlIHRvcCAxMDAgbmFtZXMgZnJvbSB0aGUgeWVhciAyMDE3LlxuXHRTRVQgdG9wX25hbWVzID0gKFxuXHQgIFNFTEVDVCBBUlJBWV9BR0cobmFtZSBPUkRFUiBCWSBudW1iZXIgREVTQyBMSU1JVCAxMDApXG5cdCAgRlJPTSBgYmlncXVlcnktcHVibGljLWRhdGFgLnVzYV9uYW1lcy51c2FfMTkxMF9jdXJyZW50XG5cdCAgV0hFUkUgeWVhciA9IDIwMTdcblx0KTtcblx0LS0gV2hpY2ggbmFtZXMgYXBwZWFyIGFzIHdvcmRzIGluIFNoYWtlc3BlYXJlJ3MgcGxheXM/XG5cdFNFTEVDVFxuXHQgIG5hbWUgQVMgc2hha2VzcGVhcmVfbmFtZVxuXHRGUk9NIFVOTkVTVCh0b3BfbmFtZXMpIEFTIG5hbWVcblx0V0hFUkUgbmFtZSBJTiAoXG5cdCAgU0VMRUNUIHdvcmRcblx0ICBGUk9NIGBiaWdxdWVyeS1wdWJsaWMtZGF0YWAuc2FtcGxlcy5zaGFrZXNwZWFyZVxuXHQpO1xuXHQiLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6InloQ0lIZlE3Qk1DZFRybWtQVzRWTVNPVUlGSCIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:37 GMT" + ], + "Etag": [ + "0TgKaIUR5jswYPUNAEZANg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "8ea9728555391751", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/yhCIHfQ7BMCdTrmkPW4VMSOUIFH?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:40 GMT" + ], + "Etag": [ + "AG6V181pQnvs8nraQiGJ9g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2OS2+CQBSF/8vtVheIoUjiQkiLNGgF1C6aphnh8pB50JmxDSH+9w60q/s657tngLbhBXhwaaqvG8r+oUKdjE2K6ka1MqUTXCHMADWpjHITOmfLtbqEfyuXS5I04cuqWq+NQuU1MgLeAGWDtFDgvQ/ACUNjUzVpDQuJxM9pNQPdd+MlO6bRPjQzE8U4709xvPHjJ7h/3GdwFZcUS5TIcxzJnRRXzHVUTExBac8InxfIxFyj0jA5pmtfB9G2TB79XVAcJWsPb8vzLns9Rc9bo6IiJ7oR3AhPGZhHWmhCU/FjUoPtwv/C7w31IEWOSuFItZb2ynacxeLvUyBYR1GbaFre8P4LCaf5JFABAAA=" + } + }, + { + "ID": "d41a0c97d8bf2538", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/yhCIHfQ7BMCdTrmkPW4VMSOUIFH?alt=json\u0026fields=status%2Cstatistics\u0026location=US\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:40 GMT" + ], + "Etag": [ + "AqO2IhLIdCfeR4N7J3xGEg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/4WQzQ6CMAyA36VnD7ghGx5BD5qoRHgBhSYuGUxZORDCu7uhxhhNTE/t96V/A1g6kbKkSgvLAcoWXWqaQtUIS5gvBGNSiDiSoYSZl1v6Yi4cw6b6JDIIAsYdIUMnnfSENmtNidZi5a2QxzyKGHPGrcO29/P/q28jUVo/cSgCHkr5wrk2tHP3AGfisTVhjQ0V/dXvl6fHTVbA+Ntuujq9KF1tzdkXmfd8h2560NTLlVeH/RrG8Q7AcM1sQAEAAA==" + } + }, + { + "ID": "f035b8e7c491adb6", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?allUsers=false\u0026alt=json\u0026pageToken=\u0026parentJobId=yhCIHfQ7BMCdTrmkPW4VMSOUIFH\u0026prettyPrint=false\u0026projection=full", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:41 GMT" + ], + "Etag": [ + "0JlHaFzTGLbfPR8XTgQtaw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "d821c0f7903cbf6b", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "272" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im5hbWUiOiJudW0iLCJ0eXBlIjoiSU5URUdFUiJ9XX0sInRhYmxlUmVmZXJlbmNlIjp7ImRhdGFzZXRJZCI6ImRhdGFzZXRfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAwMSIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QiLCJ0YWJsZUlkIjoidGFibGVfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAxNiJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:41 GMT" + ], + "Etag": [ + "lx1UaOxunlsjqNJkyvIxCA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42SUWvCMBDHv0v2Ok1SUWvBBx0iDudA69MYEtuzRtOmNtFZxO++a6cT5jb6FO5//7v73ZET2cokJB5Zymi3hyx/sGKpgDwSsCJCXR35XLwe94kym93keZsfRsenXreLDlnUmbVWKo9FUgsh1jULxnqhsMKAXTiMdzhz3EWr1WGtZoexTgOfBWOM18s5/1h4C0cYUKuxTLY4aG1tajxKr6D1SOtIgUilqQc6/tbpwaFppjcQWEN/oaMXOkOrYNIS09BKtKVpCivIIAmAeCdyARn9cSmsuUCUjipA1zFlQQWqMx4xWEMsCpyVBBUa4r2dSCJiJPx6sGWeFtHMn44mQ6y55ffxLT2a+IPhYErO79gVM/0cl0CdkTIc6yTyIfspT/XHNQoyEFbqxJdlc95sO47bdhlnbqP4csdUZvcGt8HauDoalDD2RYcS9wjvenDu3FD9Xn88KCp0UDZEaT4j508CGiX17wIAAA==" + } + }, + { + "ID": "73a490efd4070511", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "298" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiSU5TRVJUIGRhdGFzZXRfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAwMS50YWJsZV8yMDE5MTAyOF82NjkwNjU5MDA5MzY1OV8wMDE2IChuYW1lLCBudW0pXG5cdFx0ICAgICAgICAgICAgICAgIFZBTFVFUyAoJ2EnLCAxKSwgKCdiJywgMiksICgnYycsIDMpIiwidXNlTGVnYWN5U3FsIjpmYWxzZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiJISmIzYVhpenZpOXU4cmhoeDVBakw0V2tGWVoiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0In19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:41 GMT" + ], + "Etag": [ + "K9+lCo/1Y1GNWEmLF0NT5A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "16bc24eaa6d416e2", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/HJb3aXizvi9u8rhhx5AjL4WkFYZ?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:44 GMT" + ], + "Etag": [ + "StvP13MfFXywrsSOVDXYSw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/0VPy07CQBT9l+u2JBo00SYsUF41itiigsbF0N62AzOdOnML1Kb/7i0uWN3HeeScBnaySMCHjcx+KrT1RYb02i0hukqR41GawiF4gCQyZka0X1z1n9PJqj5YF728j1br6DAYMMPFOWoBfgOpRJU48L8aKIRGlp2GB1SX3RUtw2A+hdY745U+w8F8OZ6OQ2i/Ww+2ZhNiihaLGDvv0potxhR0sV1ulKq1KHoJatMjdAQnxQmdPW76YiV/9/KuurV5frwZbp+uP3aT9SezlIkFSVMw8S3iKECGhLqv2WRhTYzOYWdy+W/4YHSpkDgB2Qo9iAWXnUkCPxXK8YMLjLQapilnwyQ0B64PfWj/AFcikQ9jAQAA" + } + }, + { + "ID": "b56a11fa465cad17", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/HJb3aXizvi9u8rhhx5AjL4WkFYZ?alt=json\u0026fields=status%2Cstatistics\u0026location=US\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:44 GMT" + ], + "Etag": [ + "Uq90DVYFtVFjwA6j6epTXA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "c3cb40688d39d8a3", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "389" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "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" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:44 GMT" + ], + "Etag": [ + "/9v6gMxQA4aEy5pYLCmfrw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "e9b0b15fd08cbecd", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/JI0nCdRk5uAD4O2tjHU4UxVPG81?alt=json\u0026fields=status%2Cstatistics\u0026location=US\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:44 GMT" + ], + "Etag": [ + "/9v6gMxQA4aEy5pYLCmfrw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWKi5JLMksLslMLlayqlZKLkoFcvPzQjJzU5WslAxNzY2MLMwtDEzMDCyUdECKi0ow5MwNDJRqwZIlpWBTQCyQkqBQPz9PP3el2loAZuTgdWgAAAA=" + } + }, + { + "ID": "0244d20d8817220d", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/JI0nCdRk5uAD4O2tjHU4UxVPG81?alt=json\u0026fields=status%2Cstatistics\u0026location=US\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:45 GMT" + ], + "Etag": [ + "/9v6gMxQA4aEy5pYLCmfrw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWKi5JLMksLslMLlayqlZKLkoFcvPzQjJzU5WslAxNzY2MLMwtDEzMDCyUdECKi0ow5MwNDJRqwZIlpWBTQCyQkqBQPz9PP3el2loAZuTgdWgAAAA=" + } + }, + { + "ID": "14475bebfc9e4837", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/JI0nCdRk5uAD4O2tjHU4UxVPG81?alt=json\u0026fields=status%2Cstatistics\u0026location=US\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:45 GMT" + ], + "Etag": [ + "LAShRajm9MLk6iSygk76pQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWKi5JLMksLslMLlayqlZKLkoFcvPzQjJzU5WslAxNzY2MLMwtDEzMDCyUdECKi0ow5MwNDIByyfm5BTmpIM1BICOUrAz0TGvBWkpKwWaDWCCNQaF+fp5+7kq1tQCA6jeufgAAAA==" + } + }, + { + "ID": "d807e5db8203c367", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/JI0nCdRk5uAD4O2tjHU4UxVPG81?alt=json\u0026fields=status%2Cstatistics\u0026location=US\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:48 GMT" + ], + "Etag": [ + "1fvX/kW8+O++3NtPczhbhg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/21Qu67CMAz9F89FSinQ0pGXxABIXJgQQ9QaFCkkVeIiUJV/v05ZuBc228fnYXfgSZLypCoPZQeVQ26tOagbQgnpOB8Oi7wQo4koIInLjj6wXAjG0NT/kfG0mDBS2VujMcruoziUKW8/yMmKomeNbG9626NTK6VxbltDnOcEKZwTUKZpafYk5BFkGYQEyJLUP9rSJs6mImMbhx7d/aXj5ZWTnDowso9U40W2mgaNalArg/GWd3Y4/+Gv62+c0D+A2v5TsYrKi912CSH8AmMQp2lJAQAA" + } + }, + { + "ID": "a0e766714ed10443", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "451" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "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" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:49 GMT" + ], + "Etag": [ + "rFoh4jm3dD32JbvK3npiOQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "eb1ea54f8b1d9635", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/vphucYB9hC5iTI1DUI3Aem8aXS8?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:50 GMT" + ], + "Etag": [ + "nxLdGvELu0X51a1jS2hoMg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/22QTWvCQBCG/8v0GqFRBBvwoDbYQCptoqCUHtbNmMTu7qTZiW0Q/3t3bcFLTzMv8z7zdYaP2hQQwb4uPzts+7sS+dUnGdpOsXWhIWMRAkAWpXOa77RYnuK0u9+OQxEe82FFz+V06hxWVqgFRGc41KgKC9HbGYzQ6DEfAuC+8SpfZ8lq6bSmwuvVJk1n8zSGS3AjOn0DktU6XsbZf8T7JYAj7TM8YItGop/ftHREyYk/zVakVK+FGRSoacBoGa7EtXpqqk7u5g/VYlyvk/Bxk4xmqCdim0+cS5EUXJNxxk3ulgMmFiqjL3cbjOBPz3vX9KUlidaibxoOfycsSDcK2a3EbYcBSOE+9FQzRAehLF5+AHL/Qu5/AQAA" + } + }, + { + "ID": "b31be1c84d590c29", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anonfc597020_f055_43b8_900a_8728afabd8df/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:50 GMT" + ], + "Etag": [ + "J1d+8bL5TCVRVrD4oDAKYw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8p7GaZoWyT5mIY4hwWFFbmY5Ls4ekeW29oCVZTklyTmBOWXFwOVGQP5RWBmdLVSGpgsA5muVKsDYRkp1caC2Ai5RLicIYZcMlzOGCQXWwsAn0oY6LAAAAA=" + } + }, + { + "ID": "2448ca961dc642a7", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "556" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "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" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:50 GMT" + ], + "Etag": [ + "CpCiKYaxKmdPFI2QP3QIuA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42TYW/aMBCG/4v3FYgT1ACR+qGjtIrKWBvSqdNUIZMcwcOxU9vQIsR/3zkNRWq7jU+W7967e+6NsyMrLnMSkTkvntagt18smwsgLQKWFRgfVkN+85O93JT57VUc3N127+L1xfk5KrirM0slxLZksp1DqdoWjI1yZpkBOwuoP/Bp0J+F4YCGZwNKB108ZpRSv1PP+YfE7+EIA2Ix5nKFg5bWVibyvANop1CqEMAqbjqZKt/i3ibwKq1+Q2aN9wmd19AZ7xRMr8Y03km0tSiBBWiQGZBoRxqQ+C9OYU0DUStOATqMqQtOoNqjidkSSuZwFhxEbkj0a0ckK5Hw9cCW28rdpmkST66x5phfl8d0PElH16OE7B+xK2a+bnEJjFNSX8dKFino9+FEPR9umQZmuZIpr5v7Z70g6Pf6Dt75By8V1x8F/S7t4eooEMzYbyrnuEf+oUfXD4+oo4d0lEwuxnVXC1oycYnuDpVc8GL9OsQ5YtRaZ3CvuXOFFO6BffZm5k/12f6v4WEnMxvy2GoaXyldMut+o+kPt7/ZfK/caPP2NS5B8JIjIYpa7sWveDUGlnNZNMb5ZI92C5U10OR+SvZ/AF7QcQe4AwAA" + } + }, + { + "ID": "6f2fc31083e53cca", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "236" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUICogRlJPTSBkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEudGFibGVfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAxNyIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoib1I1MHdnWUd0ZHI4Q1k0b20ySXZ2TTVWd1JpIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:50 GMT" + ], + "Etag": [ + "ASjDhj92AAEgxMpVIRAoOw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "2f8027403a19d1c3", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/oR50wgYGtdr8CY4om2IvvM5VwRi?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:51 GMT" + ], + "Etag": [ + "DxRabi0owJ4KP4G8paI66w==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/22QTU/CQBCG/8t4LQkiENKEg2BTq0hwARNiPCzttCzudmp3Sm1I/7tbNOHiaebNvM98neFT5Qn4sFfZV4Vlc5Mhv3aJQFtpti4UlFsED5Bl5pwP30LuVZ/qp+HzahhOChmNx/V06hw2PqCR4J8hVagTC/77GXJp0GGX4AE3RafWGxEtQ6cNJZ1ebheL+9kigNa7EpW5AtFyE4SB+I/4aD040l5giiXmMXbzi5KOGHPUnWYPpHVjZN5L0FCP0TJciEuVxKhfZ7uQk3Iy3w3JDKLT6WX0VgvlXJpiyYpyZ9yu3XLAxFILqt1tcAd/eta4pquSYrQWu6a3g98JczKFRnYrcVmhB7F0H3pUDH4qtcX2B3sdNuF/AQAA" + } + }, + { + "ID": "1e2eaf6b1918c6e7", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon3db5bd94_f176_4314_b216_54e8736b5d88/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:51 GMT" + ], + "Etag": [ + "4j12MRVv3xOz3coQxRWq6w==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qbZBka+QaFlRlX+FcZJ+cHVgSFF5qV29oCVZTklyTmBOWXFwOVGQP5RWBmdLVSGpgsA5muVKsDYRkp1caC2Ai5RLicIYZcMlzOGCQXWwsAg8Vx0bAAAAA=" + } + }, + { + "ID": "7026c07edca1695e", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0017?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:51 GMT" + ], + "Etag": [ + "CpCiKYaxKmdPFI2QP3QIuA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "e97e3aa755c88575", + "Request": { + "Method": "DELETE", + "URL": "https://www.googleapis.com/storage/v1/b/shollyman-demo-test/o/bq-test-table_20191028_66906590093659_0016.csv?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 204, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "no-cache, no-store, max-age=0, must-revalidate" + ], + "Content-Length": [ + "0" + ], + "Content-Type": [ + "application/json" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:52 GMT" + ], + "Expires": [ + "Mon, 01 Jan 1990 00:00:00 GMT" + ], + "Pragma": [ + "no-cache" + ], + "Server": [ + "UploadServer" + ], + "Vary": [ + "Origin", + "X-Origin" + ], + "X-Guploader-Uploadid": [ + "AEnB2UqiWfcy5JSDn0peycZ-pq80XYA9xgPaFfnXMl9juv2sZEdN6UZwvV56nFdaqFnACUVRwWLOD8Ey7FwCkusdFZczRTtn_D8XRj6Km944atJ7yRzugJM" + ] + }, + "Body": "" + } + }, + { + "ID": "6807fd7b35129d13", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0016?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:52 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "19daa71025199c7f", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "366" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im1vZGUiOiJSRVBFQVRFRCIsIm5hbWUiOiJudW1zIiwidHlwZSI6IklOVEVHRVIifSx7ImZpZWxkcyI6W3sibmFtZSI6ImJvb2wiLCJ0eXBlIjoiQk9PTEVBTiJ9XSwibmFtZSI6InJlYyIsInR5cGUiOiJSRUNPUkQifV19LCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRhYmxlXzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMTgifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:52 GMT" + ], + "Etag": [ + "BNEF5WsGLdGY5cUQAQtE0A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "6d7c1016f011922d", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0018/insertAll?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "105" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJyb3dzIjpbeyJpbnNlcnRJZCI6IlBVUktIQThKWjh0bTVuSkQ1ZkpIVVhCZmhJcSIsImpzb24iOnsibmFtZSI6bnVsbCwibnVtcyI6W10sInJlYyI6eyJib29sIjpudWxsfX19XX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:52 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTMK04tKnHMyQlKLS7IB3KUagGmFzWCLgAAAA==" + } + }, + { + "ID": "e370c7a558c19ce2", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0018/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:52 GMT" + ], + "Etag": [ + "OnHzgA3+l3ESC+Sx6N2oFA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8r753lUpTsaa+cYuwY7awdXmPkZ5bs52toCVZTklyTmBOWXFwOVGSjVAgCmwRjgUwAAAA==" + } + }, + { + "ID": "f383c4982718616e", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0018?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:52 GMT" + ], + "Etag": [ + "BNEF5WsGLdGY5cUQAQtE0A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWKk7OSM1NVLKqVkrLTM1JKVayiq5WykvMTVWyglA6SiWVBSBecEiQp5+7Uq0OQr40txgh7+kX4uruGgQUyM1PAQkEuQa4Ooa4uiBrKUpNRugIcnX2D3IB8jGtTsrPz0EodPL393F19FOqjQXCWgCN1fK3tQAAAA==" + } + }, + { + "ID": "365d79896ad9ed62", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0018/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:53 GMT" + ], + "Etag": [ + "nCZ+muwhAbUbUWE2zKcV4A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8rnOUdp55aWZzgmhSaFhrsaVXknh5k42toCVZTklyTmBOWXFwOVGQD5RWBmdLVSGpgsU7LKK83JqdUBM6NjoQx06dhaIIqtBQBvgOV7kQAAAA==" + } + }, + { + "ID": "b8656343ef3e6714", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0018?alt=json\u0026fields=schema\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:53 GMT" + ], + "Etag": [ + "BNEF5WsGLdGY5cUQAQtE0A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWKk7OSM1NVLKqVkrLTM1JKVayiq5WykvMTVWyglA6SiWVBSBecEiQp5+7Uq0OQr40txgh7+kX4uruGgQUyM1PAQkEuQa4Ooa4uiBrKUpNRugIcnX2D3IB8jGtTsrPz0EodPL393F19FOqjQXCWgCN1fK3tQAAAA==" + } + }, + { + "ID": "f456a1ff29c84278", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "306" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7ImRlZmF1bHREYXRhc2V0Ijp7ImRhdGFzZXRJZCI6ImRhdGFzZXRfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAwMSIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifSwicXVlcnkiOiJzZWxlY3QgbmFtZSBmcm9tIHRhYmxlXzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMTgiLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6IkdUYmtiWGxjSjNZVXVMQ3gxZHk0Y0RCRlU0MCIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:54 GMT" + ], + "Etag": [ + "+GAmcoPW3jua6evKKlP1VQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/41TXU/bQBD8K+j62BKfv+1IqKWJQSlRBIkD5ck6n9fmwPYF35k2Qvz37jkBoZbSPtm+nZmd3Rs/kjvRFmRMclHd99BtP9zKnHwioFmFpx9Pjxsuz6/c254F8HB2Vp/blxdHR4gQhqVuZF1vG9YeFtDIQw1Kj9er0Wma3+Xfa/7NvV7388lPu9h6fPr1ZO1RZCqoy7lo75B/o/VGjS3rufuokrKqgW2EGnHZvJxbD4616eQtcK2sN5pa6FpZ77T9XEvOtJDt0XqFFnoFXQYNEzWaMAKHncyl/vKG9EiwZlQh/kFwYJzLvtXGG6pw2Zai6rtBmIwfyeD11YsZFS0ftKyBg7KTzYFmeQ2ZQ+3Ypk6UBUFMAz+mNHbxkVFqR6hbYFvRDqqpwRvF/fSzv2zdsJhmCnaILAdwwiAvYt+2PbsMAt+PmB16sRvzuPA9h7vgUJchb7A0sFgr26IoAXgMmVtGbubFYZzFfu5klPuhH0GIxIA84ewdMA1ToTZSid38ZLJMjtMkm51kiySZJlMU/9GJ31FXyxmC0uV6MUH0MG7J+lpPd/7NsK9H2b+/szNqo8i/9vNkIEKiHXMvs0WaLI8n6ewy2aVhDhXj29U95qFktQKEY6TS7QaXTy7WyfKa7I6WUEIHLf/PS0HGUH3/j3gOJwIxnthIafzGEHBl2gy7NmEQjbFj+6HjRGFkezQMyADu9B81h5oovSTSKEIDrd7PtErmySQlT/tmvXoBYRHvZjFbnGL1F4aeSQEgBAAA" + } + }, + { + "ID": "9b2d48dffcd0caa1", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/GTbkbXlcJ3YUuLCx1dy4cDBFU40?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:54 GMT" + ], + "Etag": [ + "4ycYBFDlOo4/UbZf1jjWtw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y1P0U6DQBD8l/WVxjbyRNIHaW2tIVVpiVbjw3EsFHp3i9ySSgj/7oE+zU52dma2h0tpMgggLYvvFpvupkB+HYcYbavYOqjJWAQPkEXhlH4nT+FmrZ7Jv03Sj3xRVW98XS6dwsozagFBD3mJKrMQfPZghEZ3NoEH3NUjOxzj3X7ruKZs5Pskiu7D6AGGr8GDitIYc2zQSBzd6oYqlLwbi9ozKdVpYWYZapoxWobpYtpuj+klfVfy6e6UtNHqZ5F1vlyHm8SfO5UiKbgk44TJAVwQEwsV09U1hQX887Bzpi8NSbQWR9P5X8CKdK2QXSNuWvRACvfuY8kQ5EJZHH4BgoM0VEwBAAA=" + } + }, + { + "ID": "c43448bf0ff8e50e", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anonddfeec9e_3f83_4979_95b2_0c5758e72c36/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:55 GMT" + ], + "Etag": [ + "JL8cJwenC9svu+inOTD5Kg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8p7+Vgke5Wn5jlbFpeVamfm+Ye4mHqn29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsU7LKK83JqY0FQgBW4/RhbwAAAA==" + } + }, + { + "ID": "bb3d39d5fa0cc00e", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0018?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:55 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "74f0637283ab5fc1", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "217" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0IHdvcmQgZnJvbSBbYmlncXVlcnktcHVibGljLWRhdGE6c2FtcGxlcy5zaGFrZXNwZWFyZV0gbGltaXQgMSIsInVzZUxlZ2FjeVNxbCI6dHJ1ZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiJndlBHYVA4cjJrVU52OUd3NllraE1IazN5M3MiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0In19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:55 GMT" + ], + "Etag": [ + "X73OV5Tv0r9QFoPVRlG7+g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "52618b87671a91bb", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/gvPGaP8r2kUNv9Gw6YkhMHk3y3s?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:55 GMT" + ], + "Etag": [ + "V4KEpQbJglN3jc319Ba0fg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P3U7CQBBG32W8hQSsMULChRgCaG1KsSbGeLFsp7/bTt0daBrCuzsFr3ZP9sw3356hKpoE5nAost8j2v4uQ94Nlwjd0bCTo6XGIYwAWWVifj68rdrd4TUzgVdqbzpbqkmaLRZiOJ1jrWB+hrRAkziYf5+hUTXKWEc2EYX7dqD9R7QN1sI1JQMHse8/L/0VXH4uIyjpEGGKFhuNQ1prqUTN26Goy8mYvlbNOMGaxoyO4Tpxfc1O4VqFT/a+ioPTbN09flX5+6byes+JZUgrLqgRMd6DLGJiZSLqpClM4Z+XvYSGljQ6h0Po5LbgherWIEsjtkccgVby3U3BN778AdROBytLAQAA" + } + }, + { + "ID": "f2e93786cf940883", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "218" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0IHdvcmQgZnJvbSBbYmlncXVlcnktcHVibGljLWRhdGE6c2FtcGxlcy5zaGFrZXNwZWFyZV0gbGltaXQgMSIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiandjbWN3VU9RZGYzampJZ2F3ZllhNndReUtwIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:56 GMT" + ], + "Etag": [ + "HOI3lzRokig7ymOOsO8yfQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "b7d9391f6792a10f", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/jwcmcwUOQdf3jjIgawfYa6wQyKp?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 400, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:56 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/9WQwWrDMBBE7/6KRecgEuih+BZoKYY20DbpxTH1xt44AllypU0bE/zvlRVDc+gPBARiZp7Q7J4TAEHOWSdSOAcRZGVrCupuPp9djJa8x2b0xHtvGE8QX6SwMXTqqGKqYSvyrQBkyBfp4r6QkO2BD8pDOAiMO02gajKs9orcDMhX2FFACAy2BD+KD1AGXzYSysjLMSjBYYBcINFA/hcUUkz1Yhkf2uVRwzTHDVSPFWvbojJjw0bbHerrzBF6GzNlvlGr+vVIrr8mtK2Q1YX5+i9Y910cv0MXvmZyYmKGeBfTEj0jH8climz1sXzOHj6Xb0+bl8fVeuSHZEh+AVVsNvkrAgAA" + } + }, + { + "ID": "217f01f654f99eb5", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "218" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0IHdvcmQgZnJvbSBbYmlncXVlcnktcHVibGljLWRhdGE6c2FtcGxlcy5zaGFrZXNwZWFyZV0gbGltaXQgMSIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiQXVqOFdTYklGZzhzT2FXMXRLSE12aHBhdUpQIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:56 GMT" + ], + "Etag": [ + "GuDFYbMm+EaIyFjg7wr/WQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "0d4f35a94931296e", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/Auj8WSbIFg8sOaW1tKHMvhpauJP?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 400, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:56 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/9WQwWrDMBBE7/6KRecgEuih+BZoKYY20DbpxTH1xt44AllypU0bE/zvlRVDc+gPBARiZp7Q7J4TAEHOWSdSOAcRZGVrCupuPp9djJa8x2b0xHtvGE8QX6SwMXTqqGKqYSvyrQBkyBfp4r6QkO2BD8pDOAiMO02gajKs9orcDMhX2FFACAy2BD+KD1AGXzYSysjLMSjBYYBcINFA/hcUUkz1Yhkf2uVRwzTHDVSPFWvbojJjw0bbHerrzBF6GzNlvlGr+vVIrr8mtK2Q1YX5+i9Y910cv0MXvmZyYmKGeBfTEj0jH8climz1sXzOHj6Xb0+bl8fVeuSHZEh+AVVsNvkrAgAA" + } + }, + { + "ID": "05d1a03037919769", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "217" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0IHdvcmQgZnJvbSBgYmlncXVlcnktcHVibGljLWRhdGEuc2FtcGxlcy5zaGFrZXNwZWFyZWAgbGltaXQgMSIsInVzZUxlZ2FjeVNxbCI6dHJ1ZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiJBeFJaeG1EU2pHcjhhazk2dzNqUTgwQWpYc04iLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0In19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:56 GMT" + ], + "Etag": [ + "q+pKf6Cx7KHbgpJ/XzZNKg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/+1Sa28SQRT9K5v1i8bubkELlIQoaYkiBMPL1NbGzs5eloF5LDOzFGz4795ZWNNGbPS732bu45xzz70P/pLJxG/6MUtXOejti4WK/RMfLEkxunqd9Wa1i0299zFOs0/R1Y/rQS9ttbCCuS4zV5xvBZFBAkIFFoxtTsdhezO63ojL8eKDbpDlee3+zWLYOG0vrswAOw3wWZ/JJfbPrc1MM4pK9jBVKuVAMmZCqsSveLSuRplWC6DWREdII1Rtomdo33FFiWVKtqZjlJAb0N9BEMZRhAMItIqVfX8EOmREhCnWrxkFQqnKpXXaEIUqOWNprgtgv/ngF1ofPdyoKNm7VzrxZloJ766cKMjymDMaJMSS0BCRcTChmZMlmAyIhjuPM8GsV0GeTDOlmXWA3cGkM2pfTLpfOvsx+pASuh2vcBCrc9id+GjFZJsBFg+nndFXfx8awQw0SApO3sHK7h9W6BcdRfb5TZamYiHaikTG4t9YRo2joRqK9IQJJ6dyVq9WG/VGpfb2/NQvirX9LXdWcTmQydHMgSMv8EFrpUdgcm7dF9lMoYXJNeF4n08E/r3z2CfAGJI6+u4ey7Mk5uBJIqD5D0v8Jm8meuvlhsnUQ+EyIXgJ42Hfe1mePuUqTw53//TmE0VNpMu9RWV7YFY8Aol6EDR4HH11GzqDClvQoJv/luwtud0fjdN++XnQ8Xe7nxVTqh/3BAAA" + } + }, + { + "ID": "a5019c8a6c744397", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/AxRZxmDSjGr8ak96w3jQ80AjXsN?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 400, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:56 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/92QQUsDMRCF7/srwp4U3KQHT3srKFKoBbV6qcXOJmMazCbbTFYoZf+72XQL/Q2ehvde5pFvTgVjJYbgQ1mzUxJJSq8wqfvZ7O5stEgEevTKhfsFaxSL0FhkDlqs2a4x+tBjOFZd31gjKwUROEHbWSROe/hB6hAC7j7dZh2OrCfjNKMITkFQ7O1lyW72MXZUCyGt7xXX3muLXPpWXMqF8pJEwG8M6CSKy3pFByvQpf+k0uravd3yciLIhJQANlmzCfV/0GUK5VswboTQ1jdgr7OAQD5n5gxYTtmQ53Y6UmqPPeU7rD7my8XD1/z16f35cbUe3w/FUPwBjqyvuS4CAAA=" + } + }, + { + "ID": "c88f844ac82188ae", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "218" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0IHdvcmQgZnJvbSBgYmlncXVlcnktcHVibGljLWRhdGEuc2FtcGxlcy5zaGFrZXNwZWFyZWAgbGltaXQgMSIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoib1N0aGp4UU10cFlSb0xRVWxGWDN1a1ZoY2Q0IiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:57 GMT" + ], + "Etag": [ + "Bk69o6oiPAZo3pY3wYd0pg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "6a0a5ced86b911e8", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/oSthjxQMtpYRoLQUlFX3ukVhcd4?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:57 GMT" + ], + "Etag": [ + "7ydy5G4pgswmGn4VZcQr4A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2PXU8CMRBF/8v4ConGNSYkPIDRlWQl7iLEj/hQ2mE/aDtrOxvcEP67s+BTe9Izd26PsK+9gQls6/Knw9Bflcj5cCkwdpajHC35iDACZFWKed+b/i5N2jIeXOqTzafOQzKbTsWIukKnYHKEXY3WRJh8HcErhzJ2oGBE4b4daPVWLJapsCMz8HKdZbN59gin79MIGtoWuMOAXuOQ1gZqUPNiKBorsrZ3yo8NOhozRobzxPmVVlw1v/kLtx8FZfnaPr3fdvtNpU0iliWtuCYv4noFsoiJlS3oIE3hBv553kvoayCNMeIQen1Z8ECutcjSiEOHI9BKvvtc84VPf3onWkxLAQAA" + } + }, + { + "ID": "d5f7cb5b525894ab", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "218" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0IHdvcmQgZnJvbSBgYmlncXVlcnktcHVibGljLWRhdGEuc2FtcGxlcy5zaGFrZXNwZWFyZWAgbGltaXQgMSIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiTnRObHdjNnUzQWhvUTdIeGgwWjJEcE0xU2t4IiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:57 GMT" + ], + "Etag": [ + "IUHNop7Qw2WQ5e4CIrS8Iw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "8a1dffe8652e2abe", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/NtNlwc6u3AhoQ7Hxh0Z2DpM1Skx?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:58 GMT" + ], + "Etag": [ + "J7IuKE5wg9PbtrdujlXuDQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P0U7CQBBF/2V8hQQ0SmzCAwgRtDZQJDEaH5bt0Ba2nbo7m9I0/DtT8Gn3ZM/cudvCMS8TCGCXp38ebXOXIq+7S4zOG3ZyVFQ6hB4gq1TMt9HSv88f6/R5tWOb+IP58rP1eCyG0xkWCoIW9jmaxEHw00KpCpSxmmwiCjdVR5vPeBm9CheUdBxtw3AyDedw/j334EC7GPdosdTYpVWWDqh52RV1GRnTFKrsJ1hQn9ExXCeurxFHptZP/mGS0Xq0OGWD7/tZ9THcHE9iGdKKcypF3G5AFjGxMjHV0hSG8M/TRkJXljQ6h13o4LbghYrKIEsjth57oJV8d5Hzjc8X4VUu4UsBAAA=" + } + }, + { + "ID": "9d0b2861bc3d934f", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "366" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im1vZGUiOiJSRVBFQVRFRCIsIm5hbWUiOiJudW1zIiwidHlwZSI6IklOVEVHRVIifSx7ImZpZWxkcyI6W3sibmFtZSI6ImJvb2wiLCJ0eXBlIjoiQk9PTEVBTiJ9XSwibmFtZSI6InJlYyIsInR5cGUiOiJSRUNPUkQifV19LCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRhYmxlXzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMTkifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:58 GMT" + ], + "Etag": [ + "pxZTK0i42E7Y/YDIRyKAYg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "9d43a1b74286b21f", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "226" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRfdmlld18wIn0sInZpZXciOnsicXVlcnkiOiJTRUxFQ1Qgd29yZCBmcm9tIFtiaWdxdWVyeS1wdWJsaWMtZGF0YTpzYW1wbGVzLnNoYWtlc3BlYXJlXSIsInVzZUxlZ2FjeVNxbCI6dHJ1ZX19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:58 GMT" + ], + "Etag": [ + "+qYcgJVq8LWs7UopTGBiDA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "436b8a54244551c3", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_view_0?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:58 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "e67506591a5733d1", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "227" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRfdmlld18xIn0sInZpZXciOnsicXVlcnkiOiJTRUxFQ1Qgd29yZCBmcm9tIFtiaWdxdWVyeS1wdWJsaWMtZGF0YTpzYW1wbGVzLnNoYWtlc3BlYXJlXSIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fQo=" + ] + }, + "Response": { + "StatusCode": 400, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:58 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/9WQwWrDMBBE7/6KRecgEuih+BZoKYY20DbpxTH1xt44AllypU0bE/zvlRVDc+gPBARiZp7Q7J4TAEHOWSdSOAcRZGVrCupuPp9djJa8x2b0xHtvGE8QX6SwMXTqqGKqYSvyrQBkyBfp4r6QkO2BD8pDOAiMO02gajKs9orcDMhX2FFACAy2BD+KD1AGXzYSysjLMSjBYYBcINFA/hcUUkz1Yhkf2uVRwzTHDVSPFWvbojJjw0bbHerrzBF6GzNlvlGr+vVIrr8mtK2Q1YX5+i9Y910cv0MXvmZyYmKGeBfTEj0jH8climz1sXzOHj6Xb0+bl8fVeuSHZEh+AVVsNvkrAgAA" + } + }, + { + "ID": "4d42ed2d58302eac", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_view_1?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 404, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:58 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/72PwW7CQAxE7/mK1Z6hclIaNTkjjsmFniq0Ml0XkDaxFDtFCOXf2Wxz4As4jWbG0jzfM2MsDQMPtjb3aKL9YU/RbWCz+g86EsHTnNmG1fzy2Pva7PEYyMiZQ7h12K89dbxWEq09KgqpKyCvcig+XVlWUH5UANV7FAcA+Zu6vwtdXW6XkQQhceM7ebPQvAwgDXnu8NLPO6fARwzP3UAonLqedTcj2KWckh6WR0RRR0ms7d7t2q9mOx9O2ZQ9ADSd8r1uAQAA" + } + }, + { + "ID": "6f03df53ad536142", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "227" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRfdmlld18yIn0sInZpZXciOnsicXVlcnkiOiJTRUxFQ1Qgd29yZCBmcm9tIFtiaWdxdWVyeS1wdWJsaWMtZGF0YTpzYW1wbGVzLnNoYWtlc3BlYXJlXSIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fQo=" + ] + }, + "Response": { + "StatusCode": 400, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:59 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/9WQwWrDMBBE7/6KRecgEuih+BZoKYY20DbpxTH1xt44AllypU0bE/zvlRVDc+gPBARiZp7Q7J4TAEHOWSdSOAcRZGVrCupuPp9djJa8x2b0xHtvGE8QX6SwMXTqqGKqYSvyrQBkyBfp4r6QkO2BD8pDOAiMO02gajKs9orcDMhX2FFACAy2BD+KD1AGXzYSysjLMSjBYYBcINFA/hcUUkz1Yhkf2uVRwzTHDVSPFWvbojJjw0bbHerrzBF6GzNlvlGr+vVIrr8mtK2Q1YX5+i9Y910cv0MXvmZyYmKGeBfTEj0jH8climz1sXzOHj6Xb0+bl8fVeuSHZEh+AVVsNvkrAgAA" + } + }, + { + "ID": "c1d50d0d7bfeccf9", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_view_2?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 404, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:59 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/72PzYrCQBCE73mKYc66dKIbTM7iUS96EhnanfYHJmlIt4pI3t3JbA4+gaeiqhrq61dmjKWu487W5hVNtH/sKbo5zCf/QUMieB4yu2Y1J761vjZbPAYycuEQng22U08NT5VEa4+KQuoKyKscioUrywrK3wqgmkVxAJD/qLtf6eEKO44kCIkb++TNSPM1gDTkucFrO+ycAx8xfHYdoXDqWtbVgGDHsk96GB8RRb1JYt1s3WqzWy+Hwz7rszcBPx/MbgEAAA==" + } + }, + { + "ID": "99480a915206a471", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_view_3?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 404, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:59 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/72PwYrCQBBE7/mKYc4qnahhk7N4jBf3tCxD6/RGYZKGdKuI5N93MuawX7Cnoqoa6vUrM8bSMPBga/OKJtoze4puA5vFO+hIBNspsw2r+eFb72tzxFMgIxcO4dlhv/TU8VJJtPaoKKSugLzKofhwZVlBua0AqnUUBwD5St39Sg+3tvNIgpC48ZW8mWn+DSANee7w2k87beAThr/dQCicup51PyHYuRyTfs+PiKLeJLEejm5/+Gx20+GYjdkvLaOUVW4BAAA=" + } + }, + { + "ID": "6eadd20692bbf5fe", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "226" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRfdmlld180In0sInZpZXciOnsicXVlcnkiOiJTRUxFQ1Qgd29yZCBmcm9tIGBiaWdxdWVyeS1wdWJsaWMtZGF0YS5zYW1wbGVzLnNoYWtlc3BlYXJlYCIsInVzZUxlZ2FjeVNxbCI6dHJ1ZX19Cg==" + ] + }, + "Response": { + "StatusCode": 400, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:59 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/92QQUsDMRCF7/srwp4U3KQHT3srKFKoBbV6qcXOJmMazCbbTFYoZf+72XQL/Q2ehvde5pFvTgVjJYbgQ1mzUxJJSq8wqfvZ7O5stEgEevTKhfsFaxSL0FhkDlqs2a4x+tBjOFZd31gjKwUROEHbWSROe/hB6hAC7j7dZh2OrCfjNKMITkFQ7O1lyW72MXZUCyGt7xXX3muLXPpWXMqF8pJEwG8M6CSKy3pFByvQpf+k0uravd3yciLIhJQANlmzCfV/0GUK5VswboTQ1jdgr7OAQD5n5gxYTtmQ53Y6UmqPPeU7rD7my8XD1/z16f35cbUe3w/FUPwBjqyvuS4CAAA=" + } + }, + { + "ID": "bd3421b0c3910834", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_view_4?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 404, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:59 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/72PzYrCQBCE73mKYc66dDQbTM7iUS96EhnanfYHJmlIt4pI3t3JbA4+gaeiqhrq61dmjKWu487W5hVNtH/sKboCisl/0JAInofMrlnNiW+tr80Wj4GMXDiEZ4Pt1FPDUyXR2qOikLoZ5FUOs4UrywrK3wqgmkdxAJD/qLtf6eEKO44kCIkb++TNSPM1gDTkucFrO+ycAx8xfHYdoXDqWtbVgGDHsk96GB8RRb1JYt1s3WqzWy+Hwz7rszdre8QvbgEAAA==" + } + }, + { + "ID": "67649221d810896a", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "227" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRfdmlld181In0sInZpZXciOnsicXVlcnkiOiJTRUxFQ1Qgd29yZCBmcm9tIGBiaWdxdWVyeS1wdWJsaWMtZGF0YS5zYW1wbGVzLnNoYWtlc3BlYXJlYCIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:59 GMT" + ], + "Etag": [ + "AayGkjmb0HWH04d30mJUJA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "42ab895aa873c3e5", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_view_5?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:36:59 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "9fa5bd2794888bb6", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "227" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJkYXRhc2V0XzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwidGFibGVJZCI6InRfdmlld182In0sInZpZXciOnsicXVlcnkiOiJTRUxFQ1Qgd29yZCBmcm9tIGBiaWdxdWVyeS1wdWJsaWMtZGF0YS5zYW1wbGVzLnNoYWtlc3BlYXJlYCIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:00 GMT" + ], + "Etag": [ + "Yjxnnay3Cv7KElkpCkyZfw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "1b0f287462dd84a6", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_view_6?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:00 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "dfce3a3b888918af", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/t_view_7?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 404, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:00 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/72PvY7CQAyE+zzFams4OcAFkhpRhoarEFoZ1vxIm1iKHU4nlHe/zV6KewKq0cxYms+vzBhLXcedrcwrmmgv7Cm6Faxmf0FDIngbM1uzmiv3ra/MAc+BjNw5hJ8G27mnhudKopVHRSF1C8jLHBYbVxQlFJ8lQLmM4gAg/1D3fNC3W9tpJEFI3DgmbyaatwGkIc8NPtpx5xb4jOF/1xEKp65l3Y0IdiqHpKfpEVHUXhLr/uB2+696Ox4O2ZD9Al7ZKV5uAQAA" + } + }, + { + "ID": "daac2b78d5b82095", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0019?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:00 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "e620ab3008a70dfd", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?allUsers=false\u0026alt=json\u0026pageToken=\u0026prettyPrint=false\u0026projection=full", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:01 GMT" + ], + "Etag": [ + "UDEdqWFU40uhL7e9V31qtQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "5ba1e040186a509d", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "72" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJkYXRhc2V0UmVmZXJlbmNlIjp7ImRhdGFzZXRJZCI6InRva3lvIn0sImxvY2F0aW9uIjoiYXNpYS1ub3J0aGVhc3QxIn0K" + ] + }, + "Response": { + "StatusCode": 409, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:02 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/62OsQrCQBBE+3zFcbUBCxvTBZJCsDIWioisuSUG77KS3YAh5N+9nFf4AVbLzCxvZkqU0tj31OtMTV54WZNBrzbr7eprOGSGZvF0bnsEM6ry3bJwpgoQYBTFD7J2dNClBh2lgiyZ0HMkHRmhgz3iErSKZf/iB44hB223YBpLd7C/mccyhcwML9vWIKhjOod7jUNZQAYOW/aHMi/Ot/K0q47V8j0nc/IBXE/GKzIBAAA=" + } + }, + { + "ID": "3f51c74fed4229c4", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/tokyo?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:03 GMT" + ], + "Etag": [ + "jQy5ZIFyGuC20r9/b3P8NA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/32Q0WrCMBSG3yW7tY12KrMgzG1OCptuRRA2dhHTY42mOV2SOor47qbSyi7U23P+7z9fsidboRISkqVIfwvQ5V3CLDNgSYuAZanbbD7L3lf0Wk6K56CtB3R5//EwHQ2HLiEq0qxRyjJjyksgQ8+CsaHFbYkuYECu3oTautja2tyElDaH/BQxlcByYXyO2XlOdwHNNW6AW0MvdNNa0NDmSD2IYQUaFAcS7ptZVAk2ubo1uiJNDi3COAdjSPi9JxqlayKLOJqP4+opOXDB5ERjkbt5XbbQwoI2jj0Ts8X0BjD7U1fyhQH9VI4zJmQl7Yw8jUu0jxdcfcEyP3XATnBw0lgoW/3i/954PHq5IRIDS04mPy3CNTArUM1FVpGdXtBt9/uDzqAb9F2BZMa+YyJWApJrEeSnBrdiRjBPobZrcFyHHI565pKMZAIAAA==" + } + }, + { + "ID": "631f39fb888f780a", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/tokyo/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "242" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im5hbWUiOiJudW1zIiwidHlwZSI6IklOVEVHRVIifV19LCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJ0b2t5byIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QiLCJ0YWJsZUlkIjoidGFibGVfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAyMCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:03 GMT" + ], + "Etag": [ + "+bJ8klHWphVhtHWFgb1OYg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "48e52d277c16733d", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/upload/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false\u0026uploadType=multipart", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "multipart/related", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7ImxvYWQiOnsiZGVzdGluYXRpb25UYWJsZSI6eyJkYXRhc2V0SWQiOiJ0b2t5byIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QiLCJ0YWJsZUlkIjoidGFibGVfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAyMCJ9fX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6IkU2VXEzQ0tFSUF2eWd3a1ZhSmtKeUdGM0tTYiIsImxvY2F0aW9uIjoiYXNpYS1ub3J0aGVhc3QxIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=", + "YSwwCmIsMQpjLDIK" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "no-cache, no-store, max-age=0, must-revalidate" + ], + "Content-Length": [ + "851" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:06 GMT" + ], + "Etag": [ + "\"CRkpyt4RXWzE4lvoHDbioIbWdUA/xmHnQLYqH_Wlyye14GtMpmSxHzU\"" + ], + "Expires": [ + "Mon, 01 Jan 1990 00:00:00 GMT" + ], + "Pragma": [ + "no-cache" + ], + "Server": [ + "UploadServer" + ], + "Vary": [ + "Origin", + "X-Origin" + ], + "X-Guploader-Uploadid": [ + "AEnB2UrzKSoGj78wjQVTKbY4hO-qYtcaD40Eki4F3p4LJ4N61G8LmDShmPvDmIL4XTVICJlF5i5PlUabE4elpixSO0ncEQGhVOkuR0wFbGSzr4EXZ2dY3jU" + ] + }, + "Body": "eyJraW5kIjoiYmlncXVlcnkjam9iIiwiZXRhZyI6IlwiQ1JrcHl0NFJYV3pFNGx2b0hEYmlvSWJXZFVBL3htSG5RTFlxSF9XbHl5ZTE0R3RNcG1TeEh6VVwiIiwiaWQiOiJzaG9sbHltYW4tZGVtby10ZXN0OmFzaWEtbm9ydGhlYXN0MS5FNlVxM0NLRUlBdnlnd2tWYUprSnlHRjNLU2IiLCJzZWxmTGluayI6Imh0dHBzOi8vYmlncXVlcnkuZ29vZ2xlYXBpcy5jb20vYmlncXVlcnkvdjIvcHJvamVjdHMvc2hvbGx5bWFuLWRlbW8tdGVzdC9qb2JzL0U2VXEzQ0tFSUF2eWd3a1ZhSmtKeUdGM0tTYj9sb2NhdGlvbj1hc2lhLW5vcnRoZWFzdDEiLCJqb2JSZWZlcmVuY2UiOnsicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCIsImpvYklkIjoiRTZVcTNDS0VJQXZ5Z3drVmFKa0p5R0YzS1NiIiwibG9jYXRpb24iOiJhc2lhLW5vcnRoZWFzdDEifSwiY29uZmlndXJhdGlvbiI6eyJqb2JUeXBlIjoiTE9BRCIsImxvYWQiOnsic2NoZW1hIjp7ImZpZWxkcyI6W3sibmFtZSI6Im5hbWUiLCJ0eXBlIjoiU1RSSU5HIn0seyJuYW1lIjoibnVtcyIsInR5cGUiOiJJTlRFR0VSIn1dfSwiZGVzdGluYXRpb25UYWJsZSI6eyJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0IiwiZGF0YXNldElkIjoidG9reW8iLCJ0YWJsZUlkIjoidGFibGVfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAyMCJ9fX0sInN0YXR1cyI6eyJzdGF0ZSI6IlJVTk5JTkcifSwic3RhdGlzdGljcyI6eyJjcmVhdGlvblRpbWUiOiIxNTcyMjg3ODI1Nzg1Iiwic3RhcnRUaW1lIjoiMTU3MjI4NzgyNjM4MiJ9LCJ1c2VyX2VtYWlsIjoidGVzdC1yb2JvdEBzaG9sbHltYW4tZGVtby10ZXN0LmlhbS5nc2VydmljZWFjY291bnQuY29tIn0=" + } + }, + { + "ID": "3c720ce75409fd7b", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/E6Uq3CKEIAvygwkVaJkJyGF3KSb?alt=json\u0026fields=configuration%2CjobReference%2Cstatus%2Cstatistics\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 404, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:06 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/7WOsQrCMBiE9z5FyGxBsDh0E23FFtpB6yIiqYlVmubHJFVK6bubxAy+gNPP3f3cd2OAEGZSgsQxGo0w8gqUGRXNo9nX6JhSpLEeLkCjG/SCxiiDGqk7cD50RISUdRBqpnScLKvnYp0nu9VraN7tkWRtNmzTRb6vsS90QGX6Tk4jT/4LzJVS6MhD2M6GQ034byYZUeAyATq1OOzDyd2zH6000b1yu8rDJS2rYmMfp2AKPmIs+VVGAQAA" + } + }, + { + "ID": "97a660ea20cdc134", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/E6Uq3CKEIAvygwkVaJkJyGF3KSb?alt=json\u0026fields=configuration%2CjobReference%2Cstatus%2Cstatistics\u0026location=US\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 404, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:06 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/7WOQQuCQBSE7/6KZc8ZgdLBW1RGCnowu0TEmpuFq498ayHif29320N/oNNjZh7zzegQQnnXQUcDMiqh5BVKrpS/8Gdfo+GIrNIeTUCSG/RtGZAICoJ3EGJoWOuWvAFXcpRBns23y/zprePtfvUaqnd9ZFEdDbvQi7OC2k7DRFV5MppY+L94preEhj1aXVsJKJj4zTrOEEzWggw1kdpwMvdsd6NkskczLT1cwjRPNvpxcibnAzE69qpMAQAA" + } + }, + { + "ID": "7cdcc164620922ff", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/E6Uq3CKEIAvygwkVaJkJyGF3KSb?alt=json\u0026fields=configuration%2CjobReference%2Cstatus%2Cstatistics\u0026location=asia-northeast1\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:07 GMT" + ], + "Etag": [ + "lyWpxws/2QMsU18iWvctrg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "ba6c7c6be72a9d8a", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/E6Uq3CKEIAvygwkVaJkJyGF3KSb?alt=json\u0026fields=status%2Cstatistics\u0026location=asia-northeast1\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:08 GMT" + ], + "Etag": [ + "lyWpxws/2QMsU18iWvctrg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/22QTQvCMAyG/0vOCroxNz2KCh5U8OMkHuoapVDb0WaKjP53m4mi4q193g+SNOBJkPKkSg+jBkqH8WvNVl0QRtDP8iQp8iLJ8iKDDpsd/WqDtEiihkb+Knk/G0RFWyG5XJmqppnS6NkUhTcY3+kJucjWFPHa3pikb/DypIyOQq6xtE4y6UHoAFkSeqMtLRgN2eTQo7u2++y8OMfR9g0Y0c4o8SRqTd1KVaiVQV7uIxwOX/G5/BcJ7UGobi/HLy6erJZTCOEBT5K5PVkBAAA=" + } + }, + { + "ID": "86bf3e07b40bf422", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/E6Uq3CKEIAvygwkVaJkJyGF3KSb/cancel?alt=json\u0026fields=\u0026location=asia-northeast1\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "0" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:08 GMT" + ], + "Etag": [ + "lyWpxws/2QMsU18iWvctrg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "24f68961550a6945", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "234" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUICogRlJPTSB0b2t5by50YWJsZV8yMDE5MTAyOF82NjkwNjU5MDA5MzY1OV8wMDIwIiwidXNlTGVnYWN5U3FsIjpmYWxzZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiJSNW5CZ1ZueFBGZWZIVVdBWURNcWFUOXg2UWwiLCJsb2NhdGlvbiI6ImFzaWEtbm9ydGhlYXN0MSIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:10 GMT" + ], + "Etag": [ + "OrgyU/g97aXX5QqqN+vvFw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/41SXU/bQBD8K+j61jbxV2znIqGWJk4bCUwxDh9P1tlemyv2XeK7BCLEf++eA6iiFPXJ1u7szNzsPpBbLkoyITmv1xvodh9+yZx8JqBZjdXTrt4trZqG7OrKP1uv40/b7fzu8BAR3EypG9k0u5aJQQmtHGhQesIUZwMhO30DTGlnmPjiW30h7n/OofqxvDy6np2sWUrvg7MGaRQ01TEXt0h2o/VKTSzr2cqwlrJugK24GhayfalbW9dadfIXFFpZbziw8AnKekf2SyMLprkUh6+8op+Ngi6DlvEGHRm2QSdzqb++oTPkrB3WiN/yAlhRyI3QxiiyFFJUvN50vQqZPJDe+B8/5Dw6jqbpwceDeXJ6cqDl7U4ONcsbyFzboY7tjrMgoHbgU9umHn4y23ZtpC5RmYueODV4Q/qUxuIfKzFTTDMFe0RmQ1mVLoRebo8czwlsGozysV061IOq8kdeTisXezjXW+qnmJACKIAbOv44oIHjjCFnENijkhaVO/KqEMLQD5zCrcgjRtAB0zDjaiUV38dApkl0lEbZYp7FUTSLZihw1/HXqMtkgaA0WcZTRCNm1XGJMBPbIk6j5GiaLi6i/bKOoWbF7nyN66pYowCVcf3pboXBkLNllFyTfSmBCjoQxX8GhhN99/3rfT4kk8+rU0JVpbGJ2yqU0ewDMVvjrfHm+KHrjsOxS/2ROTwEd/qvHg097L1cj2GEFoR+euD+isjjk9hGvYCM9WUcL+Lv2P0N2CWYbuYDAAA=" + } + }, + { + "ID": "da5a1aff2d195bc0", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/R5nBgVnxPFefHUWAYDMqaT9x6Ql?alt=json\u0026location=asia-northeast1\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:10 GMT" + ], + "Etag": [ + "esJ5K4XKAwibt61hOFrYow==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/22QzW7CMBCE32V7DQdEQWokDtDyVyiFFNqiqgeTbBJT2xvsjSBCvDsOrcSlp/Vo59PM+gQ/0iQQwlZm+xJtdZchL+tHhK5U7PwoyDiEAJBF5p3ontvT+89p7yC33Gnmr0O7oUO36x0uzlELCE+QSlSJg/DrBEZo9Nh1BMBVUau3VTSZj7zWlNR6vp7Nev3ZAM7BjSi1uxGT+WowGkT/Id/nAHa0jTBFiybGukBhaYcxT+rbXE5KVVqYRoKaGoyO4Upct1Hb9LN3c1wMMR2vP3qbp5e9WD0cO0vlXYpiwZKMNwonRcOQ5RyF46avCkwsVEQHfym04E/3K5+wsBSjc1gntFq/cY+kC4Xs+7EtMYBY+P8aS4YwFcrh+QKvQZsSjQEAAA==" + } + }, + { + "ID": "831ec5d31c4b6ea7", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_0edfd2e73b0413160964b80d193eff543b9f2b04/tables/anone9ee27158696118ebae604d9cf243f7e77561c2f/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:11 GMT" + ], + "Etag": [ + "/o/kZYpxDmoS1f6gNLc8Mw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8rr5+tnR0UWVLjk5gcbppml+/kkW/iW29oCVZTklyTmBOWXFwOVGQP5RWBmdLVSGpgsAwonKtXqQFgGSrWxIDZCLgkuZ4ghlwyXMwLJxdYCAMuw+s+wAAAA" + } + }, + { + "ID": "09074aeb9313113a", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "389" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "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" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:12 GMT" + ], + "Etag": [ + "6SBcDB56SppJ5NMfqb0l+g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "967c41c59669a7cf", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "387" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "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" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:13 GMT" + ], + "Etag": [ + "WIC1y6tbfvxlfMjMGAeaiA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "9c60fb43e6feb7cb", + "Request": { + "Method": "DELETE", + "URL": "https://www.googleapis.com/storage/v1/b/shollyman-demo-test/o/bq-test-table_20191028_66906590093659_0020.csv?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 404, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "no-cache, no-store, max-age=0, must-revalidate" + ], + "Content-Length": [ + "263" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:13 GMT" + ], + "Expires": [ + "Mon, 01 Jan 1990 00:00:00 GMT" + ], + "Pragma": [ + "no-cache" + ], + "Server": [ + "UploadServer" + ], + "Vary": [ + "Origin", + "X-Origin" + ], + "X-Guploader-Uploadid": [ + "AEnB2Uo178pkItYH0gtI_l6a_PIVICS-ooYmWEWX15rkmmT5aKj0nROMYOzIzWiAES5yuABuYVomOS1NHZcWho0Z8YRvtdzU9HfsG9nsBpgj21g1zrnPslw" + ] + }, + "Body": "eyJlcnJvciI6eyJjb2RlIjo0MDQsIm1lc3NhZ2UiOiJObyBzdWNoIG9iamVjdDogc2hvbGx5bWFuLWRlbW8tdGVzdC9icS10ZXN0LXRhYmxlXzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMjAuY3N2IiwiZXJyb3JzIjpbeyJtZXNzYWdlIjoiTm8gc3VjaCBvYmplY3Q6IHNob2xseW1hbi1kZW1vLXRlc3QvYnEtdGVzdC10YWJsZV8yMDE5MTAyOF82NjkwNjU5MDA5MzY1OV8wMDIwLmNzdiIsImRvbWFpbiI6Imdsb2JhbCIsInJlYXNvbiI6Im5vdEZvdW5kIn1dfX0=" + } + }, + { + "ID": "f0df3e818409c079", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/tokyo/tables/table_20191028_66906590093659_0020?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:14 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "4eb2caa9980de20d", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "72" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJkYXRhc2V0UmVmZXJlbmNlIjp7ImRhdGFzZXRJZCI6InRva3lvIn0sImxvY2F0aW9uIjoiYXNpYS1ub3J0aGVhc3QxIn0K" + ] + }, + "Response": { + "StatusCode": 409, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:14 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/62OsQrCQBBE+3zFcbUBCxvTBZJCsDIWioisuSUG77KS3YAh5N+9nFf4AVbLzCxvZkqU0tj31OtMTV54WZNBrzbr7eprOGSGZvF0bnsEM6ry3bJwpgoQYBTFD7J2dNClBh2lgiyZ0HMkHRmhgz3iErSKZf/iB44hB223YBpLd7C/mccyhcwML9vWIKhjOod7jUNZQAYOW/aHMi/Ot/K0q47V8j0nc/IBXE/GKzIBAAA=" + } + }, + { + "ID": "6b94036560ff0def", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/tokyo?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:15 GMT" + ], + "Etag": [ + "jQy5ZIFyGuC20r9/b3P8NA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/32Q0WrCMBSG3yW7tY12KrMgzG1OCptuRRA2dhHTY42mOV2SOor47qbSyi7U23P+7z9fsidboRISkqVIfwvQ5V3CLDNgSYuAZanbbD7L3lf0Wk6K56CtB3R5//EwHQ2HLiEq0qxRyjJjyksgQ8+CsaHFbYkuYECu3oTautja2tyElDaH/BQxlcByYXyO2XlOdwHNNW6AW0MvdNNa0NDmSD2IYQUaFAcS7ptZVAk2ubo1uiJNDi3COAdjSPi9JxqlayKLOJqP4+opOXDB5ERjkbt5XbbQwoI2jj0Ts8X0BjD7U1fyhQH9VI4zJmQl7Yw8jUu0jxdcfcEyP3XATnBw0lgoW/3i/954PHq5IRIDS04mPy3CNTArUM1FVpGdXtBt9/uDzqAb9F2BZMa+YyJWApJrEeSnBrdiRjBPobZrcFyHHI565pKMZAIAAA==" + } + }, + { + "ID": "db7aaa7371ad5160", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/tokyo/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "242" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibmFtZSIsInR5cGUiOiJTVFJJTkcifSx7Im5hbWUiOiJudW1zIiwidHlwZSI6IklOVEVHRVIifV19LCJ0YWJsZVJlZmVyZW5jZSI6eyJkYXRhc2V0SWQiOiJ0b2t5byIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QiLCJ0YWJsZUlkIjoidGFibGVfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAyMiJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:16 GMT" + ], + "Etag": [ + "D8VQY/7H2OBqWwpgapMqNg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42SX0/CMBTFv0t9FVo6/owlPEgkSAIYcdEYY0jZLltlW8da1IXw3b0rIIlo9Km55977O6dNt2Qls5B4ZCGj9QaK8sKIRQLkkoAREerX7sPdE+3c8Nv++vE9j0Q+WU+jXg8nZLWnY5UkZSqyWgipqhnQxjNqVaq6Bc05a3QbjLvzdrvL2q0uY10HjzljnCNDQ7Icy2yFpNiYXHuUHpPUI6WiBEQudT1Q6ZdO3zjNC/UKgdH0B3saCiM0YNPmoDaHpv+KY4dmsIQCsgCItyUHp9Evd8Wdg52dsI5Hzl7523aHzxDEkIrKbykhCTXxnrckEylG2B+ILPOquvdno+kQd079TapP/dHUHwwHM7J7QSy2+iXGRJ0RW45VFvlQfJdn6v1YBQUII1XmS0tvtDqcux3XaTvcrb7FRy6L8wHXYR3Gqv1EaDNRocSLhGeMZqt5iupf9ceDakMFFoiS0FLUMlWYGBDTILtPYepYRKACAAA=" + } + }, + { + "ID": "63ab22d1d098a54c", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/upload/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false\u0026uploadType=multipart", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "multipart/related", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7ImxvYWQiOnsiZGVzdGluYXRpb25UYWJsZSI6eyJkYXRhc2V0SWQiOiJ0b2t5byIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QiLCJ0YWJsZUlkIjoidGFibGVfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAyMiJ9fX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6ImE3QXZzbjRoOFM5aUpTRHlsOU1YZGRDazV0OSIsImxvY2F0aW9uIjoiYXNpYS1ub3J0aGVhc3QxIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=", + "YSwwCmIsMQpjLDIK" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "no-cache, no-store, max-age=0, must-revalidate" + ], + "Content-Length": [ + "851" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:19 GMT" + ], + "Etag": [ + "\"CRkpyt4RXWzE4lvoHDbioIbWdUA/YskItLki7RmhlqMqcQW0-cwgQX0\"" + ], + "Expires": [ + "Mon, 01 Jan 1990 00:00:00 GMT" + ], + "Pragma": [ + "no-cache" + ], + "Server": [ + "UploadServer" + ], + "Vary": [ + "Origin", + "X-Origin" + ], + "X-Guploader-Uploadid": [ + "AEnB2UpoBPFra7uyxcm-jPvR-nJL1pjekw763k23sVHosbcuT02x24hn9UUKYz8IBWUniyEMnE98yXWxluVR_hRnbQZlXIwECw" + ] + }, + "Body": "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" + } + }, + { + "ID": "ad1b952ae18f592c", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/a7Avsn4h8S9iJSDyl9MXddCk5t9?alt=json\u0026fields=configuration%2CjobReference%2Cstatus%2Cstatistics\u0026location=asia-northeast1\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:19 GMT" + ], + "Etag": [ + "mDmiAoRARmgRZd3i12V0Qw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/41R0WrCMBT9l/tcIa1aG99kiji2DmoHgzEkJrdrNE2kiYMi/fcl7YYPe9lL7k3OuedcTm7Aja7k57VlThoNyxsow0SoltfYsNBVEpWwsHy/gWYNwnIsEbjuEm77stjlW+ijO35t7B3f5eVmuymg/+gjEGid1INbyY4Kg8GlNSfkbud9wdZGqa5heiKwMRPn6V5JMMcsjgxnzp0J6mF8fAndISExjUmSHdKUknROCaFTXw6EJAn03vpkjuW40dPLag3jS4EVtqj5PxfxEwPKFqsvq2d1tqfycb/uFH1+E+LhPHfUs5ThP3kCs5JNtGldjcy6OLha50GfArfBk7c4piGH6OL5IkmyRTbNprMYBnLr/mD++FW6DiqhC5TiNc+Hz+i/AW/HFlTbAQAA" + } + }, + { + "ID": "a721756572a9b7b1", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/a7Avsn4h8S9iJSDyl9MXddCk5t9?alt=json\u0026fields=configuration%2CjobReference%2Cstatus%2Cstatistics\u0026location=US\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 404, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:19 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/7WOQQuCQBSE7/6KZc8ZHYzSWyQehPRgQhARa7uptLsP9q2BiP893Tz0Bzo9ZuYx3wweIVQYA4ZGZJjEJB/AxaSCTbD6Gkogsnr2aAaWPKHTPCIpVAQbkLJXTPtcKPCtQBuVxZrtDm/UQbMvwjYt4l6Gpwvnx9fWhnTpdEycKq9OkwX+L57r5aBYq+faWkLF5G9mBENwmQabzES6hKO7t2U3WmY7dNPy8z3JyyyeH0dv9D6Jj6QuTAEAAA==" + } + }, + { + "ID": "c7e6d1aaeb25de4e", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/a7Avsn4h8S9iJSDyl9MXddCk5t9?alt=json\u0026fields=configuration%2CjobReference%2Cstatus%2Cstatistics\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 404, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:19 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/7WOQQuCQBSE7/6KZc8JHYzSWyQehPRgQRARa7uptLsP9q2BiP89d/PQH+j0mJnHfDMGhFBhDBiakHEWs3wAF7OK1tHqayiByBrn0QIseUKveUJyqAm2IOWgmA65UBBagTZh2/0bddTuqrjLq3SQ8fHC+eG1sTFdCj0Q576r12Qh/wXmSzko1mnX2UiomfzNjGAIPtNgM4ejSzj5e1tGo2W2R7+rPN2z8lyk7nEKpuADCKibOEYBAAA=" + } + }, + { + "ID": "e4089fd3705d633d", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/a7Avsn4h8S9iJSDyl9MXddCk5t9?alt=json\u0026fields=status%2Cstatistics\u0026location=asia-northeast1\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:20 GMT" + ], + "Etag": [ + "cXKNPdBt6srWqAlr8KNNSg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/22QQYvCMBCF/8ucK9hGadejqOBBBXVPyx5iM0ogJiWZKlLy3zdTUVZ3L2HyvTePmekgkCQdSNcBJh3UHtPX2b0+I0wgH5dFUZWVqMQoh4zNnv5o6UkaWvWufIxFmRTjpOJwbZuWFtpgYFMSnmB6ozssEnUtJbx1VybiCR4ewegg1RZr5xWTIcQMyJE0O+NoxajkII8B/aXf5zPIUxrtqwMr+xkVHmVraNDoBo22yMv9ao7fL+1L9V9L7A9CbX85rjh4tlnPIcYf/DDKBFkBAAA=" + } + }, + { + "ID": "0cc49f47eb6e9d1f", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/a7Avsn4h8S9iJSDyl9MXddCk5t9/cancel?alt=json\u0026fields=\u0026location=asia-northeast1\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "0" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:21 GMT" + ], + "Etag": [ + "cXKNPdBt6srWqAlr8KNNSg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "54ebe33ec6730813", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "234" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiU0VMRUNUICogRlJPTSB0b2t5by50YWJsZV8yMDE5MTAyOF82NjkwNjU5MDA5MzY1OV8wMDIyIiwidXNlTGVnYWN5U3FsIjpmYWxzZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiJMSklsN2g4cnYxU2RpUE9PZGJpdmdvOVduQzAiLCJsb2NhdGlvbiI6ImFzaWEtbm9ydGhlYXN0MSIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:22 GMT" + ], + "Etag": [ + "JJHM0DwAkWUUvLIFppsJCw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "e106eb4528cc39db", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/LJIl7h8rv1SdiPOOdbivgo9WnC0?alt=json\u0026location=asia-northeast1\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:23 GMT" + ], + "Etag": [ + "gMUxIUPc4JEHu8sRsQ9Bww==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/22QzWvCQBDF/5fpNULFQjXgoUrQSOpHVHooPazJmKzdj3Rnog3i/95NWvDS0+xj3o/3Zq/wKU0OIRxk8VWjax4K5E37SJFqxeRHZQ0hBIAsCu8sXvff8X6dPS2ieT2klDajyeUyHnsHZSVqAeEVjhJVThC+X8EIjR7rRgDcVK3a7tJ4OfNa27zVy32SvEySCG7Bnag13Yl4uYtmUfof8nEL4GQPKR7RocmwLVA5e8KM4/Y2Kq1SjRaml6O2PUZi6Ihumyxi9VwO3bm/zeV6tcoP8lzY0ZuZPnqXsplgaY03CpKiZ6zjEgVx31cFtixUai/+UhjAn540PmHtbIZE2CYMBr9xU6srhez7sasxgEz4/5pLhvAoFOHtB1qW6/+NAQAA" + } + }, + { + "ID": "38b4da3f076c225f", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_0edfd2e73b0413160964b80d193eff543b9f2b04/tables/anon21bce70c66759dbace80b3da433c27ce000dd5da/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:24 GMT" + ], + "Etag": [ + "XDOQq9TANTgTh6JbIYVV3Q==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8pHuPgHFlqGOPqFpIdkmHkleUaGhRkH2toCVZTklyTmBOWXFwOVGQP5RWBmdLVSGpgsAwonKtXqQFgGSrWxIDZCLgkuZ4ghlwyXMwLJxdYCAMT08miwAAAA" + } + }, + { + "ID": "0b243cf889d26577", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "389" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "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" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:24 GMT" + ], + "Etag": [ + "s/3U35Jk4x2N5CqcJTzCYg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "25e2498acc5a3272", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "387" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "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" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:25 GMT" + ], + "Etag": [ + "Oc6ii0yVq3kOXLEK0C/f1Q==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "00795b336d1cb6db", + "Request": { + "Method": "DELETE", + "URL": "https://www.googleapis.com/storage/v1/b/shollyman-demo-test/o/bq-test-table_20191028_66906590093659_0022.csv?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 404, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "no-cache, no-store, max-age=0, must-revalidate" + ], + "Content-Length": [ + "263" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:25 GMT" + ], + "Expires": [ + "Mon, 01 Jan 1990 00:00:00 GMT" + ], + "Pragma": [ + "no-cache" + ], + "Server": [ + "UploadServer" + ], + "Vary": [ + "Origin", + "X-Origin" + ], + "X-Guploader-Uploadid": [ + "AEnB2Uoiqp6WJaYWzofk2bQElccI6vK-cpV5Imql7uPEcOwRp0cqg31IF4qngoWai6LCTXvp41gQ-_fRo_BMOvPyN7d9DHgRUBYc_-pwqTIPpt3YZtirupI" + ] + }, + "Body": "eyJlcnJvciI6eyJjb2RlIjo0MDQsIm1lc3NhZ2UiOiJObyBzdWNoIG9iamVjdDogc2hvbGx5bWFuLWRlbW8tdGVzdC9icS10ZXN0LXRhYmxlXzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMjIuY3N2IiwiZXJyb3JzIjpbeyJtZXNzYWdlIjoiTm8gc3VjaCBvYmplY3Q6IHNob2xseW1hbi1kZW1vLXRlc3QvYnEtdGVzdC10YWJsZV8yMDE5MTAyOF82NjkwNjU5MDA5MzY1OV8wMDIyLmNzdiIsImRvbWFpbiI6Imdsb2JhbCIsInJlYXNvbiI6Im5vdEZvdW5kIn1dfX0=" + } + }, + { + "ID": "ab39375fa85f00de", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/tokyo/tables/table_20191028_66906590093659_0022?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:26 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "b2ddd272cf682063", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "238" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJleHBpcmF0aW9uVGltZSI6IjE1NzIyODgzMDcwMDAiLCJzY2hlbWEiOnsiZmllbGRzIjpbeyJuYW1lIjoibiIsInR5cGUiOiJOVU1FUklDIn1dfSwidGFibGVSZWZlcmVuY2UiOnsiZGF0YXNldElkIjoiZGF0YXNldF8yMDE5MTAyOF82NjkwNjU5MDA5MzY1OV8wMDAxIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCIsInRhYmxlSWQiOiJ0YWJsZV8yMDE5MTAyOF82NjkwNjU5MDA5MzY1OV8wMDI0In19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:26 GMT" + ], + "Etag": [ + "VCJ3jzIwFvLeC1eviigbWg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42SX0/CMBTFv0t9FdptsH8JD0IwwQwfEPTBGFK2yyhs7VwLOAnfna4BTUTNntp7cs69v970gDaMJyhEC5a+b6GsbhRdZIBuESiaav158OCsP0f7+10EAwt2jKWLl7TX0w5W5+RKZFmVU95KIBctBVKFCVVUgprbxAosYvtz1w2I2w0ICRx9zAkhVtvM+cdid/QICdkyYnyjB62UKmSI8QW0nQqRZkALJtuxyL90vLNxUYo1xEriX+jwmU7iJpjYYErciNaYJrCEEngMKDygM8joj03pzBnCOJoAXcaYQAOqo15ivIKc1jhLBlkiUfh6QJzmmhDxul9V1NfH2Xg4GQ3Q8U1n+DbvVxpR6wSZMhI8nUL5U56I/aWKS6CKCT5lprXV9Wzb9/yO67he/aE+ClZeG3yHePph2pBRqcYiYZoyuerRIe436vSuHw3rhIhNQy3NntDxBKgcG+jNAgAA" + } + }, + { + "ID": "c25c2e90ac29b7ab", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0024/insertAll?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "121" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJyb3dzIjpbeyJpbnNlcnRJZCI6InNoUUFxZm9lMDNRQ1ByZloxc0w4eEtLRGNkciIsImpzb24iOnsibiI6IjEwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwLjAwMDAwMDAwMCJ9fV19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:26 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42MuwoCMRBFf2UZ20XWNp3oFim0WLASi4kZQzBONA9RFv/dYQVtvdPMOXDvCGfPFhQY726V0nNW0ARaY0HNmVJZhjBQvkYBaMFPrk8ppgxqP4qw9ADVtUA/mQhzZBn1fMfgrRRDPGLxk2RBS6Y6zacoLHihnNGRgP40mu1u0w961QhVUs2i+zPz7wevg9wb8ASitOAAAAA=" + } + }, + { + "ID": "e1cb068c3ff76b8e", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/tables/table_20191028_66906590093659_0024?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:26 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "5dc84b71847cf7d7", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "167" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiYmxhaCBibGFoIGJyb2tlbiIsInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoienQ0QkZLa256NmhGa1ZKVEVQU3h2WURFSGVqIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:26 GMT" + ], + "Etag": [ + "HZMdEQeqbQppZ01jSgJgEw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "08a3931fd8e63d0d", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/zt4BFKknz6hFkVJTEPSxvYDEHej?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 400, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:26 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/61PvQrCMBDe+xRHZgcFp24FRQoqqK2LFjmbUwNpUpNULKXvbhs7dHB0Or7fu2sCAEbGaMNCaDrQwVxz6tB8Op18iYKsxXvPsUOtHL7BJ0JIFb1Lyh1xEJyUEzdBBs7sKvFxZoAOTrNwlrGhx6dsV3PyGIaF/9zhu7guUKi+6i71FeVYM4RWe02oF0rBdxWZeuyQOkcnvp7nLyGpS39niQYLcmTY4Gn9zIZvrUNX9d+yeHuM1vHiEu1X6Wa5TXp/G7TBB3+aYz19AQAA" + } + }, + { + "ID": "037ba80101748cf9", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "507" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiXG5cdFx0Q1JFQVRFIE1PREVMIGBzaG9sbHltYW4tZGVtby10ZXN0LmRhdGFzZXRfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAwMS5tb2RlbF8yMDE5MTAyOF82NjkwNjU5MDA5MzY1OV8wMDAxYFxuXHRcdE9QVElPTlMgKFxuXHRcdFx0bW9kZWxfdHlwZT0nbGluZWFyX3JlZycsXG5cdFx0XHRtYXhfaXRlcmF0aW9uPTEsXG5cdFx0XHRsZWFybl9yYXRlPTAuNCxcblx0XHRcdGxlYXJuX3JhdGVfc3RyYXRlZ3k9J2NvbnN0YW50J1xuXHRcdCkgQVMgKFxuXHRcdFx0U0VMRUNUICdhJyBBUyBmMSwgMi4wIEFTIGxhYmVsXG5cdFx0XHRVTklPTiBBTExcblx0XHRcdFNFTEVDVCAnYicgQVMgZjEsIDMuOCBBUyBsYWJlbFxuXHRcdCkiLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6IjJKQ1kwbjFMUWVOTUgzNzVuOXM5NlRydjBFayIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:27 GMT" + ], + "Etag": [ + "Sbv6TksWcTHiS+tCdkhiVA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "4768ba8622cb9b2e", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/2JCY0n1LQeNMH375n9s96Trv0Ek?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:37 GMT" + ], + "Etag": [ + "pcxo4Hkib3GG9z+RBIypTw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/yWNyw6CMBRE/6Uu1QTFRyBxozGgURMQFy5LuWKh9FZaH0j8dyuuZpI5J9OSksuM+CTl+e0OddPLwUS/EoO+C6NtKJQayICAobklFXvhJCx56gaB9+7Hy02jkudiYYkC0xguUINkQPyWqBoLYGbzO9BXFKKpqBxmUOHQgDZ/o1vH29XZkaNdBId96M6n0tPeLKkfzrq0lEBGDUdpwdORfDpthZUSYOzPhQoNny+eToOdygAAAA==" + } + }, + { + "ID": "4757002d0fa2bba1", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/2JCY0n1LQeNMH375n9s96Trv0Ek?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:38 GMT" + ], + "Etag": [ + "niNAoZehTSAO9vVoA98g0A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/yWOXU/CQBBF/8v4WpKqEW0THgoxQaIoXybytiyXdmG7U3enJA3hv7uVp7nJnDl3LnQybk857Uz528J3dyVk0YclQmslxNGwC6CEIKqMpDPzgreo1qviMzt/c5G9lGkxGkXiyLslDvBwGpRfqPF8hJa3viBUbG1XKzfYo+aBIMjt4n/7MJv8pO7+fYH5x/Tx+cllIRuu/Tl9PUXKslZi2EVws6JrQsKi7LiLki/PGiGgl6Q34YTrxkLiB+JbJKSVrjA1QvlB2YDrHxR4hKL0AAAA" + } + }, + { + "ID": "95e1257270239ff5", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/2JCY0n1LQeNMH375n9s96Trv0Ek?alt=json\u0026fields=status%2Cstatistics\u0026location=US\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:38 GMT" + ], + "Etag": [ + "HRm7ADrqvWPGSVogti5ulw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/7VVy27bMBD8F54TgKRelG9NIqAF4lpo1VMRGIy0jllQj1JUAMPwv3cpRnESOe2h8UnkzuzMcgmu9qS30qreqrIniz0pDeC2bQpVA1kQFiWci0SECaWMXDiysXMsjRGDpnqDRCIQAhHbWqmvdhb63LQl9D1UyKKI/B7A7JzvuMi1bMji5540ctTJDXQ+AalqyhlrWPavKuAs9RW8ikeMx7HPsIMDrlfL/DYrMnK4eDYpjFTNpM9O6k86M/0oTei/9LNHqQdpYbLgpy2epGYWIohCl7EdNhsNq8F2gx1beezGW+87lMELrdG0Otl1xECrBsZeg5YdQt41pNN1fdetr9BFOixLNQ8/GmWnUNnWnQZ0eBmUpVWPcIy4NrzUD0RyVn0eRdEHGrCZQciSj+wQnxlEIhRnNUjCJDirQRoH5z0Bw9fIZw6cCh7+j8vdk2KOT1O5ETh/Nu+OsSNypbR+Dt/jBmspFBiyYO9VXMpyC5+VJYuN1D34Jw01NLbYdW6CXH/LPhXZerm6yW6RX1V61YEZx3QOZtOaenT0NE8opHkAW8h7DW664hT9BaX94mj9ttV6V8vmsoK6vcSarcuRVvbgGU/rNacsZZSLdRynNI5SStMAP2vq/wXWqY8JdVuB/jv9cDh9/MNxgu39wRG6WX3FMXb4AwaWhuucBgAA" + } + }, + { + "ID": "b87f4e2da67db5fe", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/models/model_20191028_66906590093659_0001?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:38 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/31SbW+bQAz+L/c5mQ5IeInUDzRlKVpCOqDatGlC1+AwpoPL7o62aZT/Ph+hVVpF48sZ+7Ef+7EPBDSryIxYO7hr1Pc4TZ6dl9todf1tlSyqqysyIo0ogaewBQntBsjsQHZS/IGNjktMVL8F5/uGteMSGjHWoDTmlEwzBSfEYBc2tQKL2n7hugF1pwGlgYNPQSm1Xmn6hN76P/w4IhsJTNeizesGzABTz7Z9z596AXWwHGdKr0RZb2soP0J8x7VfGfP9zsSWcRKFaZFGizTKsnidYFxLVrd1W6Vdq8js5+HNsd4ZYmWkaNhzrEGywUHMJFwoNZRdRWFSZF/vwzS6KZbrLDNhYLJNmcY4/TTBfyuFquNM1i99GXSj077gbOo2BY7/j3AnRSVBKVODWiPyxGSTaSY1mW0ZVzAiyML3mRY7MtOygzPeDOfQUO2xv/k6yfIwybEtgUM1A9sZ4jrM57fFIg1v4ijJi5som+NrFoD0HdcnZeq2hOe+x7I7ibEyajhOv4tX3Zbi1LBr+/Tss6yPohx/Yf+PjHenUqBlvenlltBP/d7ZAGvDByV4pyGSUkhTY/qOglJv1OOyvx2TUL7BLrRyBluK6g1JnanjB5Y38T3PRYNODLSsL3DTyXtux0W1hpImbtsTN7AcbLE3aHBEOZXZ3nCp5vbHFh3bfm75M8eb2R5u2f5BjDBbvPtOwhw5m+EwW9anbc316f7yDv37BfeC/ixP42RBjiabswfgF3J32Fu90VAWPeJyoc/LdZi7k6GS2AynSe4zcvwHomKWvksEAAA=" + } + }, + { + "ID": "69125c36d9b9f7f9", + "Request": { + "Method": "PATCH", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/models/model_20191028_66906590093659_0001?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "81" + ], + "If-Match": [ + "1pePmsXIRNx3zHEMBWMNGg==" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJkZXNjcmlwdGlvbiI6Im5ldyIsImV4cGlyYXRpb25UaW1lIjoiMTU3MjM3NDI1ODgxOSIsImZyaWVuZGx5TmFtZSI6ImZyaWVuZGx5In0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:39 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "8e506a3363d098fe", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/models?alt=json\u0026pageToken=\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:39 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/32OwQqCQBCG32XOCqOm7nrrICGUgXqLkMUdyVBX3L2I+O6Z1qVDp/lgvn/+maFTkloN0W3eMaOaRuorgmiGYVRPqkwiIQL9UG07daK3JXXKNqQNWCCFEZp248Oliw530GVlEHAMfI7IvXWUiOiska1mC2z0X18sqEYSplF90XTrU+D4oeuykPkhR2891wptLko2dUPyV2E8OHwbi2l4785JGh+zMotPWZznyTWF5b68AAuE2UUHAQAA" + } + }, + { + "ID": "e9a81ef08854dd2e", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/models/model_20191028_66906590093659_0001?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:39 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "1671095c16c0bfd8", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/models/model_20191028_66906590093659_0001?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 404, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:39 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/82PMQ+CMBCFd35F01nMgUiE2bAJi07GkGormrRcwpXBEP67bWVwcna6vHvvct+bIsa4GgYceMkmJ5y8oVROZZCtPgujiETnd7xGy+449rJkBxfTjB6o9cuIPpbKYGwV2VIKK0jZNoWkSCDdtXleQL4tAIqNGy0AJGvjz39G+PI+4JH7fg6aLZx/gBYQJBrx7D1Bp/Eq9Lc3KEEYvB5t5eH4Ys5hXpaKZIUdKbRojm3VnOq9D87RHL0B/Mu5Z6IBAAA=" + } + }, + { + "ID": "34d694d29ddf7f9b", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/routines?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "292" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJhcmd1bWVudHMiOlt7ImRhdGFUeXBlIjp7InR5cGVLaW5kIjoiSU5UNjQifSwibmFtZSI6IngifV0sImRlZmluaXRpb25Cb2R5IjoieCAqIDMiLCJsYW5ndWFnZSI6IlNRTCIsInJvdXRpbmVSZWZlcmVuY2UiOnsiZGF0YXNldElkIjoiZGF0YXNldF8yMDE5MTAyOF82NjkwNjU5MDA5MzY1OV8wMDAxIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCIsInJvdXRpbmVJZCI6InJvdXRpbmVfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAwMSJ9LCJyb3V0aW5lVHlwZSI6IlNDQUxBUl9GVU5DVElPTiJ9Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:39 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/32PT2uDQBDFv0qYY2lg1fgXcoiBFok1JLGHthRZdLTb6m7QFRTxu3c10p7a0zxm3m/mzQAoaQEexC+GIP6X3T0Sn7525BIejuK03cI91KKVjOMZc6yRpwjeANdafGIqg0yhzYcoy76ifJ1hJdYSG6mojEra4M2x6EQnmqsR3UksyyWW6RLiGqokhBDt99CMLPp/ZPxh4v6qcsFlvwt35+ThOdrHwTFSO9MaqWSCx6yaDJpp67pjO6a7sQ01Lmkjn0TGcobZnxZetLSY159C1aB10VbIZQPe2wCczlS3vHwLMoBU9cD49EoQxdYGxvFdOTBnnE15fJH1E7a6WxkwfgPK8JBKhwEAAA==" + } + }, + { + "ID": "52d137124d3ddadd", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "447" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "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" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:39 GMT" + ], + "Etag": [ + "Mty5paeXKV0PUAfAa0c6sA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/31Sa2+bQBD8K6frF1tyAJNAbEtWSy1cWXZIyyOKJSTnQtbkEuDI3RHJjfLfu+CHKjXNFzh2Z2eG23mjz7x6oBN6z/OXBuTuy5O4pwMKmuVYvdI7p2Zwu7yxfibe1mNW5ipvOkUEb6fUoyiKXcmqswcoxZkGpSdJZMjfwdJZLll9fV5BUTiXa6jLOVvfXnzHSQXFdsWrZ5x/1LpWE9M8qhu5EHkBrObKyER5qpuvtllL8QSZVuYHoia6VuYnsl8LkTHNRTVNIrTQKJAbKBkv0ERLcCbFvdDfPqA2OCuNHPGvPAOWZaKpdOsNWTJRbXneyI6YTt5o5/WvA02rVKd6Fvpe7JN5EszixXVA7j6SeWCaKdAb2xqOh5Y92rju2HKdsWWNz/G1sSxraEjRaF7BZyD7rrdXTTWTknhh6K3TxrLOsygOk1m8P1esBIKFRfBjQF5ZQRZB7F50PTg8OxJC+sSLyImSkF7kr/xZTKLkqreY96CA0ujYpiSlWyFSOuhqSDqomqLo98k8vL4iSRD4UdxDTx1ji+mfNPAya8mF5Lq9NfTihx7e1Y2/39UKcpbtohfc1pYVCt4HFBce72pA9K/ED9d0XwphCxKqDNolHAKz+E9QaTfRdT/P6zE6CMTwoJDS+K00z1Qrk0no2jEvWztD59K2R5cjZ+y4Lu3AUv/Tc+0L7J3y0jJCCZU+/NM+MZtjYuj7QbVRJzSiQrxTXCB2/wDqwd9hxwMAAA==" + } + }, + { + "ID": "1afeedbce09a7bd1", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/rzNK5KKapO3nell57YepmFaYX4B?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:39 GMT" + ], + "Etag": [ + "KK1s4mbAhpJgHow1z/lxmg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/yWOXUsDMRBF/8v4ukWLLcJCH2xBqgE/KoJ9zKa32a1JJiaz6Lb0v5u1T3Nhzpw7J/rqwo5qajr73SMNVxbyNoYNcu8klxE5ZFBFEG0LqdQ0z3xz38Ynu+af6fHa/Xq7WBTiwM0GeyQEA6pPFBMfYORxLMgtOzd4HSY7eJ4Islwu/rfp+KzmSun4chvg3Pxui+gf9PZztiyUY6Ol41DAj3c6VyQs2i2HInlNbJAzRsnNRbhiHx2kfCCpR0VGmxbrTqjea5dx/gM00fSa9AAAAA==" + } + }, + { + "ID": "620b59aae4367517", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/rzNK5KKapO3nell57YepmFaYX4B?alt=json\u0026fields=status%2Cstatistics\u0026location=US\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:39 GMT" + ], + "Etag": [ + "kkYL1Hr2AMbmSHaxi93JyQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/32RQVODMBCF/0vOdiagUOBmax17EJiKZybCto0TSE2WA9Ppf3cTGD0wekqy73u7ecmVWRQoLcrGsuzKGgN01H0lO2AZC6J1GCbrJEqjOGZ3Dja40OLwgTTo26WSJqSgRqE2I4ItjW7AWmiJ4qR8DWBGN9cjJTWXbvqC+7vDr7KRSv2UP+gg+1MlwbAsmLE3pfHVzkQjmjO8SGTZUSgLPhtCBz1W48Wl2B52j9Wufn7Pt9W+yMnStqq4gPEPVII5atP5gRM5AZUwJ8CDHlD24JJdjP6EBvcOtGet1NiJftVCp1d0aXQugcLCRMz7OuRBGvAwqeM45XGUcp7e01JzzgOymKm/t8z7/ywhu92Wb3CbMg/+4316Kj8V+Y7ob/G5Zy0YAgAA" + } + }, + { + "ID": "6039e321d7b9f17d", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/routines/routine_20191028_66906590093659_0002?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:40 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "97366e446d40d857", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/routines/routine_20191028_66906590093659_0002?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:40 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "477418610767222e", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "289" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5IjoiXG5cdFx0Q1JFQVRFIEZVTkNUSU9OIGBzaG9sbHltYW4tZGVtby10ZXN0LmRhdGFzZXRfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAwMS5yb3V0aW5lXzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDNgKHggSU5UNjQpIEFTICh4ICogMyk7IiwidXNlTGVnYWN5U3FsIjpmYWxzZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiJ6OEpnZ0IwZzZCZXFhOFpJQmhnVTBSbWljMUQiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0In19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:40 GMT" + ], + "Etag": [ + "Amn3GQrlbksaVntI4dJwLQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "5cba0e3ee24aecfe", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/z8JggB0g6Beqa8ZIBhgU0Rmic1D?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:40 GMT" + ], + "Etag": [ + "Cuem33Jpkuy0ZJR1C7QpJg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/yWOy27CMBBF/2W6DVIQUosisUm6KFmVIDbsjLk4Br+wx4uA+Pc6ZTVXmjPnzpNu2p2poZNW94w4fSjwbg4DUjacygjeJVBFYKEK2WXY1aoPtzzVx35Ydl+70KvNphBXfxpwQYSToOZJIforJG/ngjR6YyYr3OIM6xeMxO+L/+1j3SvV1uqzxV2sj9t2VId6sFouvwtlvBSsvSvgYU+vitizMO1UJL/RS6SEWVK/hZ23wYDLBxwzKpJCjvjRTM1FmITXH2A4nq/0AAAA" + } + }, + { + "ID": "5ce510f3f0fbff4b", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs/z8JggB0g6Beqa8ZIBhgU0Rmic1D?alt=json\u0026fields=status%2Cstatistics\u0026location=US\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:40 GMT" + ], + "Etag": [ + "k4V0noqkLssnU4MtvzQxYQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/32RzW7CMBCE38XnIjlJyd+t0FTlUEA0PUdusoArJ07t5RAh3r1rJ2oPUTnZ3vlm12NfmUWB0qKsLcuvrDZAR92VsgWWs2CZhGGapDEP45A9ONjgTIuSjDTompnymEakoEahVgOC3Rtdg7XQEMVJ+b6AGdxcj+ypuXTTZ9z/Hf6UlVTqt/xJB9mdSgmG5cGEvSuNb3YialGf4VUiy49CWfDZEFrosBx6l2J9KJ7Konr52K7LzW5LlqZRux6Mf6A9mKM2rR84kiNQCnMCPOgLyg5cst7oL6hx40B71koNregWDbR6QZdG5xIoLIzEtK9CHmQBD9MqjjMeLzPOs4iWinMekMWM/b1l2t+zROx2m7/Bbcx88R/v01P5ebctiP4BP1RJ7xgCAAA=" + } + }, + { + "ID": "235c0d2d211f8b25", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/routines/routine_20191028_66906590093659_0003?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:40 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/32PT2uDQBDFv0qYY2lg1cR/kEMMtEisIYk9tKXI4o52W90NuoIi+e5djbSn9jTDzPvNvDcAKlqAD8mLJUnw5XSPJKCvHTlH+4M8bjZwD7VsFRd4whxrFBmCP8Cllp+YqZBptPmQZdlXVCwZVnKpsFGaYlTRBm+KuU9NYngGMd3Utj1irz1CPEuXlBBi/D6akLn/D7Hg+sMk/UX7gvNuG21P6cNzvEvCQ6xvZjVSxaVIeDUKjLVjmq7j2mRle3pd0kY9ScZzjuxPiShaWkznj5Ee0LpoKxSqAf9tAEEnqpsj34wMoHTdczFGCePEXsH1+q4VmHPBRz+BZP2ILe4WOsc3XIfztIcBAAA=" + } + }, + { + "ID": "9075067d8edb4779", + "Request": { + "Method": "PUT", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/routines/routine_20191028_66906590093659_0003?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "275" + ], + "If-Match": [ + "TY3o0Bk7xG0BaZx0SLKOoQ==" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJhcmd1bWVudHMiOlt7ImRhdGFUeXBlIjp7InR5cGVLaW5kIjoiSU5UNjQifSwibmFtZSI6IngifV0sImRlZmluaXRpb25Cb2R5IjoieCAqIDQiLCJyb3V0aW5lUmVmZXJlbmNlIjp7ImRhdGFzZXRJZCI6ImRhdGFzZXRfMjAxOTEwMjhfNjY5MDY1OTAwOTM2NTlfMDAwMSIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QiLCJyb3V0aW5lSWQiOiJyb3V0aW5lXzIwMTkxMDI4XzY2OTA2NTkwMDkzNjU5XzAwMDMifSwicm91dGluZVR5cGUiOiJTQ0FMQVJfRlVOQ1RJT04ifQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:41 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/32PUU+DMBDHv8pyj8bFAhsDkj2wJSbEiTpxmhhDGnpgDbQLLehC+O4WRjTxwae79H6/6/86QE0LCKCUbdKqUG0OV/fWc3t4YTpmn+s1XEItG80F7jHHGkWGEHRwrOUHZjpiRlXvsixPFRVzhpWca1TaWIxqqvBMTH1qE8u3iO2lrusTd+kT4jumpIQQ6/ejUZn6/xQH+h8nOR1NLnjchrtwn14/xdskuovNzqxGqrkUCa8GwFqubNtbeS5ZuL4Zl1TpW8l4zpH9RSziOSMiioYW4/qHnXmgddFUKLSC4LUDQUfrazr5HKQDbeoNF8MpUZy4C+j7N0NgzgUf8mwkOw3a7GJmZt8wXF9mhwEAAA==" + } + }, + { + "ID": "8a2e2fac0c38b971", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/routines?alt=json\u0026pageToken=\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:41 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/82QTU/CQBCG/8ueJc62dNttwqEl0RBrEaj4FdNsukuttl3SXSqk4b+zIuJFuXjxNJPM+8xMng41cqWLWijkP3VIaJYjHyUPtoTwzV1fQsge1zCLrsZyMhigs6/4VCxEI+pMIL9Dy0a+ikyPuEHViyzLTcXqHheV7GmhtKE400yJz8ShTy3AFIPlpYRQIA4FoLYpKQDg70N75NCfRrZHJtkszV9oNgyiYJpe3MbDZDSOzc6sEUwXsk6K6iOAHdeyPNdzaN+1zbhkSl9LXiwKwX+N1PmK5fv1k8jcPDorZZu0KlDh/PwG37Xze65j/v6vndl/cEagT+hpZwSD95Oz5+0OlUhz+3YCAAA=" + } + }, + { + "ID": "e13d401715a561c8", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/routines/routine_20191028_66906590093659_0003?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:41 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + }, + { + "ID": "e4dd1a46f1234a7a", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001/routines/routine_20191028_66906590093659_0003?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 404, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:41 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/82PPQvCMBCG9/6KkFnlarXYztKxgugkUqKJtdDmIHcdpPS/m8YOTs5Ox/vB8bxDJIQ0zqGTuRi88PKO2ni1gc3iY3SGSNWTJ0tk8cDe6lwcsefGGkFPbNtXp+xSmw6XbIhzrViR4WoNcRbDelelaQbpNgPIEn8qAIhX7vPgVymRM0JAJE9wCVrMrH+CFzA0dqqxE0Xd4k2135kzijBkFrmYAOUcjuFe55nEinsKSw6nqjicy/1UHKMxegNhQiAVqgEAAA==" + } + }, + { + "ID": "8adbdf84843bcc6f", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "159" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0ICoiLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6IkRwWEtGWFhtWlVhbzhQV3I1SllGRUttc3RLSCIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:41 GMT" + ], + "Etag": [ + "TJFyguOqY4toGVdiTWQ25A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "316717e4273bab60", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "245" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0ID8iLCJxdWVyeVBhcmFtZXRlcnMiOlt7InBhcmFtZXRlclR5cGUiOnsidHlwZSI6IklOVDY0In0sInBhcmFtZXRlclZhbHVlIjp7InZhbHVlIjoiMCJ9fV0sInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiejlwVER3ZzRnTlROek0zYWRKeGlHbVRORzVNIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:41 GMT" + ], + "Etag": [ + "OgdnoOlMODr6yiw7pBWiOQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "c99e94535ba41e17", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/z9pTDwg4gNTNzM3adJxiGmTNG5M?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:42 GMT" + ], + "Etag": [ + "LbyKDm5FvmsnkgRrw6rGjw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P3U6DQBCF32W8bZMarYkkvbAWsUqJIr0yxiwwUOj+4O4g0oZ379B6NXtmvzlz5gj7SufgQVqVPy3a/qpEeh8fMbpWkuPSGO0QJoAkSibDtH9dqfnTr3J6X8a2u7NB3S0WTLhsh0qAd4SiQpk78D6PoIVCHitm30xQ34xiHSV+4MfcUCYfG9E2DB+WoQ/D1zCB2qQxFmhRZzi6NdbUmNF6DOp2RspeCT3NUZkpoSM4T5x/D/dNsurK2zJKosPmRuQvf1WgkiiYb5iSJhNUGc3g9gN4ERkSMjYdJ4Vr+NfLnk3frMnQORxNZ5cFj0Y1EokTkW1xApngc58ruujhBKhp5XtLAQAA" + } + }, + { + "ID": "ac670c5662853bfb", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon5cdc9b105eeec52ec6c997043bdb3f369d5b242b/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:42 GMT" + ], + "Etag": [ + "dfs/+fs8YpkRHn6kxjDxbQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qnpBXra6cVW0QWZAd55JllV2S5VCQF2toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwobKNXGAiEAMtIS024AAAA=" + } + }, + { + "ID": "28d87f66ae8946ca", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "250" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0ID8iLCJxdWVyeVBhcmFtZXRlcnMiOlt7InBhcmFtZXRlclR5cGUiOnsidHlwZSI6IkZMT0FUNjQifSwicGFyYW1ldGVyVmFsdWUiOnsidmFsdWUiOiIzLjE0In19XSwidXNlTGVnYWN5U3FsIjpmYWxzZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiJEdjRxU042VmdiTjJpWHg5enFqQzRxbzQ3dGciLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0In19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:42 GMT" + ], + "Etag": [ + "xhvKtM68dwQxbEg/K3lyAg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "df394cccb2e83e93", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/Dv4qSN6VgbN2iXx9zqjC4qo47tg?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:42 GMT" + ], + "Etag": [ + "fdDFGh+OcfnKA9RsMLJCOA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2PXU+DMBSG/8vxUpZMQzRbsgvGnF+4KXPGxBhTyoExSw/Qg4qE/267edU+6XPe87aHz0KnMIWkyOsWm+4kR35ylxhNq9jYoyJtEDxAFrk1s3SxvN6drmWm74NJbB6iu3AdzGbWMHKHpYBpD1mBKjUwfetBixLd2PjDGtxVDpbROni2WFLqcLWNomAeXcHwPniwpyTGDBvUEl1W1dAeJd+6mmZHSnWl0KMUSxoxGobDxOF18eXXm9XFS56szovXn8lvvQ/9mvxLzq2lSAouSFtxuwG7iImFiunb9oQz+Od5Z0MfG5JoDLrQ8XFBSGWlkG0jblr0QAr72ZuCjzz8AZTDEwNJAQAA" + } + }, + { + "ID": "42e1e9d0078e82e8", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anone3aa86976e663aefba4e3900ce3bc3142d10cb95/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:42 GMT" + ], + "Etag": [ + "6G3ETqhMUXE4N6CJHyQNKA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qbuRu7hhRm+IZGuJr4mTl7eVQG+nk72toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwob6xmaKNXGAiEAAG+0AXEAAAA=" + } + }, + { + "ID": "ceb84ea26565e6d5", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "257" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0ID8iLCJxdWVyeVBhcmFtZXRlcnMiOlt7InBhcmFtZXRlclR5cGUiOnsidHlwZSI6IkZMT0FUNjQifSwicGFyYW1ldGVyVmFsdWUiOnsidmFsdWUiOiIzLjE0MTU5ZS04NyJ9fV0sInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoicHpzUFNWTU8zanJLMXR4U3c0TGNCcHJrSGJJIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:43 GMT" + ], + "Etag": [ + "52Ky6KiDmyL87vuYGnJB6A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "f0dc5676d261c77a", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/pzsPSVMO3jrK1txSw4LcBprkHbI?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:43 GMT" + ], + "Etag": [ + "vSxCivvoLKuE1+Z6LRgyRQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2PwU7CQBCG32U8CglE46EJB0owEFaBVjxojFm2Q2nZduruFKik7+4UPO1+2W/++fcCh6xMIIBtlv7U6Jq7FHndXSL0tWUvR0WlR+gBsk7FPMbnSXY8klrU0+H9x5OK0iZaj0ZieLPHQkNwgV2GNvEQfF6g1AXK2G7wLQY3VQfPajl+Eywo6fB1o9Q4VFNov9oe5LSNcIcOS4NdVuUoR8Pzrqbfk7VNoct+ggX1GT3DdeL6Wv36Vfz+snzI3WLI5/j0qExYucNsOxfLktGcUSniJgZZxMTaRnSSnjCEfw4bCV05Mug9dqGD24IJFZVFlkbsauyB0fLZWcY3bv8AJFZus0kBAAA=" + } + }, + { + "ID": "3b0d4ef089d65577", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon89c368b14ea346b22ac8c51c365febe6ce516c59/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:43 GMT" + ], + "Etag": [ + "7PubGjvdf7J1AirLErbhDQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qbB5QmuWeVpaSZexk6Zhb5uBYlZbgE2toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwob6xmaGJpapupamCvVxgIhAG+nuKt4AAAA" + } + }, + { + "ID": "e9dcf6d0f52720d2", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "247" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0ID8iLCJxdWVyeVBhcmFtZXRlcnMiOlt7InBhcmFtZXRlclR5cGUiOnsidHlwZSI6IkJPT0wifSwicGFyYW1ldGVyVmFsdWUiOnsidmFsdWUiOiJ0cnVlIn19XSwidXNlTGVnYWN5U3FsIjpmYWxzZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiJJaXc0bzhWUnpjVmtVS2lIOTdPMkNkSHN3T1MiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0In19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:43 GMT" + ], + "Etag": [ + "rnSK0CGdpG15Ticas/Lj6g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "033dfb8e09d9b11c", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/Iiw4o8VRzcVkUKiH97O2CdHswOS?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:43 GMT" + ], + "Etag": [ + "d9r3ZI4WMa4H6ZNUIvwyUw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2PYU/CQAyG/0v9CgkqUVnCB0ZItjiZjgwTjDHHrcDBbZ274jKX/Xc78FPv7T19+7aFkyky8GBr9t9nrJqbPfJb/0jQnS07KSUVDmEAyGovZDap7jfh+P1FjYOHzTINf+omradTIZw+YK7Aa2Fn0GYOvI8WCpWjjO1GX0JwU/bCj+NoMVtKI6esbyzTKJr50QK6z24AR9omuMMKC429W1nRETWHfVB3IGubXBXDDHMaMjqGy8TlNzT1mJ7Wya9en9JnE0we47t5Frg6XgllSSs2VAiYrkAWMbGyCdWSFG7hX/uNmL5WpNE57E1H1wVzykuLLIm4OuMAtJJzA8NX3f0B1Pbe/UsBAAA=" + } + }, + { + "ID": "1eb7964ae18d8062", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anone96c6d231f8d9c5565d63b9528dd071c6b9c9245/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:44 GMT" + ], + "Etag": [ + "IGDPWgAC0eakMCDJ9TeWBA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8p7ursEhKc7OhukJmb7Ort4WYakhjs52toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwqXFJWmKtXGAiEAmSRo0HEAAAA=" + } + }, + { + "ID": "bd2f1741f905b30e", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "251" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0ID8iLCJxdWVyeVBhcmFtZXRlcnMiOlt7InBhcmFtZXRlclR5cGUiOnsidHlwZSI6IlNUUklORyJ9LCJwYXJhbWV0ZXJWYWx1ZSI6eyJ2YWx1ZSI6InN0cmluZyJ9fV0sInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiQThGZUJuYW5TNFQ5Z094em8yc1MxUmN2MVljIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:44 GMT" + ], + "Etag": [ + "XX2vI7bt2p1Sh4qp5WhlcQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "eb6784278199d22d", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/A8FeBnanS4T9gOxzo2sS1Rcv1Yc?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:44 GMT" + ], + "Etag": [ + "XKZtdaHFWojxxzTBRxDSYg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P0U7CQBBF/2V8LQk1PmgTHqiKEAlqW4JojFm201Lc7tTuVFsI/+4UfNo92TN37h7gq7ApBLAp8u8G6+4iR37pLxG6xrCToyLrEDxAVrmYr49vnKrpZEW7tt0nYdTexet8NBLD6S2WCoIDZAWa1EHwfgCrSpSxbPgpBndVD3ESzRYPwiWlPS+W8/k4nN/D8ePowY42EWZYo9XYh1U17VDzrO/ptmRMVyo7SLGkAaNjOE2cXsfXEwytsvFVcpM/tXu6dLEf6R9/rcUypBUXZEVcxiCLmFiZiH6lKPjwz2Enoc81aXQO+9DhecEtlZVBlkZcN+iBVvLbacFnPv4BibpFQkoBAAA=" + } + }, + { + "ID": "3a80594727294c0a", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon57652de0e0ba95f90d02751e115e96e0d68a3142/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:44 GMT" + ], + "Etag": [ + "2ITuz9xbiw1Fxkdn/YEewQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8obeYaUVllWJGWWG7pVZKfk6Ue6ppYH2toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwoXlxRl5qUr1cYCIQAdNVoGcwAAAA==" + } + }, + { + "ID": "1d6a5a8722c61bd1", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "256" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0ID8iLCJxdWVyeVBhcmFtZXRlcnMiOlt7InBhcmFtZXRlclR5cGUiOnsidHlwZSI6IlNUUklORyJ9LCJwYXJhbWV0ZXJWYWx1ZSI6eyJ2YWx1ZSI6IuaXpeacrOiqnlxuIn19XSwidXNlTGVnYWN5U3FsIjpmYWxzZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiJ3U1k5MUZ2azA5VjhNZzJ6dDY2RmkxMmRYZW8iLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0In19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:45 GMT" + ], + "Etag": [ + "XUNQSSAeNuOd8/3KmyMVmQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "9fd8cba5ecbe7aff", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/wSY91Fvk09V8Mg2zt66Fi12dXeo?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:45 GMT" + ], + "Etag": [ + "S75HcD2KUVNUrpSxG2lEcA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P3U6DQBBG32W8bRMgsVqSXrTav4hEQRqNMWa7DJR2YZCdWrHpuzu0Xu2e7Jlvvj3CrqhS8GFd5F97bNqrHPm5u0Ro94atHDVVFqEHyCoXM765Xuh77yFZhUlTxz9zz0z1eDQSw+oNlgr8I2QFmtSC/36ESpUoY5nzKQa3dQfxS7QM58IlpR2HSRCMJ8EUTh+nHmxpHWGGDVYau7C6oS1qXnY97YaMaUtV9VMsqc9oGc4T59dD/DZ0Z987Z7i6fcy9Xx4MZoXrpa9IYhnSiguqRExikEVMrExEBykKLvzzpJXQp4Y0WotdqHNZcEdlbZClETd77IFW8ttFwRc+/QHM2ESSSgEAAA==" + } + }, + { + "ID": "1dfe86fb412e5d45", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anonf5cfb9f805006c88f4e7af2987adf892973ae7ae/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:45 GMT" + ], + "Etag": [ + "nFyPFSjFz36pttjcTH4rTw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8rnuVUGuAVnuVUZmxWUlGQlh3iYFIWU29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwo/m7702Zw1L1bNi8lTqo0FQgCiIFuaeAAAAA==" + } + }, + { + "ID": "3aca071600273f7f", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "249" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0ID8iLCJxdWVyeVBhcmFtZXRlcnMiOlt7InBhcmFtZXRlclR5cGUiOnsidHlwZSI6IkZMT0FUNjQifSwicGFyYW1ldGVyVmFsdWUiOnsidmFsdWUiOiJOYU4ifX1dLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6IkhiVnZ0UlVwbWFoOXB6YzFaZnEyS1pvU2pUNiIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:45 GMT" + ], + "Etag": [ + "/5DrsJqNS426puyR5Em9vQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "141fd4e0949a0ea6", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/HbVvtRUpmah9pzc1Zfq2KZoSjT6?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:45 GMT" + ], + "Etag": [ + "7Z0eX2rb688XdOtAWdpbHw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P0U7CQBBF/2V8LUnhAZGEBzAajI1ooUJqjNlup1Dc7SzdqaQS/t0p+LR7smfu3D3Bd1nlMIas3B4arNubLfJbd4nRN4a9HI4qjxAAstqKeZuGuBnU2XA02uQLnq5zl82Pk4kYXu/QKhifoCjR5B7GHyeolEUZK8IvMbh1HTxGi+lK0FLe4UsSRdNZ9ADnz3MAe8piLLDGSmOX5Wrao+anrqbfkTGtVVUvR0s9Rs9wmbi8zrP3H44TZ9Xuzv3qflocBs8pLferoViGtOKSKhGTJcgiJlYmpqP0hD7886yV0NeaNHqPXWh4XXBP1hlkacR1gwFoJZ+dl3zl8x+6ZdKNSQEAAA==" + } + }, + { + "ID": "b62e30b52589d2a0", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anoncf5b706fb511c8b7ffdf860af092564d0e3f556b/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:46 GMT" + ], + "Etag": [ + "EH4aInn5/mHkqkXkJkWJvQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8q7epgkeublmernemQXZkdke2WHe5UF2toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwr7Jfop1cYCIQDnvX3ScAAAAA==" + } + }, + { + "ID": "0d50ddff4a24f40d", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "248" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0ID8iLCJxdWVyeVBhcmFtZXRlcnMiOlt7InBhcmFtZXRlclR5cGUiOnsidHlwZSI6IkJZVEVTIn0sInBhcmFtZXRlclZhbHVlIjp7InZhbHVlIjoiWm05diJ9fV0sInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiRllKdk5HNWdnczFKSEVWcE5YWTJKWW5KdXJVIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:46 GMT" + ], + "Etag": [ + "q/ngh69U5Eo6PfzhwVWn/Q==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "777ca49850c24317", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/FYJvNG5ggs1JHEVpNXY2JYnJurU?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:46 GMT" + ], + "Etag": [ + "yBCmfQSFidfY3dma46B+Ag==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2PXU+DQBBF/8v4KE1avx5I+lAaaiWEWLBGYozZwkCp+4HsoCGE/+5s69PuyZ65c3eEr0aX4MOhqb977IarGmnnLinaXpLlozXaIniAJGo2h2Ctql22acoqvy2VuHsIrlf1csmGLY6oBPgjVA3K0oL/PoIWCnmsmn+yQUPrIMhfwoxRmdJhso/jVRCHMH1MHpzMIcUKO9QFuqy2Mycs6MnVtEcj5aCEnpWozIzQEpwnzq+bPPpJHu/r2i6ibfjaJm/5TZTrqO/2bElTCGqMZnGfAS8iQ0Km5pd7wgL+ORg49LkzBVqLLnR+WbA2qpVI3Ii6Hj0oBH9229CFpz+eZ4fVSQEAAA==" + } + }, + { + "ID": "68c52d68561ba0df", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon133b0ae6c2a140c9270d990972df75572cd11d05/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:46 GMT" + ], + "Etag": [ + "CaV/GP4jm7dGZFPz0rvytA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8o7J4bpuweYZOWap7hHuQVUGRSVVZY42toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwpH5VqWKdXGAiEAMmXWL3EAAAA=" + } + }, + { + "ID": "9c783876e1a632de", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "280" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0ID8iLCJxdWVyeVBhcmFtZXRlcnMiOlt7InBhcmFtZXRlclR5cGUiOnsidHlwZSI6IlRJTUVTVEFNUCJ9LCJwYXJhbWV0ZXJWYWx1ZSI6eyJ2YWx1ZSI6IjIwMTYtMDMtMjAgMDQ6MjI6MDkuMDAwMDA1LTAxOjAyIn19XSwidXNlTGVnYWN5U3FsIjpmYWxzZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiJlcmhuV0FqS01zeGZ4amx1blNLTWxuVGtGSVUiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0In19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:47 GMT" + ], + "Etag": [ + "OdFGoJY4HjINitFTUhajNw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "4b76180ec26dc5a6", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/erhnWAjKMsxfxjlunSKMlnTkFIU?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:47 GMT" + ], + "Etag": [ + "op0qqgtP2KZZ0jRaC84isg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2PQWuDQBCF/8v0asCWHkogBxNSKonFqqGQUspGR6NZd9QdaUT87x2Tnmbf7Ddv3oxwKU0GSziVRdtjNzwUyB/zI0Lba7ZSGjIWwQFkVQhJjdu2BYdPu+PRrSK1eXkubbFaCWHTM9YKliPkJerMwvJrBKNqlLHc/RGCh2YWiR9s48QLQmnVlM2t98N+7633W5i+JwcqOkWYY4cmxdmv6ajClP05qj2T1kOtzCLDmhaMluE2cfvF7mw+vWoX2Gt+rXRv4l2gTXJ59Q9CaUoVl2QEPMQgi5hY6Yh+JSs8wr9eD2IadpSitTibuvcFG6objSyJuOvRgVTJwW8l3/X0B6W+6J9NAQAA" + } + }, + { + "ID": "9204e64f1a600549", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon077b2724190ae89cdd226e02449f03ae726d05df/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:47 GMT" + ], + "Etag": [ + "2vTjAisyRxOoiCPpaObdbw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8oblYVkOWYWVwZV+OdnOgcUJPonpSSV29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwmbmFqYmBqamFjqGYCAqVJtLBACAL6otWd+AAAA" + } + }, + { + "ID": "de999681674d1380", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "253" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0ID8iLCJxdWVyeVBhcmFtZXRlcnMiOlt7InBhcmFtZXRlclR5cGUiOnsidHlwZSI6IkRBVEUifSwicGFyYW1ldGVyVmFsdWUiOnsidmFsdWUiOiIyMDE2LTAzLTIwIn19XSwidXNlTGVnYWN5U3FsIjpmYWxzZX19LCJqb2JSZWZlcmVuY2UiOnsiam9iSWQiOiJCTGVNTmc3TGNRdXJ0cGptTzJEajdsSWdvckEiLCJwcm9qZWN0SWQiOiJzaG9sbHltYW4tZGVtby10ZXN0In19Cg==" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:47 GMT" + ], + "Etag": [ + "wZHkEwfVm6XkpSye0G5Lvg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "ae3a3c935168c5fd", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/BLeMNg7LcQurtpjmO2Dj7lIgorA?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:48 GMT" + ], + "Etag": [ + "a1d8PYRwV5s642MU6v2DNw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2PYWvCMBCG/8vtq4KWTYfghzqFCdVpN4UxxojpWdslvS65Tkrxv++i+5Q85Ln33nTwXVQZTOBQ5D8NuvYuR96GS4q+MezlqKnyCD1AVrmYapg9bt7T8/7Bj+6j1W70G83X5+lUDK9PaBVMOjgWaDIPk48OKmVRxo6DLzG4rQPM47eFkKUs0HqXJPEsWcDl89KDkg4pHtFhpTFE1Y5K1LwMLf2JjGmtqvoZWuozeobrxPV1luBqnY8TvW0c16V9iebl2CxzcrFYhrTigioRd68gi5hYmZTOUhOG8M+zVkI3jjR6jyF0cFvwRLY2yNKIXYM90Er++lzwjS9/IU5vs0gBAAA=" + } + }, + { + "ID": "2db372002cf69148", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anona18dc6f27dacfe5d8544daa0f9040265ad6a1706/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:48 GMT" + ], + "Etag": [ + "SI1WtCiNYH0KjoxWRPHj3A==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8oHexqGlzhn+kV6GHhn5VeEBwV4ZBk72toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwobGRia6RoY6xoZKNXGAiEA1ogQMncAAAA=" + } + }, + { + "ID": "f7b59c3c368b47f7", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "258" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0ID8iLCJxdWVyeVBhcmFtZXRlcnMiOlt7InBhcmFtZXRlclR5cGUiOnsidHlwZSI6IlRJTUUifSwicGFyYW1ldGVyVmFsdWUiOnsidmFsdWUiOiIwNDowNTowNi43ODkwMDAifX1dLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6IkZMZjNNV3JVdFR6eHhxYjZxbUNQaGVKVFQ0ZSIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:48 GMT" + ], + "Etag": [ + "/eamq+Z1P+lH7koIPFEUow==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "ccd6a624de32dec8", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/FLf3MWrUtTzxxqb6qmCPheJTT4e?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:48 GMT" + ], + "Etag": [ + "4tS78Ms3S5OdtBN/1xms/Q==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2PW2+CQBCF/8v0FaNGewmJD8XY1AasckkfmqZZYLjYXRbYIYUS/ru72qeZL3PmzJkRfsoqBRviMm86bIe7HOlkGh9Vx0npUstKIViAxHKtXFPw+OSpVXD/npJzmC97oeanzUYrVFKgYGCPkJXIUwX25wgVE6jXssW3VtBQGwj33k6TkKmhQ+S6z467g+lrsuAsYx8zbLFK0FjVrTxjQnuTUhWS80GwapaikDNCRXDduE5f3GzlfbQRhX9938QPjdgeC3wLw7WJz2XCqJSVFkYB6EMkiXFf/uqYsIR/dgZtemxlgkqhMV3cDmylqDmSTkRthxYkTP/6WtKNpwvctdvMSAEAAA==" + } + }, + { + "ID": "14880fbb90b88854", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anonf8a874ae44583663dffadad4a2f3fb83aa93e6c3/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:48 GMT" + ], + "Etag": [ + "iv2flgpb4yyWt1UzFZv8bg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8pnlhml5aQXJJlUVoaXGIZWuUWVWSSl29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwobmFgZmFoZmOmZW1gaGBgo1cYCIQB0TlNMfAAAAA==" + } + }, + { + "ID": "ba95cad8a9ef6029", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "273" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0ID8iLCJxdWVyeVBhcmFtZXRlcnMiOlt7InBhcmFtZXRlclR5cGUiOnsidHlwZSI6IkRBVEVUSU1FIn0sInBhcmFtZXRlclZhbHVlIjp7InZhbHVlIjoiMjAxNi0wMy0yMCAwNDowNTowNi43ODkwMDAifX1dLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6IktFZjRlZ1JNdjFqS2VSRDJQd1p0czVEZHZiOSIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:49 GMT" + ], + "Etag": [ + "E2psafbc3yLBxCGDUBEq8Q==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/42S207bQBCGXwVtb0l8jg8SohC7yCJE4DhUbVVF6/XYLNhe492ERoh379gGWrUU9cLyHr5//pnZeSR3vMlJQDJe3m+h23+4FRk5JKBoiaeR2UpaZMzaL05/zM/C9Wl0710dHSHBe5W8EVW1r2kzyaEWEwVSBevV9DwqbCiTi51xew5JaF4+fFXSCfNd5qNSQlUseHOH+hulWhlo2ov7tBSirIC2XE6ZqF/PtZ2ptZ24Baak9oaphllL7R3b40owqrhojtYrTGErodtATXmFSfQBJp3IhPr4Rugpp/W0RH7HGVDGxLZRfW4YhYmm4OW2GwKT4JEMuf626EvFlA+OEc4xFm8GNKVZBT32XFL8j1b2KqqohJHYZACmO8ty3zEM2yhmM8fxqOHavuUzP3dsk1lg6hZFneotBhVtRJPnvm64BfWYwZhreYbnQuG6jm35tm2YnlMUJvUNhzxhUR1QBSGXrZB8LIzMk+gkjTbxp80yisIoRIOHjv9JfU5ihNJkvZwjjUzbcYFY34h4mUbJyTyNr6Ox/QsoKduv7vEBClpJOBx7dkk7WoOCTpLgGzboZZvu26FjaviTEA3S+CLqE35lrmm1HaDduCCmbswmujUx9QPdDnQn0GdT1/N1XSdPT99RilMzBiZX6yj5QsajBArooGH/+USoGG7fH/qX+UMQJxCNpMI9jgSTvc3Q9X40eN2nYziuaXquN8PPIQPcqb/ufMckh7+Gro8INTTquaZVtIjmKZY6mm3lK4SX+ErLeHmGtz8Bwx8PmQMEAAA=" + } + }, + { + "ID": "290b7dec67c34355", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/KEf4egRMv1jKeRD2PwZts5Ddvb9?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:49 GMT" + ], + "Etag": [ + "BO8WwweiRez7+ICfwrsOoA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2PUU+DUAyF/0t9lCWb0agke4BBIhlzE7eYaIy5QGHghSK3jOCy/27ZfOo9vV9PT4/wXdQp2BAX+U+H7XCVI7+MjwhNp9lIaag2CBYgq1xId/3w1vdYRPh7fx0ssr41a3LmcyFMssdKgX2ErECdGrA/jlCrCmUsm34JwUMzCs/Z+ttg5UunonTsPO/C0HFDH06fJwtKiiPMsMU6wdGuaanEhIMxqdmT1kOl6kmKFU0YDcN54vy79LNbzKPVYVYuMfJuNv07mzsvPcSPQmlKFBdUC7h7BVnExEpH1EtUmMG/dgcx3bSUoDE4mk4vCxZUNRpZEnHboQWJknufCr7o0x8pMNKQTAEAAA==" + } + }, + { + "ID": "482384a3bee9aff6", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anondd9017fa8c1cc738187ef775439441285ff2a915/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:49 GMT" + ], + "Etag": [ + "8xIW1L1AcIicBvQK0SAnVg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8pbVHiGG/oYOiZ7ZiY7lQV6GwQ75oWl29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwobGRia6RoY6xoZhBiYWBmYWhmY6ZlbWBoYGCjVxgIhAAAd5DOHAAAA" + } + }, + { + "ID": "613164480ed4514d", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "258" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0ID8iLCJxdWVyeVBhcmFtZXRlcnMiOlt7InBhcmFtZXRlclR5cGUiOnsidHlwZSI6Ik5VTUVSSUMifSwicGFyYW1ldGVyVmFsdWUiOnsidmFsdWUiOiIxMi4zNDUwMDAwMDAifX1dLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6IlVtT2xReVBHZDVLUHBHRzJjZDZxYUhzOU56MyIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:49 GMT" + ], + "Etag": [ + "x3FaYZpmTw/m8gzaNTK3aw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "fcf5248f146a8be2", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/UmOlQyPGd5KPpGG2cd6qaHs9Nz3?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:49 GMT" + ], + "Etag": [ + "gIcnw4kr4r7TtuRvuNehjQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2PW0+DQBCF/8v4SpOqVSNJH2zTUCIiYPtkjNkuw617obuDDRL+u0vr0+yZ/ebMmQGOtcrBh0Ndnjo0/U2JlE6PDG0nyLrSamURPEBipSPLkKvz4mgW5mlHXfbTxVg16XLpCMsrlAz8AYoaRW7B/xxAMYlurJh/O4L6dhLx/m2ThWvXkDq/NqLoZRVtYPwaPWj0IcMCDSqOk1trdIOcwimorbQQvWRqlqPUM0JLcJm4/O7lu0j7JMgfXpM2CO54/nhiW/sc/947SmjOqNZqAj/ALSJNTGT67JLCLfzrVe9ME6M5WouT6fy6YK1lK5BcIjIdesCZO3db01WPf9pKNMVLAQAA" + } + }, + { + "ID": "dbb048b78aa9573a", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon046a4f2a533263a2ce69477231fa54fc779719ec/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:49 GMT" + ], + "Etag": [ + "0SCxdxaANP3IcQ1I9V2PxQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8obBDtXpFQkOvoFGHsmBxp6WoYZBVQE2toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsAwkb6RmbmCrVxgIhAJV6c2tzAAAA" + } + }, + { + "ID": "9ed7cafc86ec95bc", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "263" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0ID8iLCJxdWVyeVBhcmFtZXRlcnMiOlt7InBhcmFtZXRlclR5cGUiOnsiYXJyYXlUeXBlIjp7InR5cGUiOiJJTlQ2NCJ9LCJ0eXBlIjoiQVJSQVkifSwicGFyYW1ldGVyVmFsdWUiOnt9fV0sInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiSk90RnRKV0c4NktnY2d0YXZnbzVuOHNUNHA3IiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:50 GMT" + ], + "Etag": [ + "odipY6sJFwYRkyt6qicd0w==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "8dd499b60c26fdfd", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/JOtFtJWG86Kgcgtavgo5n8sT4p7?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:50 GMT" + ], + "Etag": [ + "kBb2q/TXQouTqfW3v5aFiw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P3U7CQBCF32W8hYg/KGnChWhBMFGoNZgYY5btdClsd0p3Cmka3p0peDV7Zr85c6aBbeYSCGCVmV2FZX1lkBftI0JfWfZSCnIeoQPIygi5Ha1ud9fx94KqeJcu7/Z9Nc4Ow6EQXq8xVxA0kGZoEw/BTwNO5Shjae9PCK6LVkzf43ASRtLIKWkbUTgPn+LwBY6/xw5saBVhiiU6ja1bUdIGNU/boH5N1ta5ct0Ec+oyeobzxPl39sFjni0ng4c3ow2rvaG+G/j4vngUypJWnJET8OsTZBETKxvRQZLCDfzrUS2m85I0eo+tae+y4JnywiJLIi4r7IBWcu5rxhd9PAEztHpkSwEAAA==" + } + }, + { + "ID": "f09f28a519a32404", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon4f59f3e19b756a1352a60f40b3244629dfa80066/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:50 GMT" + ], + "Etag": [ + "XMGvErQA4Dp2KEqRxois0Q==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8pH+LqXuRYFOpq4FBh5uxYGVeRnFhsE2toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsA5KxtSAIABJyG7JtAAAA" + } + }, + { + "ID": "b62f7db097175712", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "263" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0ID8iLCJxdWVyeVBhcmFtZXRlcnMiOlt7InBhcmFtZXRlclR5cGUiOnsiYXJyYXlUeXBlIjp7InR5cGUiOiJJTlQ2NCJ9LCJ0eXBlIjoiQVJSQVkifSwicGFyYW1ldGVyVmFsdWUiOnt9fV0sInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiOWF3YWYxOG9tdlFVc0VmNzg2cktQOFRDUmhiIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:50 GMT" + ], + "Etag": [ + "TYR97vVaSU1rY96U1YKOTg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "2771beb89e47e29d", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/9awaf18omvQUsEf786rKP8TCRhb?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:51 GMT" + ], + "Etag": [ + "FbDhsCoKhszX5g/h5bhc0w==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2PQU/DMAyF/4u5bqI7DEqlHaArME1CXdkkJIRQmrpNR1KXxqMq0/477sbJec7n5+cjfNVNARHkdfV9wG64qpA34yNDf7DspbTUeIQJIKtKyMd8aXxMa+N/3+bVtZnnRgf9YiGE1wadgugIZY228BC9H6FRDmWsDD6F4KEdxeplmzwlmTQcFWMjS9Lkfpss4fRxmsCe8gxL7LDROLq1He1R82oM6g1ZOzjVTAt0NGX0DOeJ8++d6lU5C8n9bHY+KW/Dm26dhts4M7lQlrTimhoBd68gi5hY2Yx6SQoz+NcPg5imHWn0HkfT4LIgJtdaZEnE3QEnoJWc+1zzRZ/+ABdSCCJLAQAA" + } + }, + { + "ID": "e1eacc9e1eae0fd9", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon4f59f3e19b756a1352a60f40b3244629dfa80066/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:51 GMT" + ], + "Etag": [ + "XMGvErQA4Dp2KEqRxois0Q==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8pH+LqXuRYFOpq4FBh5uxYGVeRnFhsE2toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsA5KxtSAIABJyG7JtAAAA" + } + }, + { + "ID": "52443880e5aa7f66", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "306" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0ID8iLCJxdWVyeVBhcmFtZXRlcnMiOlt7InBhcmFtZXRlclR5cGUiOnsiYXJyYXlUeXBlIjp7InR5cGUiOiJJTlQ2NCJ9LCJ0eXBlIjoiQVJSQVkifSwicGFyYW1ldGVyVmFsdWUiOnsiYXJyYXlWYWx1ZXMiOlt7InZhbHVlIjoiMSJ9LHsidmFsdWUiOiIyIn1dfX1dLCJ1c2VMZWdhY3lTcWwiOmZhbHNlfX0sImpvYlJlZmVyZW5jZSI6eyJqb2JJZCI6IlZVNUpFZlF1djZtbTExRG5yQ0NUZG1wSW9oMCIsInByb2plY3RJZCI6InNob2xseW1hbi1kZW1vLXRlc3QifX0K" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:51 GMT" + ], + "Etag": [ + "DFxiWD3VE5yL5v2SaXc84g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "3a3480f8d2c037db", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/VU5JEfQuv6mm11DnrCCTdmpIoh0?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:51 GMT" + ], + "Etag": [ + "P7gJM2ZXkJanhvgVvKeKLA==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2P3U7CQBCF32W8haQ1UZMmXCA02qKmVCBGY8zSTn9gd6d2p5iG8O5MwavZM/vNmTNH2Nc2hwC2dfnbYdvflMjL4ZGi6zQ7KQ1ZhzACZFUKmTyU8evt58c+VrY6lJvDAhcv08lECJdVaBQERyhq1LmD4OsIVhmUscL7EYL7ZhDR2yp8ClNpGMqHRhom4XQVzuH0fRrBjrYpFtiizXBwa1raYcbRENRVpHVvlB3naGjM6BguE5ffzfouDotld7g3xvfntp3NVrlpIqo8oTRlimuyAq7fQRYxsdIp/UlS8OFfP/ZimrSUoXM4mHrXBTMyjUaWRNx2OIJMybnPNV/16Qzg0yrpSwEAAA==" + } + }, + { + "ID": "030c304dc9962fb7", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anonad442fd459404ef3565cfbdc1258c83b15135c95/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:51 GMT" + ], + "Etag": [ + "keCPj8S1SB83nf2ROL+02Q==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8pnpzoHZFkEGwY7WRjnpRkF+ftoGxgF2toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsg5FAyVodCMtIqTYWDAEND7H5gAAAAA==" + } + }, + { + "ID": "5c4e2ebd964638e4", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "320" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "eyJjb25maWd1cmF0aW9uIjp7InF1ZXJ5Ijp7InF1ZXJ5Ijoic2VsZWN0ID8iLCJxdWVyeVBhcmFtZXRlcnMiOlt7InBhcmFtZXRlclR5cGUiOnsiYXJyYXlUeXBlIjp7InR5cGUiOiJJTlQ2NCJ9LCJ0eXBlIjoiQVJSQVkifSwicGFyYW1ldGVyVmFsdWUiOnsiYXJyYXlWYWx1ZXMiOlt7InZhbHVlIjoiMSJ9LHsidmFsdWUiOiIyIn0seyJ2YWx1ZSI6IjMifV19fV0sInVzZUxlZ2FjeVNxbCI6ZmFsc2V9fSwiam9iUmVmZXJlbmNlIjp7ImpvYklkIjoiMTZNM245N2s1RGZFRk5mNHpJVkRBZnZZYzJBIiwicHJvamVjdElkIjoic2hvbGx5bWFuLWRlbW8tdGVzdCJ9fQo=" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:51 GMT" + ], + "Etag": [ + "X7KE3isjmU5IxoYG2YFYfw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "5a47e386a7eae691", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/16M3n97k5DfEFNf4zIVDAfvYc2A?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:52 GMT" + ], + "Etag": [ + "xGEDkgBfSBl/3L2yU+MS8g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/y2Pb0/CMBDGv8v50hER/EvCi+EqLhGCG5gYY0zprmPQtXO9iXPhu9uCr3rP3e957trBrtAZjGBd5F8N1u1ZjvTiiwRto8i6pzLaIgSAxHNH/kxZtMsnMp2oi+HzoF2dz9K7fDx2hBUbLDmMOpAFqszC6L0DzUt0Ntn/dAS1lRfxfMmmLHGN0mS+kbAFC5csgsPHIYCtWScosUYt0KdVtdmioNgfajdGqbbkupdhaXqEluDoOE4vb2ZDfX+7u44ke5zLq9/4NQrl95sYhI5SRnAqjHbgKgW3iAxxlZi99Vb415PWhS5qI9Ba9KH904IHU1YKyV1EdYMBCO6++1TQSR/+AAfbSLNLAQAA" + } + }, + { + "ID": "986beca3fe39d9fd", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon89f7883f77f7aa85f5e03fa1ae69e15cb0010cb3/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:52 GMT" + ], + "Etag": [ + "LHZFxu922mSUaKCBjDxSrw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8r7eES5VZRaGhnlBocmejs7ZblUBBeV29oCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsg5FAyVodCMsIzjJWqo0FQwAcBa/eigAAAA==" + } + }, + { + "ID": "bb7f4edc4eb2d02d", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "479" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "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" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:52 GMT" + ], + "Etag": [ + "Zl+mHqWn77oDgku5vunTDg==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "4f13da0ba6e72fdb", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/EtxykGiWQ677Zo19GY0y9NzobLd?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:52 GMT" + ], + "Etag": [ + "2tMOGKxq63ABYb80uEfdKw==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/52R3W6CQBCF32V6qwm2iVYTL0AJNVKoq6axTdPwMygKLLJDFI3v3kGb2qRe9Wr3zJ5vzu7sETZxFkIP/Hi5LbGo7pZIk3ojUJUJKV5ymSmEBiB5S3be07Nrjffb9oNuLPxHrTSjcLzr99mhghWmHvSOEMWYhAp670fIvBQZi7RPdlCV10KYA1cMWacyrLUzt23dsE2u/CX1KzdyZqZlihvgqfHjN/6ZM7xy05kYOdatmI9fQYMrYLiuberObYIZWEtfYIQFZgHWA8oLucaARvXs1UomSZV6WTPEVDYJFcGZOJ+atK82Vvw6aXc6b7LVtRZa1XUO0rdDdiUy8CiWGRvnU54CkCQvEXLHT4MWfGuj4qYvhQxQKaybapeAgUzzBIlvREWJDQg8/sGnmC769AUxgzMlHgIAAA==" + } + }, + { + "ID": "d43a86b182fa0a5a", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon7be0f48e144b0012fae211ed3f67358e09e2d9b7/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:53 GMT" + ], + "Etag": [ + "V7Aakxx6AhoQyiqKGgo/ZQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qHmTsmZldUmDlm5AdWZhZ6u6fn60cF2toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsU7JCYioZKNXqgFl5pTk5UKZSWmJOcapSbWwtEMXWAgCp0n0BlQAAAA==" + } + }, + { + "ID": "da88ba321321ed32", + "Request": { + "Method": "POST", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/jobs?alt=json\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "Content-Length": [ + "512" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "application/json", + "BodyParts": [ + "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" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:53 GMT" + ], + "Etag": [ + "hbSgf88BeEZ4A822HbEonQ==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "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" + } + }, + { + "ID": "408a63203fe397cd", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/queries/49Ws9SZvEnRqPqnx5ZWebZowzbd?alt=json\u0026location=US\u0026maxResults=0\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:53 GMT" + ], + "Etag": [ + "JJEbugGSziw3aFKmS0o17g==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/52RUU/CMBSF/8v1FRKIGgMJDwwqgsvADkKCMabbLmPYtWPtxEH479yBERN58qk9t+e7p73dw0eiImhDkMSbAvPyJkb7Um04mkJaQ0umlUGoAVoRk3M0YkERD/xdsr0Vj8+p39DNh7jTIYcJV5gKaO9hmaCMDLRf96BEioQtG+/ksGVWCc56Y94nneqo0t7MdbuOy6jyl+xeuKE3ZQPGr4CH2o/f+WdO/8L5Uz70Btdi3n4F9S6AMx67rOtdJ4iBtQ44LjFHFWI1oCzXawztsJq9WWkpy1SoeoSprls0Fk7E6fSuNTctf/HJFN9MNurrfjHHYKG3uyAil9ShsIlWZJz5NAWw2grJ9ZaeBk341k5JTSe5DtEYrJo2zgE9nWYSLd3I5gXWIBT0g0+JPevDEaR8u+weAgAA" + } + }, + { + "ID": "d92e7008dce6c785", + "Request": { + "Method": "GET", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/_bee276bd951141f66558a174939c9d542c3e203a/tables/anon0306e609b037a05a3170a9815efc1f487617e9ed/data?alt=json\u0026prettyPrint=false\u0026startIndex=0", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:53 GMT" + ], + "Etag": [ + "VTPvXen4e+jVq/SXL1Lb7Q==" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6tWys7MS1GyUkrKTC8sTS2qVC5JTMpJdUksSfTJLC5R0lFKLUlMB8qHhQSURaTmmaRqZ4UV6gdH+Bj6JJkH2toCVZTklyTmBOWXFwOVGQL5RWBmdLVSGpgsU7JCYgJV1OpgCBYr1cbWQsWVSopKU8H8WCAEAFj4RHChAAAA" + } + }, + { + "ID": "9a3be072efb53ccb", + "Request": { + "Method": "DELETE", + "URL": "https://bigquery.googleapis.com/bigquery/v2/projects/shollyman-demo-test/datasets/dataset_20191028_66906590093659_0001?alt=json\u0026deleteContents=true\u0026prettyPrint=false", + "Header": { + "Accept-Encoding": [ + "gzip" + ], + "User-Agent": [ + "google-api-go-client/0.5" + ] + }, + "MediaType": "", + "BodyParts": [ + "" + ] + }, + "Response": { + "StatusCode": 200, + "Proto": "HTTP/1.1", + "ProtoMajor": 1, + "ProtoMinor": 1, + "Header": { + "Cache-Control": [ + "private" + ], + "Content-Encoding": [ + "gzip" + ], + "Content-Type": [ + "application/json; charset=UTF-8" + ], + "Date": [ + "Mon, 28 Oct 2019 18:37:54 GMT" + ], + "Server": [ + "ESF" + ], + "Vary": [ + "Origin", + "X-Origin", + "Referer" + ], + "X-Content-Type-Options": [ + "nosniff" + ], + "X-Frame-Options": [ + "SAMEORIGIN" + ], + "X-Xss-Protection": [ + "0" + ] + }, + "Body": "H4sIAAAAAAAC/6uuBQBDv6ajAgAAAA==" + } + } + ] +} \ No newline at end of file diff --git a/vendor/cloud.google.com/go/bigquery/copy.go b/vendor/cloud.google.com/go/bigquery/copy.go new file mode 100644 index 000000000000..c8e7e1234f28 --- /dev/null +++ b/vendor/cloud.google.com/go/bigquery/copy.go @@ -0,0 +1,152 @@ +// Copyright 2016 Google LLC +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +package bigquery + +import ( + "context" + "time" + + bq "google.golang.org/api/bigquery/v2" +) + +// TableCopyOperationType is used to indicate the type of operation performed by a BigQuery +// copy job. +type TableCopyOperationType string + +var ( + // CopyOperation indicates normal table to table copying. + CopyOperation TableCopyOperationType = "COPY" + // SnapshotOperation indicates creating a snapshot from a regular table, which + // operates as an immutable copy. + SnapshotOperation TableCopyOperationType = "SNAPSHOT" + // RestoreOperation indicates creating/restoring a table from a snapshot. + RestoreOperation TableCopyOperationType = "RESTORE" + // CloneOperation indicates creating a table clone, which creates a writeable + // copy of a base table that is billed based on difference from the base table. + CloneOperation TableCopyOperationType = "CLONE" +) + +// CopyConfig holds the configuration for a copy job. +type CopyConfig struct { + // Srcs are the tables from which data will be copied. + Srcs []*Table + + // Dst is the table into which the data will be copied. + Dst *Table + + // CreateDisposition specifies the circumstances under which the destination table will be created. + // The default is CreateIfNeeded. + CreateDisposition TableCreateDisposition + + // WriteDisposition specifies how existing data in the destination table is treated. + // The default is WriteEmpty. + WriteDisposition TableWriteDisposition + + // The labels associated with this job. + Labels map[string]string + + // Custom encryption configuration (e.g., Cloud KMS keys). + DestinationEncryptionConfig *EncryptionConfig + + // One of the supported operation types when executing a Table Copy jobs. By default this + // copies tables, but can also be set to perform snapshot or restore operations. + OperationType TableCopyOperationType + + // Sets a best-effort deadline on a specific job. If job execution exceeds this + // timeout, BigQuery may attempt to cancel this work automatically. + // + // This deadline cannot be adjusted or removed once the job is created. Consider + // using Job.Cancel in situations where you need more dynamic behavior. + // + // Experimental: this option is experimental and may be modified or removed in future versions, + // regardless of any other documented package stability guarantees. + JobTimeout time.Duration + + // The reservation that job would use. User can specify a reservation to + // execute the job. If reservation is not set, reservation is determined + // based on the rules defined by the reservation assignments. The expected + // format is + // `projects/{project}/locations/{location}/reservations/{reservation}`. + Reservation string +} + +func (c *CopyConfig) toBQ() *bq.JobConfiguration { + var ts []*bq.TableReference + for _, t := range c.Srcs { + ts = append(ts, t.toBQ()) + } + return &bq.JobConfiguration{ + Labels: c.Labels, + Copy: &bq.JobConfigurationTableCopy{ + CreateDisposition: string(c.CreateDisposition), + WriteDisposition: string(c.WriteDisposition), + DestinationTable: c.Dst.toBQ(), + DestinationEncryptionConfiguration: c.DestinationEncryptionConfig.toBQ(), + SourceTables: ts, + OperationType: string(c.OperationType), + }, + JobTimeoutMs: c.JobTimeout.Milliseconds(), + Reservation: c.Reservation, + } +} + +func bqToCopyConfig(q *bq.JobConfiguration, c *Client) *CopyConfig { + cc := &CopyConfig{ + Labels: q.Labels, + CreateDisposition: TableCreateDisposition(q.Copy.CreateDisposition), + WriteDisposition: TableWriteDisposition(q.Copy.WriteDisposition), + Dst: bqToTable(q.Copy.DestinationTable, c), + DestinationEncryptionConfig: bqToEncryptionConfig(q.Copy.DestinationEncryptionConfiguration), + OperationType: TableCopyOperationType(q.Copy.OperationType), + JobTimeout: time.Duration(q.JobTimeoutMs) * time.Millisecond, + Reservation: q.Reservation, + } + for _, t := range q.Copy.SourceTables { + cc.Srcs = append(cc.Srcs, bqToTable(t, c)) + } + return cc +} + +// A Copier copies data into a BigQuery table from one or more BigQuery tables. +type Copier struct { + JobIDConfig + CopyConfig + c *Client +} + +// CopierFrom returns a Copier which can be used to copy data into a +// BigQuery table from one or more BigQuery tables. +// The returned Copier may optionally be further configured before its Run method is called. +func (t *Table) CopierFrom(srcs ...*Table) *Copier { + return &Copier{ + c: t.c, + CopyConfig: CopyConfig{ + Srcs: srcs, + Dst: t, + }, + } +} + +// Run initiates a copy job. +func (c *Copier) Run(ctx context.Context) (*Job, error) { + return c.c.insertJob(ctx, c.newJob(), nil) +} + +func (c *Copier) newJob() *bq.Job { + return &bq.Job{ + JobReference: c.JobIDConfig.createJobRef(c.c), + Configuration: c.CopyConfig.toBQ(), + } +} diff --git a/vendor/cloud.google.com/go/bigquery/dataset.go b/vendor/cloud.google.com/go/bigquery/dataset.go new file mode 100644 index 000000000000..b0032a74afbc --- /dev/null +++ b/vendor/cloud.google.com/go/bigquery/dataset.go @@ -0,0 +1,1195 @@ +// Copyright 2015 Google LLC +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +package bigquery + +import ( + "context" + "errors" + "fmt" + "strings" + "time" + + "cloud.google.com/go/internal/optional" + "cloud.google.com/go/internal/trace" + bq "google.golang.org/api/bigquery/v2" + "google.golang.org/api/iterator" +) + +// Dataset is a reference to a BigQuery dataset. +type Dataset struct { + ProjectID string + DatasetID string + c *Client +} + +// DatasetMetadata contains information about a BigQuery dataset. +type DatasetMetadata struct { + // These fields can be set when creating a dataset. + Name string // The user-friendly name for this dataset. + Description string // The user-friendly description of this dataset. + Location string // The geo location of the dataset. + DefaultTableExpiration time.Duration // The default expiration time for new tables. + Labels map[string]string // User-provided labels. + Access []*AccessEntry // Access permissions. + DefaultEncryptionConfig *EncryptionConfig + + // DefaultPartitionExpiration is the default expiration time for + // all newly created partitioned tables in the dataset. + DefaultPartitionExpiration time.Duration + + // Defines the default collation specification of future tables + // created in the dataset. If a table is created in this dataset without + // table-level default collation, then the table inherits the dataset default + // collation, which is applied to the string fields that do not have explicit + // collation specified. A change to this field affects only tables created + // afterwards, and does not alter the existing tables. + // More information: https://cloud.google.com/bigquery/docs/reference/standard-sql/collation-concepts + DefaultCollation string + + // For externally defined datasets, contains information about the configuration. + ExternalDatasetReference *ExternalDatasetReference + + // MaxTimeTravel represents the number of hours for the max time travel for all tables + // in the dataset. Durations are rounded towards zero for the nearest hourly value. + MaxTimeTravel time.Duration + + // Storage billing model to be used for all tables in the dataset. + // Can be set to PHYSICAL. Default is LOGICAL. + // Once you create a dataset with storage billing model set to physical bytes, you can't change it back to using logical bytes again. + // More details: https://cloud.google.com/bigquery/docs/datasets-intro#dataset_storage_billing_models + StorageBillingModel string + + // These fields are read-only. + CreationTime time.Time + LastModifiedTime time.Time // When the dataset or any of its tables were modified. + FullID string // The full dataset ID in the form projectID:datasetID. + + // The tags associated with this dataset. Tag keys are + // globally unique, and managed via the resource manager API. + // More information: https://cloud.google.com/resource-manager/docs/tags/tags-overview + Tags []*DatasetTag + + // TRUE if the dataset and its table names are case-insensitive, otherwise + // FALSE. By default, this is FALSE, which means the dataset and its table + // names are case-sensitive. This field does not affect routine references. + IsCaseInsensitive bool + + // ETag is the ETag obtained when reading metadata. Pass it to Dataset.Update to + // ensure that the metadata hasn't changed since it was read. + ETag string +} + +// DatasetTag is a representation of a single tag key/value. +type DatasetTag struct { + // TagKey is the namespaced friendly name of the tag key, e.g. + // "12345/environment" where 12345 is org id. + TagKey string + + // TagValue is the friendly short name of the tag value, e.g. + // "production". + TagValue string +} + +const ( + // LogicalStorageBillingModel indicates billing for logical bytes. + LogicalStorageBillingModel = "" + + // PhysicalStorageBillingModel indicates billing for physical bytes. + PhysicalStorageBillingModel = "PHYSICAL" +) + +func bqToDatasetTag(in *bq.DatasetTags) *DatasetTag { + if in == nil { + return nil + } + return &DatasetTag{ + TagKey: in.TagKey, + TagValue: in.TagValue, + } +} + +// DatasetMetadataToUpdate is used when updating a dataset's metadata. +// Only non-nil fields will be updated. +type DatasetMetadataToUpdate struct { + Description optional.String // The user-friendly description of this table. + Name optional.String // The user-friendly name for this dataset. + + // DefaultTableExpiration is the default expiration time for new tables. + // If set to time.Duration(0), new tables never expire. + DefaultTableExpiration optional.Duration + + // DefaultTableExpiration is the default expiration time for + // all newly created partitioned tables. + // If set to time.Duration(0), new table partitions never expire. + DefaultPartitionExpiration optional.Duration + + // DefaultEncryptionConfig defines CMEK settings for new resources created + // in the dataset. + DefaultEncryptionConfig *EncryptionConfig + + // Defines the default collation specification of future tables + // created in the dataset. + DefaultCollation optional.String + + // For externally defined datasets, contains information about the configuration. + ExternalDatasetReference *ExternalDatasetReference + + // MaxTimeTravel represents the number of hours for the max time travel for all tables + // in the dataset. Durations are rounded towards zero for the nearest hourly value. + MaxTimeTravel optional.Duration + + // Storage billing model to be used for all tables in the dataset. + // Can be set to PHYSICAL. Default is LOGICAL. + // Once you change a dataset's storage billing model to use physical bytes, you can't change it back to using logical bytes again. + // More details: https://cloud.google.com/bigquery/docs/datasets-intro#dataset_storage_billing_models + StorageBillingModel optional.String + + // The entire access list. It is not possible to replace individual entries. + Access []*AccessEntry + + // TRUE if the dataset and its table names are case-insensitive, otherwise + // FALSE. By default, this is FALSE, which means the dataset and its table + // names are case-sensitive. This field does not affect routine references. + IsCaseInsensitive optional.Bool + + labelUpdater +} + +// Dataset creates a handle to a BigQuery dataset in the client's project. +func (c *Client) Dataset(id string) *Dataset { + return c.DatasetInProject(c.projectID, id) +} + +// DatasetInProject creates a handle to a BigQuery dataset in the specified project. +func (c *Client) DatasetInProject(projectID, datasetID string) *Dataset { + return &Dataset{ + ProjectID: projectID, + DatasetID: datasetID, + c: c, + } +} + +// Identifier returns the ID of the dataset in the requested format. +// +// For Standard SQL format, the identifier will be quoted if the +// ProjectID contains dash (-) characters. +func (d *Dataset) Identifier(f IdentifierFormat) (string, error) { + switch f { + case LegacySQLID: + return fmt.Sprintf("%s:%s", d.ProjectID, d.DatasetID), nil + case StandardSQLID: + // Quote project identifiers if they have a dash character. + if strings.Contains(d.ProjectID, "-") { + return fmt.Sprintf("`%s`.%s", d.ProjectID, d.DatasetID), nil + } + return fmt.Sprintf("%s.%s", d.ProjectID, d.DatasetID), nil + default: + return "", ErrUnknownIdentifierFormat + } +} + +// Create creates a dataset in the BigQuery service. +// +// An error will be returned if the dataset already exists. +// Pass in a DatasetMetadata value to configure the dataset. +func (d *Dataset) Create(ctx context.Context, md *DatasetMetadata) (err error) { + return d.CreateWithOptions(ctx, md) +} + +// CreateWithOptions creates a dataset in the BigQuery service, and +// provides additional options to control the behavior of the call. +// +// An error will be returned if the dataset already exists. +// Pass in a DatasetMetadata value to configure the dataset. +func (d *Dataset) CreateWithOptions(ctx context.Context, md *DatasetMetadata, opts ...DatasetOption) (err error) { + ctx = trace.StartSpan(ctx, "cloud.google.com/go/bigquery.Dataset.Create") + defer func() { trace.EndSpan(ctx, err) }() + + cOpt := &dsCallOption{} + for _, o := range opts { + o(cOpt) + } + + ds, err := md.toBQ() + if err != nil { + return err + } + ds.DatasetReference = &bq.DatasetReference{DatasetId: d.DatasetID} + // Use Client.Location as a default. + if ds.Location == "" { + ds.Location = d.c.Location + } + call := d.c.bqs.Datasets.Insert(d.ProjectID, ds).Context(ctx) + setClientHeader(call.Header()) + if cOpt.accessPolicyVersion != nil { + call.AccessPolicyVersion(int64(optional.ToInt(cOpt.accessPolicyVersion))) + } + _, err = call.Do() + return err +} + +func (dm *DatasetMetadata) toBQ() (*bq.Dataset, error) { + ds := &bq.Dataset{} + if dm == nil { + return ds, nil + } + ds.FriendlyName = dm.Name + ds.Description = dm.Description + ds.Location = dm.Location + ds.DefaultTableExpirationMs = int64(dm.DefaultTableExpiration / time.Millisecond) + ds.DefaultPartitionExpirationMs = int64(dm.DefaultPartitionExpiration / time.Millisecond) + ds.DefaultCollation = dm.DefaultCollation + ds.MaxTimeTravelHours = int64(dm.MaxTimeTravel / time.Hour) + ds.StorageBillingModel = string(dm.StorageBillingModel) + ds.IsCaseInsensitive = dm.IsCaseInsensitive + ds.Labels = dm.Labels + var err error + ds.Access, err = accessListToBQ(dm.Access) + if err != nil { + return nil, err + } + if !dm.CreationTime.IsZero() { + return nil, errors.New("bigquery: Dataset.CreationTime is not writable") + } + if !dm.LastModifiedTime.IsZero() { + return nil, errors.New("bigquery: Dataset.LastModifiedTime is not writable") + } + if dm.FullID != "" { + return nil, errors.New("bigquery: Dataset.FullID is not writable") + } + if dm.ETag != "" { + return nil, errors.New("bigquery: Dataset.ETag is not writable") + } + if dm.DefaultEncryptionConfig != nil { + ds.DefaultEncryptionConfiguration = dm.DefaultEncryptionConfig.toBQ() + } + if dm.ExternalDatasetReference != nil { + ds.ExternalDatasetReference = dm.ExternalDatasetReference.toBQ() + } + return ds, nil +} + +func accessListToBQ(a []*AccessEntry) ([]*bq.DatasetAccess, error) { + var q []*bq.DatasetAccess + for _, e := range a { + a, err := e.toBQ() + if err != nil { + return nil, err + } + q = append(q, a) + } + return q, nil +} + +// Delete deletes the dataset. Delete will fail if the dataset is not empty. +func (d *Dataset) Delete(ctx context.Context) (err error) { + return d.deleteInternal(ctx, false) +} + +// DeleteWithContents deletes the dataset, as well as contained resources. +func (d *Dataset) DeleteWithContents(ctx context.Context) (err error) { + return d.deleteInternal(ctx, true) +} + +func (d *Dataset) deleteInternal(ctx context.Context, deleteContents bool) (err error) { + ctx = trace.StartSpan(ctx, "cloud.google.com/go/bigquery.Dataset.Delete") + defer func() { trace.EndSpan(ctx, err) }() + + call := d.c.bqs.Datasets.Delete(d.ProjectID, d.DatasetID).Context(ctx).DeleteContents(deleteContents) + setClientHeader(call.Header()) + return runWithRetry(ctx, func() (err error) { + sCtx := trace.StartSpan(ctx, "bigquery.datasets.delete") + err = call.Do() + trace.EndSpan(sCtx, err) + return err + }) +} + +// Metadata fetches the metadata for the dataset. +func (d *Dataset) Metadata(ctx context.Context) (md *DatasetMetadata, err error) { + return d.MetadataWithOptions(ctx) +} + +// MetadataWithOptions fetches metadata for the dataset, and provides additional options for +// controlling the request. +func (d *Dataset) MetadataWithOptions(ctx context.Context, opts ...DatasetOption) (md *DatasetMetadata, err error) { + ctx = trace.StartSpan(ctx, "cloud.google.com/go/bigquery.Dataset.Metadata") + defer func() { trace.EndSpan(ctx, err) }() + + cOpt := &dsCallOption{} + for _, o := range opts { + o(cOpt) + } + + call := d.c.bqs.Datasets.Get(d.ProjectID, d.DatasetID).Context(ctx) + setClientHeader(call.Header()) + if cOpt.accessPolicyVersion != nil { + call.AccessPolicyVersion(int64(optional.ToInt(cOpt.accessPolicyVersion))) + } + if cOpt.datasetView != nil { + call.DatasetView(optional.ToString(cOpt.datasetView)) + } + + var ds *bq.Dataset + if err := runWithRetry(ctx, func() (err error) { + sCtx := trace.StartSpan(ctx, "bigquery.datasets.get") + ds, err = call.Do() + trace.EndSpan(sCtx, err) + return err + }); err != nil { + return nil, err + } + return bqToDatasetMetadata(ds, d.c) +} + +// dsCallOption provides a general option holder for dataset RPCs +type dsCallOption struct { + accessPolicyVersion optional.Int + datasetView optional.String + updateMode optional.String +} + +// DatasetOption provides an option type for customizing requests against the Dataset +// service. +type DatasetOption func(*dsCallOption) + +// WithAccessPolicyVersion is an option that enabled setting of the Access Policy Version for a request +// where appropriate. Valid values are 0, 1, and 3. +// +// Requests specifying an invalid value will be rejected. +// Requests for conditional access policy binding in datasets must specify version 3. +// +// Dataset with no conditional role bindings in access policy may specify any valid value +// or leave the field unset. +// +// This field will be mapped to [IAM Policy version] (https://cloud.google.com/iam/docs/policies#versions) +// and will be used to fetch policy from IAM. If unset or if 0 or 1 value is used for +// dataset with conditional bindings, access entry with condition will have role string +// appended by 'withcond' string followed by a hash value. +// +// Please refer https://cloud.google.com/iam/docs/troubleshooting-withcond for more details. +func WithAccessPolicyVersion(apv int) DatasetOption { + return func(o *dsCallOption) { + o.accessPolicyVersion = apv + } +} + +// DatasetView specifies which details about a dataset are desired. +type DatasetView string + +const ( + // DatasetMetadataView populates metadata information for the dataset, + // such as friendlyName, description, labels, etc. + DatasetMetadataView DatasetView = "METADATA" + + // DatasetACLView populates information for the dataset, which defines + // dataset access for one or more entities. + DatasetACLView DatasetView = "ACL" + + // DatasetFullView populates both dataset metadata and ACL information. + DatasetFullView DatasetView = "FULL" + + // UnspecifiedDatasetView is the default value, which will be treated as DatasetFullView + UnspecifiedDatasetView DatasetView = "DATASET_VIEW_UNSPECIFIED" +) + +// WithDatasetView specifies the view that determines which dataset information +// is returned. By default, metadata and ACL information are returned. +func WithDatasetView(view DatasetView) DatasetOption { + return func(o *dsCallOption) { + o.datasetView = string(view) + } +} + +// DatasetUpdateMode specifies which fields of a dataset are going to be affected +// by update/patch operations. +type DatasetUpdateMode string + +const ( + // DatasetMetadataUpdateMode targets metadata information for the dataset, + // such as friendlyName, description, labels, etc. + DatasetMetadataUpdateMode DatasetUpdateMode = "UPDATE_METADATA" + + // DatasetACLUpdateMode targets ACL information for the dataset, + // which defines dataset access for one or more entities. + DatasetACLUpdateMode DatasetUpdateMode = "UPDATE_ACL" + + // DatasetFullUpdateMode targets both dataset metadata and ACL + // information on update operations. + DatasetFullUpdateMode DatasetUpdateMode = "UPDATE_FULL" + + // UnspecifiedDatasetUpdateMode is the default value, which will be treated as DatasetFullUpdateMode + UnspecifiedDatasetUpdateMode DatasetUpdateMode = "UPDATE_MODE_UNSPECIFIED" +) + +// WithUpdateMode specifies the fields of dataset that the update/patch +// operation is targeting. By default, both metadata and ACL fields are updated. +func WithUpdateMode(mode DatasetUpdateMode) DatasetOption { + return func(o *dsCallOption) { + o.updateMode = string(mode) + } +} + +func bqToDatasetMetadata(d *bq.Dataset, c *Client) (*DatasetMetadata, error) { + dm := &DatasetMetadata{ + CreationTime: unixMillisToTime(d.CreationTime), + LastModifiedTime: unixMillisToTime(d.LastModifiedTime), + DefaultTableExpiration: time.Duration(d.DefaultTableExpirationMs) * time.Millisecond, + DefaultPartitionExpiration: time.Duration(d.DefaultPartitionExpirationMs) * time.Millisecond, + DefaultCollation: d.DefaultCollation, + ExternalDatasetReference: bqToExternalDatasetReference(d.ExternalDatasetReference), + MaxTimeTravel: time.Duration(d.MaxTimeTravelHours) * time.Hour, + StorageBillingModel: d.StorageBillingModel, + DefaultEncryptionConfig: bqToEncryptionConfig(d.DefaultEncryptionConfiguration), + Description: d.Description, + Name: d.FriendlyName, + FullID: d.Id, + Location: d.Location, + Labels: d.Labels, + IsCaseInsensitive: d.IsCaseInsensitive, + ETag: d.Etag, + } + for _, a := range d.Access { + e, err := bqToAccessEntry(a, c) + if err != nil { + return nil, err + } + dm.Access = append(dm.Access, e) + } + for _, bqTag := range d.Tags { + tag := bqToDatasetTag(bqTag) + if tag != nil { + dm.Tags = append(dm.Tags, tag) + } + } + return dm, nil +} + +// Update modifies specific Dataset metadata fields. +// To perform a read-modify-write that protects against intervening reads, +// set the etag argument to the DatasetMetadata.ETag field from the read. +// Pass the empty string for etag for a "blind write" that will always succeed. +func (d *Dataset) Update(ctx context.Context, dm DatasetMetadataToUpdate, etag string) (md *DatasetMetadata, err error) { + return d.UpdateWithOptions(ctx, dm, etag) +} + +// UpdateWithOptions modifies specific Dataset metadata fields and +// provides an interface for specifying additional options to the request. +// +// To perform a read-modify-write that protects against intervening reads, +// set the etag argument to the DatasetMetadata.ETag field from the read. +// Pass the empty string for etag for a "blind write" that will always succeed. +func (d *Dataset) UpdateWithOptions(ctx context.Context, dm DatasetMetadataToUpdate, etag string, opts ...DatasetOption) (md *DatasetMetadata, err error) { + ctx = trace.StartSpan(ctx, "cloud.google.com/go/bigquery.Dataset.Update") + defer func() { trace.EndSpan(ctx, err) }() + + cOpt := &dsCallOption{} + for _, o := range opts { + o(cOpt) + } + ds, err := dm.toBQ() + if err != nil { + return nil, err + } + + call := d.c.bqs.Datasets.Patch(d.ProjectID, d.DatasetID, ds).Context(ctx) + setClientHeader(call.Header()) + if etag != "" { + call.Header().Set("If-Match", etag) + } + if cOpt.accessPolicyVersion != nil { + call.AccessPolicyVersion(int64(optional.ToInt(cOpt.accessPolicyVersion))) + } + if cOpt.updateMode != nil { + call.UpdateMode(optional.ToString(cOpt.updateMode)) + } + + var ds2 *bq.Dataset + if err := runWithRetry(ctx, func() (err error) { + sCtx := trace.StartSpan(ctx, "bigquery.datasets.patch") + ds2, err = call.Do() + trace.EndSpan(sCtx, err) + return err + }); err != nil { + return nil, err + } + return bqToDatasetMetadata(ds2, d.c) +} + +func (dm *DatasetMetadataToUpdate) toBQ() (*bq.Dataset, error) { + ds := &bq.Dataset{} + forceSend := func(field string) { + ds.ForceSendFields = append(ds.ForceSendFields, field) + } + + if dm.Description != nil { + ds.Description = optional.ToString(dm.Description) + forceSend("Description") + } + if dm.Name != nil { + ds.FriendlyName = optional.ToString(dm.Name) + forceSend("FriendlyName") + } + if dm.DefaultTableExpiration != nil { + dur := optional.ToDuration(dm.DefaultTableExpiration) + if dur == 0 { + // Send a null to delete the field. + ds.NullFields = append(ds.NullFields, "DefaultTableExpirationMs") + } else { + ds.DefaultTableExpirationMs = int64(dur / time.Millisecond) + } + } + if dm.DefaultPartitionExpiration != nil { + dur := optional.ToDuration(dm.DefaultPartitionExpiration) + if dur == 0 { + // Send a null to delete the field. + ds.NullFields = append(ds.NullFields, "DefaultPartitionExpirationMs") + } else { + ds.DefaultPartitionExpirationMs = int64(dur / time.Millisecond) + } + } + if dm.DefaultCollation != nil { + ds.DefaultCollation = optional.ToString(dm.DefaultCollation) + forceSend("DefaultCollation") + } + if dm.ExternalDatasetReference != nil { + ds.ExternalDatasetReference = dm.ExternalDatasetReference.toBQ() + forceSend("ExternalDatasetReference") + } + if dm.MaxTimeTravel != nil { + dur := optional.ToDuration(dm.MaxTimeTravel) + if dur == 0 { + // Send a null to delete the field. + ds.NullFields = append(ds.NullFields, "MaxTimeTravelHours") + } else { + ds.MaxTimeTravelHours = int64(dur / time.Hour) + } + } + if dm.StorageBillingModel != nil { + ds.StorageBillingModel = optional.ToString(dm.StorageBillingModel) + forceSend("StorageBillingModel") + } + if dm.DefaultEncryptionConfig != nil { + ds.DefaultEncryptionConfiguration = dm.DefaultEncryptionConfig.toBQ() + ds.DefaultEncryptionConfiguration.ForceSendFields = []string{"KmsKeyName"} + } + if dm.Access != nil { + var err error + ds.Access, err = accessListToBQ(dm.Access) + if err != nil { + return nil, err + } + if len(ds.Access) == 0 { + ds.NullFields = append(ds.NullFields, "Access") + } + } + if dm.IsCaseInsensitive != nil { + ds.IsCaseInsensitive = optional.ToBool(dm.IsCaseInsensitive) + forceSend("IsCaseInsensitive") + } + labels, forces, nulls := dm.update() + ds.Labels = labels + ds.ForceSendFields = append(ds.ForceSendFields, forces...) + ds.NullFields = append(ds.NullFields, nulls...) + return ds, nil +} + +// Table creates a handle to a BigQuery table in the dataset. +// To determine if a table exists, call Table.Metadata. +// If the table does not already exist, use Table.Create to create it. +func (d *Dataset) Table(tableID string) *Table { + return &Table{ProjectID: d.ProjectID, DatasetID: d.DatasetID, TableID: tableID, c: d.c} +} + +// Tables returns an iterator over the tables in the Dataset. +func (d *Dataset) Tables(ctx context.Context) *TableIterator { + it := &TableIterator{ + ctx: ctx, + dataset: d, + } + it.pageInfo, it.nextFunc = iterator.NewPageInfo( + it.fetch, + func() int { return len(it.tables) }, + func() interface{} { b := it.tables; it.tables = nil; return b }) + return it +} + +// A TableIterator is an iterator over Tables. +type TableIterator struct { + ctx context.Context + dataset *Dataset + tables []*Table + pageInfo *iterator.PageInfo + nextFunc func() error +} + +// Next returns the next result. Its second return value is Done if there are +// no more results. Once Next returns Done, all subsequent calls will return +// Done. +func (it *TableIterator) Next() (*Table, error) { + if err := it.nextFunc(); err != nil { + return nil, err + } + t := it.tables[0] + it.tables = it.tables[1:] + return t, nil +} + +// PageInfo supports pagination. See the google.golang.org/api/iterator package for details. +func (it *TableIterator) PageInfo() *iterator.PageInfo { return it.pageInfo } + +// listTables exists to aid testing. +var listTables = func(it *TableIterator, pageSize int, pageToken string) (*bq.TableList, error) { + call := it.dataset.c.bqs.Tables.List(it.dataset.ProjectID, it.dataset.DatasetID). + PageToken(pageToken). + Context(it.ctx) + setClientHeader(call.Header()) + if pageSize > 0 { + call.MaxResults(int64(pageSize)) + } + var res *bq.TableList + err := runWithRetry(it.ctx, func() (err error) { + sCtx := trace.StartSpan(it.ctx, "bigquery.tables.list") + res, err = call.Do() + trace.EndSpan(sCtx, err) + return err + }) + return res, err +} + +func (it *TableIterator) fetch(pageSize int, pageToken string) (string, error) { + res, err := listTables(it, pageSize, pageToken) + if err != nil { + return "", err + } + for _, t := range res.Tables { + it.tables = append(it.tables, bqToTable(t.TableReference, it.dataset.c)) + } + return res.NextPageToken, nil +} + +func bqToTable(tr *bq.TableReference, c *Client) *Table { + if tr == nil { + return nil + } + return &Table{ + ProjectID: tr.ProjectId, + DatasetID: tr.DatasetId, + TableID: tr.TableId, + c: c, + } +} + +// Model creates a handle to a BigQuery model in the dataset. +// To determine if a model exists, call Model.Metadata. +// If the model does not already exist, you can create it via execution +// of a CREATE MODEL query. +func (d *Dataset) Model(modelID string) *Model { + return &Model{ProjectID: d.ProjectID, DatasetID: d.DatasetID, ModelID: modelID, c: d.c} +} + +// Models returns an iterator over the models in the Dataset. +func (d *Dataset) Models(ctx context.Context) *ModelIterator { + it := &ModelIterator{ + ctx: ctx, + dataset: d, + } + it.pageInfo, it.nextFunc = iterator.NewPageInfo( + it.fetch, + func() int { return len(it.models) }, + func() interface{} { b := it.models; it.models = nil; return b }) + return it +} + +// A ModelIterator is an iterator over Models. +type ModelIterator struct { + ctx context.Context + dataset *Dataset + models []*Model + pageInfo *iterator.PageInfo + nextFunc func() error +} + +// Next returns the next result. Its second return value is Done if there are +// no more results. Once Next returns Done, all subsequent calls will return +// Done. +func (it *ModelIterator) Next() (*Model, error) { + if err := it.nextFunc(); err != nil { + return nil, err + } + t := it.models[0] + it.models = it.models[1:] + return t, nil +} + +// PageInfo supports pagination. See the google.golang.org/api/iterator package for details. +func (it *ModelIterator) PageInfo() *iterator.PageInfo { return it.pageInfo } + +// listTables exists to aid testing. +var listModels = func(it *ModelIterator, pageSize int, pageToken string) (*bq.ListModelsResponse, error) { + call := it.dataset.c.bqs.Models.List(it.dataset.ProjectID, it.dataset.DatasetID). + PageToken(pageToken). + Context(it.ctx) + setClientHeader(call.Header()) + if pageSize > 0 { + call.MaxResults(int64(pageSize)) + } + var res *bq.ListModelsResponse + err := runWithRetry(it.ctx, func() (err error) { + sCtx := trace.StartSpan(it.ctx, "bigquery.models.list") + res, err = call.Do() + trace.EndSpan(sCtx, err) + return err + }) + return res, err +} + +func (it *ModelIterator) fetch(pageSize int, pageToken string) (string, error) { + res, err := listModels(it, pageSize, pageToken) + if err != nil { + return "", err + } + for _, t := range res.Models { + it.models = append(it.models, bqToModel(t.ModelReference, it.dataset.c)) + } + return res.NextPageToken, nil +} + +func bqToModel(mr *bq.ModelReference, c *Client) *Model { + if mr == nil { + return nil + } + return &Model{ + ProjectID: mr.ProjectId, + DatasetID: mr.DatasetId, + ModelID: mr.ModelId, + c: c, + } +} + +// Routine creates a handle to a BigQuery routine in the dataset. +// To determine if a routine exists, call Routine.Metadata. +func (d *Dataset) Routine(routineID string) *Routine { + return &Routine{ + ProjectID: d.ProjectID, + DatasetID: d.DatasetID, + RoutineID: routineID, + c: d.c} +} + +// Routines returns an iterator over the routines in the Dataset. +func (d *Dataset) Routines(ctx context.Context) *RoutineIterator { + it := &RoutineIterator{ + ctx: ctx, + dataset: d, + } + it.pageInfo, it.nextFunc = iterator.NewPageInfo( + it.fetch, + func() int { return len(it.routines) }, + func() interface{} { b := it.routines; it.routines = nil; return b }) + return it +} + +// A RoutineIterator is an iterator over Routines. +type RoutineIterator struct { + ctx context.Context + dataset *Dataset + routines []*Routine + pageInfo *iterator.PageInfo + nextFunc func() error +} + +// Next returns the next result. Its second return value is Done if there are +// no more results. Once Next returns Done, all subsequent calls will return +// Done. +func (it *RoutineIterator) Next() (*Routine, error) { + if err := it.nextFunc(); err != nil { + return nil, err + } + t := it.routines[0] + it.routines = it.routines[1:] + return t, nil +} + +// PageInfo supports pagination. See the google.golang.org/api/iterator package for details. +func (it *RoutineIterator) PageInfo() *iterator.PageInfo { return it.pageInfo } + +// listRoutines exists to aid testing. +var listRoutines = func(it *RoutineIterator, pageSize int, pageToken string) (*bq.ListRoutinesResponse, error) { + call := it.dataset.c.bqs.Routines.List(it.dataset.ProjectID, it.dataset.DatasetID). + PageToken(pageToken). + Context(it.ctx) + setClientHeader(call.Header()) + if pageSize > 0 { + call.MaxResults(int64(pageSize)) + } + var res *bq.ListRoutinesResponse + err := runWithRetry(it.ctx, func() (err error) { + sCtx := trace.StartSpan(it.ctx, "bigquery.routines.list") + res, err = call.Do() + trace.EndSpan(sCtx, err) + return err + }) + return res, err +} + +func (it *RoutineIterator) fetch(pageSize int, pageToken string) (string, error) { + res, err := listRoutines(it, pageSize, pageToken) + if err != nil { + return "", err + } + for _, t := range res.Routines { + it.routines = append(it.routines, bqToRoutine(t.RoutineReference, it.dataset.c)) + } + return res.NextPageToken, nil +} + +func bqToRoutine(mr *bq.RoutineReference, c *Client) *Routine { + if mr == nil { + return nil + } + return &Routine{ + ProjectID: mr.ProjectId, + DatasetID: mr.DatasetId, + RoutineID: mr.RoutineId, + c: c, + } +} + +// Datasets returns an iterator over the datasets in a project. +// The Client's project is used by default, but that can be +// changed by setting ProjectID on the returned iterator before calling Next. +func (c *Client) Datasets(ctx context.Context) *DatasetIterator { + return c.DatasetsInProject(ctx, c.projectID) +} + +// DatasetsInProject returns an iterator over the datasets in the provided project. +// +// Deprecated: call Client.Datasets, then set ProjectID on the returned iterator. +func (c *Client) DatasetsInProject(ctx context.Context, projectID string) *DatasetIterator { + it := &DatasetIterator{ + ctx: ctx, + c: c, + ProjectID: projectID, + } + it.pageInfo, it.nextFunc = iterator.NewPageInfo( + it.fetch, + func() int { return len(it.items) }, + func() interface{} { b := it.items; it.items = nil; return b }) + return it +} + +// DatasetIterator iterates over the datasets in a project. +type DatasetIterator struct { + // ListHidden causes hidden datasets to be listed when set to true. + // Set before the first call to Next. + ListHidden bool + + // Filter restricts the datasets returned by label. The filter syntax is described in + // https://cloud.google.com/bigquery/docs/labeling-datasets#filtering_datasets_using_labels + // Set before the first call to Next. + Filter string + + // The project ID of the listed datasets. + // Set before the first call to Next. + ProjectID string + + ctx context.Context + c *Client + pageInfo *iterator.PageInfo + nextFunc func() error + items []*Dataset +} + +// PageInfo supports pagination. See the google.golang.org/api/iterator package for details. +func (it *DatasetIterator) PageInfo() *iterator.PageInfo { return it.pageInfo } + +// Next returns the next Dataset. Its second return value is iterator.Done if +// there are no more results. Once Next returns Done, all subsequent calls will +// return Done. +func (it *DatasetIterator) Next() (*Dataset, error) { + if err := it.nextFunc(); err != nil { + return nil, err + } + item := it.items[0] + it.items = it.items[1:] + return item, nil +} + +// for testing +var listDatasets = func(it *DatasetIterator, pageSize int, pageToken string) (*bq.DatasetList, error) { + call := it.c.bqs.Datasets.List(it.ProjectID). + Context(it.ctx). + PageToken(pageToken). + All(it.ListHidden) + setClientHeader(call.Header()) + if pageSize > 0 { + call.MaxResults(int64(pageSize)) + } + if it.Filter != "" { + call.Filter(it.Filter) + } + var res *bq.DatasetList + err := runWithRetry(it.ctx, func() (err error) { + sCtx := trace.StartSpan(it.ctx, "bigquery.datasets.list") + res, err = call.Do() + trace.EndSpan(sCtx, err) + return err + }) + return res, err +} + +func (it *DatasetIterator) fetch(pageSize int, pageToken string) (string, error) { + res, err := listDatasets(it, pageSize, pageToken) + if err != nil { + return "", err + } + for _, d := range res.Datasets { + it.items = append(it.items, &Dataset{ + ProjectID: d.DatasetReference.ProjectId, + DatasetID: d.DatasetReference.DatasetId, + c: it.c, + }) + } + return res.NextPageToken, nil +} + +// An AccessEntry describes the permissions that an entity has on a dataset. +type AccessEntry struct { + Role AccessRole // The role of the entity + EntityType EntityType // The type of entity + Entity string // The entity (individual or group) granted access + View *Table // The view granted access (EntityType must be ViewEntity) + Routine *Routine // The routine granted access (only UDF currently supported) + Dataset *DatasetAccessEntry // The resources within a dataset granted access. + Condition *Expr // Condition for the access binding. +} + +// Expr represents the conditional information related to dataset access policies. +type Expr struct { + // Textual representation of an expression in Common Expression Language syntax. + Expression string + + // Optional. Title for the expression, i.e. a short string describing + // its purpose. This can be used e.g. in UIs which allow to enter the + // expression. + Title string + + // Optional. Description of the expression. This is a longer text which + // describes the expression, e.g. when hovered over it in a UI. + Description string + + // Optional. String indicating the location of the expression for error + // reporting, e.g. a file name and a position in the file. + Location string +} + +func (ex *Expr) toBQ() *bq.Expr { + if ex == nil { + return nil + } + return &bq.Expr{ + Expression: ex.Expression, + Title: ex.Title, + Description: ex.Description, + Location: ex.Location, + } +} + +func bqToExpr(bq *bq.Expr) *Expr { + if bq == nil { + return nil + } + return &Expr{ + Expression: bq.Expression, + Title: bq.Title, + Description: bq.Description, + Location: bq.Location, + } +} + +// AccessRole is the level of access to grant to a dataset. +type AccessRole string + +const ( + // OwnerRole is the OWNER AccessRole. + OwnerRole AccessRole = "OWNER" + // ReaderRole is the READER AccessRole. + ReaderRole AccessRole = "READER" + // WriterRole is the WRITER AccessRole. + WriterRole AccessRole = "WRITER" +) + +// EntityType is the type of entity in an AccessEntry. +type EntityType int + +const ( + // DomainEntity is a domain (e.g. "example.com"). + DomainEntity EntityType = iota + 1 + + // GroupEmailEntity is an email address of a Google Group. + GroupEmailEntity + + // UserEmailEntity is an email address of an individual user. + UserEmailEntity + + // SpecialGroupEntity is a special group: one of projectOwners, projectReaders, projectWriters or + // allAuthenticatedUsers. + SpecialGroupEntity + + // ViewEntity is a BigQuery logical view. + ViewEntity + + // IAMMemberEntity represents entities present in IAM but not represented using + // the other entity types. + IAMMemberEntity + + // RoutineEntity is a BigQuery routine, referencing a User Defined Function (UDF). + RoutineEntity + + // DatasetEntity is BigQuery dataset, present in the access list. + DatasetEntity +) + +func (e *AccessEntry) toBQ() (*bq.DatasetAccess, error) { + q := &bq.DatasetAccess{ + Role: string(e.Role), + Condition: e.Condition.toBQ(), + } + switch e.EntityType { + case DomainEntity: + q.Domain = e.Entity + case GroupEmailEntity: + q.GroupByEmail = e.Entity + case UserEmailEntity: + q.UserByEmail = e.Entity + case SpecialGroupEntity: + q.SpecialGroup = e.Entity + case ViewEntity: + q.View = e.View.toBQ() + case IAMMemberEntity: + q.IamMember = e.Entity + case RoutineEntity: + q.Routine = e.Routine.toBQ() + case DatasetEntity: + q.Dataset = e.Dataset.toBQ() + default: + return nil, fmt.Errorf("bigquery: unknown entity type %d", e.EntityType) + } + return q, nil +} + +func bqToAccessEntry(q *bq.DatasetAccess, c *Client) (*AccessEntry, error) { + e := &AccessEntry{Role: AccessRole(q.Role)} + switch { + case q.Domain != "": + e.Entity = q.Domain + e.EntityType = DomainEntity + case q.GroupByEmail != "": + e.Entity = q.GroupByEmail + e.EntityType = GroupEmailEntity + case q.UserByEmail != "": + e.Entity = q.UserByEmail + e.EntityType = UserEmailEntity + case q.SpecialGroup != "": + e.Entity = q.SpecialGroup + e.EntityType = SpecialGroupEntity + case q.View != nil: + e.View = c.DatasetInProject(q.View.ProjectId, q.View.DatasetId).Table(q.View.TableId) + e.EntityType = ViewEntity + case q.IamMember != "": + e.Entity = q.IamMember + e.EntityType = IAMMemberEntity + case q.Routine != nil: + e.Routine = c.DatasetInProject(q.Routine.ProjectId, q.Routine.DatasetId).Routine(q.Routine.RoutineId) + e.EntityType = RoutineEntity + case q.Dataset != nil: + e.Dataset = bqToDatasetAccessEntry(q.Dataset, c) + e.EntityType = DatasetEntity + default: + return nil, errors.New("bigquery: invalid access value") + } + if q.Condition != nil { + e.Condition = bqToExpr(q.Condition) + } + return e, nil +} + +// DatasetAccessEntry is an access entry that refers to resources within +// another dataset. +type DatasetAccessEntry struct { + // The dataset to which this entry applies. + Dataset *Dataset + // The list of target types within the dataset + // to which this entry applies. + // + // Current supported values: + // + // VIEWS - This entry applies to views in the dataset. + TargetTypes []string +} + +func (dae *DatasetAccessEntry) toBQ() *bq.DatasetAccessEntry { + if dae == nil { + return nil + } + return &bq.DatasetAccessEntry{ + Dataset: &bq.DatasetReference{ + ProjectId: dae.Dataset.ProjectID, + DatasetId: dae.Dataset.DatasetID, + }, + TargetTypes: dae.TargetTypes, + } +} + +func bqToDatasetAccessEntry(entry *bq.DatasetAccessEntry, c *Client) *DatasetAccessEntry { + if entry == nil { + return nil + } + return &DatasetAccessEntry{ + Dataset: c.DatasetInProject(entry.Dataset.ProjectId, entry.Dataset.DatasetId), + TargetTypes: entry.TargetTypes, + } +} + +// ExternalDatasetReference provides information about external dataset metadata. +type ExternalDatasetReference struct { + //The connection id that is used to access the external_source. + // Format: projects/{project_id}/locations/{location_id}/connections/{connection_id} + Connection string + + // External source that backs this dataset. + ExternalSource string +} + +func bqToExternalDatasetReference(bq *bq.ExternalDatasetReference) *ExternalDatasetReference { + if bq == nil { + return nil + } + return &ExternalDatasetReference{ + Connection: bq.Connection, + ExternalSource: bq.ExternalSource, + } +} + +func (edr *ExternalDatasetReference) toBQ() *bq.ExternalDatasetReference { + if edr == nil { + return nil + } + return &bq.ExternalDatasetReference{ + Connection: edr.Connection, + ExternalSource: edr.ExternalSource, + } +} diff --git a/vendor/cloud.google.com/go/bigquery/doc.go b/vendor/cloud.google.com/go/bigquery/doc.go new file mode 100644 index 000000000000..042508dfac38 --- /dev/null +++ b/vendor/cloud.google.com/go/bigquery/doc.go @@ -0,0 +1,357 @@ +// Copyright 2015 Google LLC +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +/* +Package bigquery provides a client for the BigQuery service. + +The following assumes a basic familiarity with BigQuery concepts. +See https://cloud.google.com/bigquery/docs. + +See https://godoc.org/cloud.google.com/go for authentication, timeouts, +connection pooling and similar aspects of this package. + +# Creating a Client + +To start working with this package, create a client with [NewClient]: + + ctx := context.Background() + client, err := bigquery.NewClient(ctx, projectID) + if err != nil { + // TODO: Handle error. + } + +# Querying + +To query existing tables, create a [Client.Query] and call its [Query.Read] method, which starts the +query and waits for it to complete: + + q := client.Query(` + SELECT year, SUM(number) as num + FROM bigquery-public-data.usa_names.usa_1910_2013 + WHERE name = @name + GROUP BY year + ORDER BY year + `) + q.Parameters = []bigquery.QueryParameter{ + {Name: "name", Value: "William"}, + } + it, err := q.Read(ctx) + if err != nil { + // TODO: Handle error. + } + +Then iterate through the resulting rows. You can store a row using +anything that implements the [ValueLoader] interface, or with a slice or map of [Value]. +A slice is simplest: + + for { + var values []bigquery.Value + err := it.Next(&values) + if err == iterator.Done { + break + } + if err != nil { + // TODO: Handle error. + } + fmt.Println(values) + } + +You can also use a struct whose exported fields match the query: + + type Count struct { + Year int + Num int + } + for { + var c Count + err := it.Next(&c) + if err == iterator.Done { + break + } + if err != nil { + // TODO: Handle error. + } + fmt.Println(c) + } + +You can also start the query running and get the results later. +Create the query as above, but call [Query.Run] instead of [Query.Read]. This returns a [Job], +which represents an asynchronous operation. + + job, err := q.Run(ctx) + if err != nil { + // TODO: Handle error. + } + +Get the job's ID, a printable string. You can save this string to retrieve +the results at a later time, even in another process. + + jobID := job.ID() + fmt.Printf("The job ID is %s\n", jobID) + +To retrieve the job's results from the ID, first look up the [Job] with the [Client.JobFromID] method: + + job, err = client.JobFromID(ctx, jobID) + if err != nil { + // TODO: Handle error. + } + +Use the [Job.Read] method to obtain an iterator, and loop over the rows. +Calling [Query.Read] is preferred for queries with a relatively small result set, +as it will call BigQuery jobs.query API for a optimized query path. If the query +doesn't meet that criteria, the method will just combine [Query.Run] and [Job.Read]. + + it, err = job.Read(ctx) + if err != nil { + // TODO: Handle error. + } + // Proceed with iteration as above. + +# Datasets and Tables + +You can refer to datasets in the client's project with the [Client.Dataset] method, and +in other projects with the [Client.DatasetInProject] method: + + myDataset := client.Dataset("my_dataset") + yourDataset := client.DatasetInProject("your-project-id", "your_dataset") + +These methods create references to datasets, not the datasets themselves. You can have +a dataset reference even if the dataset doesn't exist yet. Use [Dataset.Create] to +create a dataset from a reference: + + if err := myDataset.Create(ctx, nil); err != nil { + // TODO: Handle error. + } + +You can refer to tables with [Dataset.Table]. Like [Dataset], [Table] is a reference +to an object in BigQuery that may or may not exist. + + table := myDataset.Table("my_table") + +You can create, delete and update the metadata of tables with methods on [Table]. +For instance, you could create a temporary table with: + + err = myDataset.Table("temp").Create(ctx, &bigquery.TableMetadata{ + ExpirationTime: time.Now().Add(1*time.Hour)}) + if err != nil { + // TODO: Handle error. + } + +We'll see how to create a table with a schema in the next section. + +# Schemas + +There are two ways to construct schemas with this package. +You can build a schema by hand with the [Schema] struct, like so: + + schema1 := bigquery.Schema{ + {Name: "Name", Required: true, Type: bigquery.StringFieldType}, + {Name: "Grades", Repeated: true, Type: bigquery.IntegerFieldType}, + {Name: "Optional", Required: false, Type: bigquery.IntegerFieldType}, + } + +Or you can infer the schema from a struct with the [InferSchema] method: + + type student struct { + Name string + Grades []int + Optional bigquery.NullInt64 + } + schema2, err := bigquery.InferSchema(student{}) + if err != nil { + // TODO: Handle error. + } + // schema1 and schema2 are identical. + +Struct inference supports tags like those of the [encoding/json] package, so you can +change names, ignore fields, or mark a field as nullable (non-required). Fields +declared as one of the Null types ([NullInt64], [NullFloat64], [NullString], [NullBool], +[NullTimestamp], [NullDate], [NullTime], [NullDateTime], [NullGeography], and [NullJSON]) are +automatically inferred as nullable, so the "nullable" tag is only needed for []byte, +*big.Rat and pointer-to-struct fields. + + type student2 struct { + Name string `bigquery:"full_name"` + Grades []int + Secret string `bigquery:"-"` + Optional []byte `bigquery:",nullable"` + } + schema3, err := bigquery.InferSchema(student2{}) + if err != nil { + // TODO: Handle error. + } + // schema3 has required fields "full_name" and "Grade", and nullable BYTES field "Optional". + +Having constructed a schema, you can create a table with it using the [Table.Create] method like so: + + if err := table.Create(ctx, &bigquery.TableMetadata{Schema: schema1}); err != nil { + // TODO: Handle error. + } + +# Copying + +You can copy one or more tables to another table. Begin by constructing a [Copier] +describing the copy using the [Table.CopierFrom]. Then set any desired copy options, +and finally call [Copier.Run] to get a [Job]: + + copier := myDataset.Table("dest").CopierFrom(myDataset.Table("src")) + copier.WriteDisposition = bigquery.WriteTruncate + job, err = copier.Run(ctx) + if err != nil { + // TODO: Handle error. + } + +You can chain the call to [Copier.Run] if you don't want to set options: + + job, err = myDataset.Table("dest").CopierFrom(myDataset.Table("src")).Run(ctx) + if err != nil { + // TODO: Handle error. + } + +You can wait for your job to complete with the [Job.Wait] method: + + status, err := job.Wait(ctx) + if err != nil { + // TODO: Handle error. + } + +[Job.Wait] polls with exponential backoff. You can also poll yourself, if you +wish: + + for { + status, err := job.Status(ctx) + if err != nil { + // TODO: Handle error. + } + if status.Done() { + if status.Err() != nil { + log.Fatalf("Job failed with error %v", status.Err()) + } + break + } + time.Sleep(pollInterval) + } + +# Loading and Uploading + +There are two ways to populate a table with this package: load the data from a Google Cloud Storage +object, or upload rows directly from your program. + +For loading, first create a [GCSReference] with the [NewGCSReference] method, configuring it if desired. +Then make a [Loader] from a table with the [Table.LoaderFrom] method with the reference, +optionally configure it as well, and call its [Loader.Run] method. + + gcsRef := bigquery.NewGCSReference("gs://my-bucket/my-object") + gcsRef.AllowJaggedRows = true + loader := myDataset.Table("dest").LoaderFrom(gcsRef) + loader.CreateDisposition = bigquery.CreateNever + job, err = loader.Run(ctx) + // Poll the job for completion if desired, as above. + +To upload, first define a type that implements the [ValueSaver] interface, which has +a single method named Save. Then create an [Inserter], and call its [Inserter.Put] +method with a slice of values. + + type Item struct { + Name string + Size float64 + Count int + } + + // Save implements the ValueSaver interface. + func (i *Item) Save() (map[string]bigquery.Value, string, error) { + return map[string]bigquery.Value{ + "Name": i.Name, + "Size": i.Size, + "Count": i.Count, + }, "", nil + } + + u := table.Inserter() + // Item implements the ValueSaver interface. + items := []*Item{ + {Name: "n1", Size: 32.6, Count: 7}, + {Name: "n2", Size: 4, Count: 2}, + {Name: "n3", Size: 101.5, Count: 1}, + } + if err := u.Put(ctx, items); err != nil { + // TODO: Handle error. + } + +You can also upload a struct that doesn't implement [ValueSaver]. Use the [StructSaver] type +to specify the schema and insert ID by hand: + + type item struct { + Name string + Num int + } + + // Assume schema holds the table's schema. + savers := []*bigquery.StructSaver{ + {Struct: score{Name: "n1", Num: 12}, Schema: schema, InsertID: "id1"}, + {Struct: score{Name: "n2", Num: 31}, Schema: schema, InsertID: "id2"}, + {Struct: score{Name: "n3", Num: 7}, Schema: schema, InsertID: "id3"}, + } + + if err := u.Put(ctx, savers); err != nil { + // TODO: Handle error. + } + +Lastly, but not least, you can just supply the struct or struct pointer directly and the schema will be inferred: + + type Item2 struct { + Name string + Size float64 + Count int + } + + // Item2 doesn't implement ValueSaver interface, so schema will be inferred. + items2 := []*Item2{ + {Name: "n1", Size: 32.6, Count: 7}, + {Name: "n2", Size: 4, Count: 2}, + {Name: "n3", Size: 101.5, Count: 1}, + } + if err := u.Put(ctx, items2); err != nil { + // TODO: Handle error. + } + +BigQuery allows for higher throughput when omitting insertion IDs. To enable this, +specify the sentinel [NoDedupeID] value for the insertion ID when implementing a [ValueSaver]. + +# Extracting + +If you've been following so far, extracting data from a BigQuery table +into a Google Cloud Storage object will feel familiar. First create an +[Extractor], then optionally configure it, and lastly call its [Extractor.Run] method. + + extractor := table.ExtractorTo(gcsRef) + extractor.DisableHeader = true + job, err = extractor.Run(ctx) + // Poll the job for completion if desired, as above. + +# Errors + +Errors returned by this client are often of the type [googleapi.Error]. +These errors can be introspected for more information by using [errors.As] +with the richer [googleapi.Error] type. For example: + + var e *googleapi.Error + if ok := errors.As(err, &e); ok { + if e.Code == 409 { ... } + } + +In some cases, your client may received unstructured [googleapi.Error] error responses. In such cases, it is likely that +you have exceeded BigQuery request limits, documented at: https://cloud.google.com/bigquery/quotas +*/ +package bigquery // import "cloud.google.com/go/bigquery" diff --git a/vendor/cloud.google.com/go/bigquery/error.go b/vendor/cloud.google.com/go/bigquery/error.go new file mode 100644 index 000000000000..cab9b0083fdc --- /dev/null +++ b/vendor/cloud.google.com/go/bigquery/error.go @@ -0,0 +1,106 @@ +// Copyright 2015 Google LLC +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +package bigquery + +import ( + "fmt" + "strings" + + bq "google.golang.org/api/bigquery/v2" +) + +// An Error contains detailed information about a failed bigquery operation. +// Detailed description of possible Reasons can be found here: https://cloud.google.com/bigquery/troubleshooting-errors. +type Error struct { + // Mirrors bq.ErrorProto, but drops DebugInfo + Location, Message, Reason string +} + +func (e Error) Error() string { + return fmt.Sprintf("{Location: %q; Message: %q; Reason: %q}", e.Location, e.Message, e.Reason) +} + +func bqToError(ep *bq.ErrorProto) *Error { + if ep == nil { + return nil + } + return &Error{ + Location: ep.Location, + Message: ep.Message, + Reason: ep.Reason, + } +} + +// A MultiError contains multiple related errors. +type MultiError []error + +func (m MultiError) Error() string { + switch len(m) { + case 0: + return "(0 errors)" + case 1: + return m[0].Error() + case 2: + return m[0].Error() + " (and 1 other error)" + } + return fmt.Sprintf("%s (and %d other errors)", m[0].Error(), len(m)-1) +} + +// RowInsertionError contains all errors that occurred when attempting to insert a row. +type RowInsertionError struct { + InsertID string // The InsertID associated with the affected row. + RowIndex int // The 0-based index of the affected row in the batch of rows being inserted. + Errors MultiError +} + +func (e *RowInsertionError) Error() string { + errFmt := "insertion of row [insertID: %q; insertIndex: %v] failed with error: %s" + return fmt.Sprintf(errFmt, e.InsertID, e.RowIndex, e.Errors.Error()) +} + +// PutMultiError contains an error for each row which was not successfully inserted +// into a BigQuery table. +type PutMultiError []RowInsertionError + +func (pme PutMultiError) errorDetails() string { + size := len(pme) + ellipsis := "" + if size == 0 { + return "" + } else if size > 3 { + size = 3 + ellipsis = ", ..." + } + + es := make([]string, size) + for i, e := range pme { + if i >= size { + break + } + es[i] = e.Error() + } + + return fmt.Sprintf(" (%s%s)", strings.Join(es, ", "), ellipsis) +} + +func (pme PutMultiError) Error() string { + plural := "s" + if len(pme) == 1 { + plural = "" + } + + details := pme.errorDetails() + return fmt.Sprintf("%v row insertion%s failed%s", len(pme), plural, details) +} diff --git a/vendor/cloud.google.com/go/bigquery/external.go b/vendor/cloud.google.com/go/bigquery/external.go new file mode 100644 index 000000000000..9dfdf27b8866 --- /dev/null +++ b/vendor/cloud.google.com/go/bigquery/external.go @@ -0,0 +1,597 @@ +// Copyright 2017 Google LLC +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +package bigquery + +import ( + "encoding/base64" + "unicode/utf8" + + bq "google.golang.org/api/bigquery/v2" +) + +// DataFormat describes the format of BigQuery table data. +type DataFormat string + +// Constants describing the format of BigQuery table data. +const ( + CSV DataFormat = "CSV" + Avro DataFormat = "AVRO" + JSON DataFormat = "NEWLINE_DELIMITED_JSON" + DatastoreBackup DataFormat = "DATASTORE_BACKUP" + GoogleSheets DataFormat = "GOOGLE_SHEETS" + Bigtable DataFormat = "BIGTABLE" + Parquet DataFormat = "PARQUET" + ORC DataFormat = "ORC" + // For BQ ML Models, TensorFlow Saved Model format. + TFSavedModel DataFormat = "ML_TF_SAVED_MODEL" + // For BQ ML Models, xgBoost Booster format. + XGBoostBooster DataFormat = "ML_XGBOOST_BOOSTER" + Iceberg DataFormat = "ICEBERG" +) + +// MetadataCacheMode describes the types of metadata cache mode for external data. +type MetadataCacheMode string + +// Constants describing types of metadata cache mode for external data. +const ( + // Automatic metadata cache mode triggers automatic background refresh of + // metadata cache from the external source. Queries will use the latest + // available cache version within the table's maxStaleness interval. + Automatic MetadataCacheMode = "AUTOMATIC" + // Manual metadata cache mode triggers manual refresh of the + // metadata cache from external source. Queries will use the latest manually + // triggered cache version within the table's maxStaleness interval. + Manual MetadataCacheMode = "MANUAL" +) + +// ExternalData is a table which is stored outside of BigQuery. It is implemented by +// *ExternalDataConfig. +// GCSReference also implements it, for backwards compatibility. +type ExternalData interface { + toBQ() bq.ExternalDataConfiguration +} + +// ExternalDataConfig describes data external to BigQuery that can be used +// in queries and to create external tables. +type ExternalDataConfig struct { + // The format of the data. Required. + SourceFormat DataFormat + + // The fully-qualified URIs that point to your + // data in Google Cloud. Required. + // + // For Google Cloud Storage URIs, each URI can contain one '*' wildcard character + // and it must come after the 'bucket' name. Size limits related to load jobs + // apply to external data sources. + // + // For Google Cloud Bigtable URIs, exactly one URI can be specified and it has be + // a fully specified and valid HTTPS URL for a Google Cloud Bigtable table. + // + // For Google Cloud Datastore backups, exactly one URI can be specified. Also, + // the '*' wildcard character is not allowed. + SourceURIs []string + + // The schema of the data. Required for CSV and JSON; disallowed for the + // other formats. + Schema Schema + + // Try to detect schema and format options automatically. + // Any option specified explicitly will be honored. + AutoDetect bool + + // The compression type of the data. + Compression Compression + + // IgnoreUnknownValues causes values not matching the schema to be + // tolerated. Unknown values are ignored. For CSV this ignores extra values + // at the end of a line. For JSON this ignores named values that do not + // match any column name. If this field is not set, records containing + // unknown values are treated as bad records. The MaxBadRecords field can + // be used to customize how bad records are handled. + IgnoreUnknownValues bool + + // MaxBadRecords is the maximum number of bad records that will be ignored + // when reading data. + MaxBadRecords int64 + + // Additional options for CSV, GoogleSheets, Bigtable, and Parquet formats. + Options ExternalDataConfigOptions + + // HivePartitioningOptions allows use of Hive partitioning based on the + // layout of objects in Google Cloud Storage. + HivePartitioningOptions *HivePartitioningOptions + + // DecimalTargetTypes allows selection of how decimal values are converted when + // processed in bigquery, subject to the value type having sufficient precision/scale + // to support the values. In the order of NUMERIC, BIGNUMERIC, and STRING, a type is + // selected if is present in the list and if supports the necessary precision and scale. + // + // StringTargetType supports all precision and scale values. + DecimalTargetTypes []DecimalTargetType + + // ConnectionID associates an external data configuration with a connection ID. + // Connections are managed through the BigQuery Connection API: + // https://pkg.go.dev/cloud.google.com/go/bigquery/connection/apiv1 + ConnectionID string + + // When creating an external table, the user can provide a reference file with the table schema. + // This is enabled for the following formats: AVRO, PARQUET, ORC. + ReferenceFileSchemaURI string + + // Metadata Cache Mode for the table. Set this to + // enable caching of metadata from external data source. + MetadataCacheMode MetadataCacheMode +} + +func (e *ExternalDataConfig) toBQ() bq.ExternalDataConfiguration { + q := bq.ExternalDataConfiguration{ + SourceFormat: string(e.SourceFormat), + SourceUris: e.SourceURIs, + Autodetect: e.AutoDetect, + Compression: string(e.Compression), + IgnoreUnknownValues: e.IgnoreUnknownValues, + MaxBadRecords: e.MaxBadRecords, + HivePartitioningOptions: e.HivePartitioningOptions.toBQ(), + ConnectionId: e.ConnectionID, + ReferenceFileSchemaUri: e.ReferenceFileSchemaURI, + MetadataCacheMode: string(e.MetadataCacheMode), + } + if e.Schema != nil { + q.Schema = e.Schema.toBQ() + } + if e.Options != nil { + e.Options.populateExternalDataConfig(&q) + } + for _, v := range e.DecimalTargetTypes { + q.DecimalTargetTypes = append(q.DecimalTargetTypes, string(v)) + } + return q +} + +func bqToExternalDataConfig(q *bq.ExternalDataConfiguration) (*ExternalDataConfig, error) { + e := &ExternalDataConfig{ + SourceFormat: DataFormat(q.SourceFormat), + SourceURIs: q.SourceUris, + AutoDetect: q.Autodetect, + Compression: Compression(q.Compression), + IgnoreUnknownValues: q.IgnoreUnknownValues, + MaxBadRecords: q.MaxBadRecords, + Schema: bqToSchema(q.Schema), + HivePartitioningOptions: bqToHivePartitioningOptions(q.HivePartitioningOptions), + ConnectionID: q.ConnectionId, + ReferenceFileSchemaURI: q.ReferenceFileSchemaUri, + MetadataCacheMode: MetadataCacheMode(q.MetadataCacheMode), + } + for _, v := range q.DecimalTargetTypes { + e.DecimalTargetTypes = append(e.DecimalTargetTypes, DecimalTargetType(v)) + } + switch { + case q.AvroOptions != nil: + e.Options = bqToAvroOptions(q.AvroOptions) + case q.CsvOptions != nil: + e.Options = bqToCSVOptions(q.CsvOptions) + case q.GoogleSheetsOptions != nil: + e.Options = bqToGoogleSheetsOptions(q.GoogleSheetsOptions) + case q.BigtableOptions != nil: + var err error + e.Options, err = bqToBigtableOptions(q.BigtableOptions) + if err != nil { + return nil, err + } + case q.ParquetOptions != nil: + e.Options = bqToParquetOptions(q.ParquetOptions) + } + return e, nil +} + +// ExternalDataConfigOptions are additional options for external data configurations. +// This interface is implemented by CSVOptions, GoogleSheetsOptions and BigtableOptions. +type ExternalDataConfigOptions interface { + populateExternalDataConfig(*bq.ExternalDataConfiguration) +} + +// AvroOptions are additional options for Avro external data data sources. +type AvroOptions struct { + // UseAvroLogicalTypes indicates whether to interpret logical types as the + // corresponding BigQuery data type (for example, TIMESTAMP), instead of using + // the raw type (for example, INTEGER). + UseAvroLogicalTypes bool +} + +func (o *AvroOptions) populateExternalDataConfig(c *bq.ExternalDataConfiguration) { + c.AvroOptions = &bq.AvroOptions{ + UseAvroLogicalTypes: o.UseAvroLogicalTypes, + } +} + +func bqToAvroOptions(q *bq.AvroOptions) *AvroOptions { + if q == nil { + return nil + } + return &AvroOptions{ + UseAvroLogicalTypes: q.UseAvroLogicalTypes, + } +} + +// CSVOptions are additional options for CSV external data sources. +type CSVOptions struct { + // AllowJaggedRows causes missing trailing optional columns to be tolerated + // when reading CSV data. Missing values are treated as nulls. + AllowJaggedRows bool + + // AllowQuotedNewlines sets whether quoted data sections containing + // newlines are allowed when reading CSV data. + AllowQuotedNewlines bool + + // Encoding is the character encoding of data to be read. + Encoding Encoding + + // FieldDelimiter is the separator for fields in a CSV file, used when + // reading or exporting data. The default is ",". + FieldDelimiter string + + // Quote is the value used to quote data sections in a CSV file. The + // default quotation character is the double quote ("), which is used if + // both Quote and ForceZeroQuote are unset. + // To specify that no character should be interpreted as a quotation + // character, set ForceZeroQuote to true. + // Only used when reading data. + Quote string + ForceZeroQuote bool + + // The number of rows at the top of a CSV file that BigQuery will skip when + // reading data. + SkipLeadingRows int64 + + // An optional custom string that will represent a NULL + // value in CSV import data. + NullMarker string + + // Preserves the embedded ASCII control characters (the first 32 characters in the ASCII-table, + // from '\\x00' to '\\x1F') when loading from CSV. Only applicable to CSV, ignored for other formats. + PreserveASCIIControlCharacters bool +} + +func (o *CSVOptions) populateExternalDataConfig(c *bq.ExternalDataConfiguration) { + c.CsvOptions = &bq.CsvOptions{ + AllowJaggedRows: o.AllowJaggedRows, + AllowQuotedNewlines: o.AllowQuotedNewlines, + Encoding: string(o.Encoding), + FieldDelimiter: o.FieldDelimiter, + Quote: o.quote(), + SkipLeadingRows: o.SkipLeadingRows, + NullMarker: o.NullMarker, + PreserveAsciiControlCharacters: o.PreserveASCIIControlCharacters, + } +} + +// quote returns the CSV quote character, or nil if unset. +func (o *CSVOptions) quote() *string { + if o.ForceZeroQuote { + quote := "" + return "e + } + if o.Quote == "" { + return nil + } + return &o.Quote +} + +func (o *CSVOptions) setQuote(ps *string) { + if ps != nil { + o.Quote = *ps + if o.Quote == "" { + o.ForceZeroQuote = true + } + } +} + +func bqToCSVOptions(q *bq.CsvOptions) *CSVOptions { + o := &CSVOptions{ + AllowJaggedRows: q.AllowJaggedRows, + AllowQuotedNewlines: q.AllowQuotedNewlines, + Encoding: Encoding(q.Encoding), + FieldDelimiter: q.FieldDelimiter, + SkipLeadingRows: q.SkipLeadingRows, + NullMarker: q.NullMarker, + PreserveASCIIControlCharacters: q.PreserveAsciiControlCharacters, + } + o.setQuote(q.Quote) + return o +} + +// GoogleSheetsOptions are additional options for GoogleSheets external data sources. +type GoogleSheetsOptions struct { + // The number of rows at the top of a sheet that BigQuery will skip when + // reading data. + SkipLeadingRows int64 + // Optionally specifies a more specific range of cells to include. + // Typical format: sheet_name!top_left_cell_id:bottom_right_cell_id + // + // Example: sheet1!A1:B20 + Range string +} + +func (o *GoogleSheetsOptions) populateExternalDataConfig(c *bq.ExternalDataConfiguration) { + c.GoogleSheetsOptions = &bq.GoogleSheetsOptions{ + SkipLeadingRows: o.SkipLeadingRows, + Range: o.Range, + } +} + +func bqToGoogleSheetsOptions(q *bq.GoogleSheetsOptions) *GoogleSheetsOptions { + return &GoogleSheetsOptions{ + SkipLeadingRows: q.SkipLeadingRows, + Range: q.Range, + } +} + +// BigtableOptions are additional options for Bigtable external data sources. +type BigtableOptions struct { + // A list of column families to expose in the table schema along with their + // types. If omitted, all column families are present in the table schema and + // their values are read as BYTES. + ColumnFamilies []*BigtableColumnFamily + + // If true, then the column families that are not specified in columnFamilies + // list are not exposed in the table schema. Otherwise, they are read with BYTES + // type values. The default is false. + IgnoreUnspecifiedColumnFamilies bool + + // If true, then the rowkey column families will be read and converted to string. + // Otherwise they are read with BYTES type values and users need to manually cast + // them with CAST if necessary. The default is false. + ReadRowkeyAsString bool +} + +func (o *BigtableOptions) populateExternalDataConfig(c *bq.ExternalDataConfiguration) { + q := &bq.BigtableOptions{ + IgnoreUnspecifiedColumnFamilies: o.IgnoreUnspecifiedColumnFamilies, + ReadRowkeyAsString: o.ReadRowkeyAsString, + } + for _, f := range o.ColumnFamilies { + q.ColumnFamilies = append(q.ColumnFamilies, f.toBQ()) + } + c.BigtableOptions = q +} + +func bqToBigtableOptions(q *bq.BigtableOptions) (*BigtableOptions, error) { + b := &BigtableOptions{ + IgnoreUnspecifiedColumnFamilies: q.IgnoreUnspecifiedColumnFamilies, + ReadRowkeyAsString: q.ReadRowkeyAsString, + } + for _, f := range q.ColumnFamilies { + f2, err := bqToBigtableColumnFamily(f) + if err != nil { + return nil, err + } + b.ColumnFamilies = append(b.ColumnFamilies, f2) + } + return b, nil +} + +// BigtableColumnFamily describes how BigQuery should access a Bigtable column family. +type BigtableColumnFamily struct { + // Identifier of the column family. + FamilyID string + + // Lists of columns that should be exposed as individual fields as opposed to a + // list of (column name, value) pairs. All columns whose qualifier matches a + // qualifier in this list can be accessed as .. Other columns can be accessed as + // a list through .Column field. + Columns []*BigtableColumn + + // The encoding of the values when the type is not STRING. Acceptable encoding values are: + // - TEXT - indicates values are alphanumeric text strings. + // - BINARY - indicates values are encoded using HBase Bytes.toBytes family of functions. + // This can be overridden for a specific column by listing that column in 'columns' and + // specifying an encoding for it. + Encoding string + + // If true, only the latest version of values are exposed for all columns in this + // column family. This can be overridden for a specific column by listing that + // column in 'columns' and specifying a different setting for that column. + OnlyReadLatest bool + + // The type to convert the value in cells of this + // column family. The values are expected to be encoded using HBase + // Bytes.toBytes function when using the BINARY encoding value. + // Following BigQuery types are allowed (case-sensitive): + // BYTES STRING INTEGER FLOAT BOOLEAN. + // The default type is BYTES. This can be overridden for a specific column by + // listing that column in 'columns' and specifying a type for it. + Type string +} + +func (b *BigtableColumnFamily) toBQ() *bq.BigtableColumnFamily { + q := &bq.BigtableColumnFamily{ + FamilyId: b.FamilyID, + Encoding: b.Encoding, + OnlyReadLatest: b.OnlyReadLatest, + Type: b.Type, + } + for _, col := range b.Columns { + q.Columns = append(q.Columns, col.toBQ()) + } + return q +} + +func bqToBigtableColumnFamily(q *bq.BigtableColumnFamily) (*BigtableColumnFamily, error) { + b := &BigtableColumnFamily{ + FamilyID: q.FamilyId, + Encoding: q.Encoding, + OnlyReadLatest: q.OnlyReadLatest, + Type: q.Type, + } + for _, col := range q.Columns { + c, err := bqToBigtableColumn(col) + if err != nil { + return nil, err + } + b.Columns = append(b.Columns, c) + } + return b, nil +} + +// BigtableColumn describes how BigQuery should access a Bigtable column. +type BigtableColumn struct { + // Qualifier of the column. Columns in the parent column family that have this + // exact qualifier are exposed as . field. The column field name is the + // same as the column qualifier. + Qualifier string + + // If the qualifier is not a valid BigQuery field identifier i.e. does not match + // [a-zA-Z][a-zA-Z0-9_]*, a valid identifier must be provided as the column field + // name and is used as field name in queries. + FieldName string + + // If true, only the latest version of values are exposed for this column. + // See BigtableColumnFamily.OnlyReadLatest. + OnlyReadLatest bool + + // The encoding of the values when the type is not STRING. + // See BigtableColumnFamily.Encoding + Encoding string + + // The type to convert the value in cells of this column. + // See BigtableColumnFamily.Type + Type string +} + +func (b *BigtableColumn) toBQ() *bq.BigtableColumn { + q := &bq.BigtableColumn{ + FieldName: b.FieldName, + OnlyReadLatest: b.OnlyReadLatest, + Encoding: b.Encoding, + Type: b.Type, + } + if utf8.ValidString(b.Qualifier) { + q.QualifierString = b.Qualifier + } else { + q.QualifierEncoded = base64.RawStdEncoding.EncodeToString([]byte(b.Qualifier)) + } + return q +} + +func bqToBigtableColumn(q *bq.BigtableColumn) (*BigtableColumn, error) { + b := &BigtableColumn{ + FieldName: q.FieldName, + OnlyReadLatest: q.OnlyReadLatest, + Encoding: q.Encoding, + Type: q.Type, + } + if q.QualifierString != "" { + b.Qualifier = q.QualifierString + } else { + bytes, err := base64.RawStdEncoding.DecodeString(q.QualifierEncoded) + if err != nil { + return nil, err + } + b.Qualifier = string(bytes) + } + return b, nil +} + +// ParquetOptions are additional options for Parquet external data sources. +type ParquetOptions struct { + // EnumAsString indicates whether to infer Parquet ENUM logical type as + // STRING instead of BYTES by default. + EnumAsString bool + + // EnableListInference indicates whether to use schema inference + // specifically for Parquet LIST logical type. + EnableListInference bool +} + +func (o *ParquetOptions) populateExternalDataConfig(c *bq.ExternalDataConfiguration) { + if o != nil { + c.ParquetOptions = &bq.ParquetOptions{ + EnumAsString: o.EnumAsString, + EnableListInference: o.EnableListInference, + } + } +} + +func bqToParquetOptions(q *bq.ParquetOptions) *ParquetOptions { + if q == nil { + return nil + } + return &ParquetOptions{ + EnumAsString: q.EnumAsString, + EnableListInference: q.EnableListInference, + } +} + +// HivePartitioningMode is used in conjunction with HivePartitioningOptions. +type HivePartitioningMode string + +const ( + // AutoHivePartitioningMode automatically infers partitioning key and types. + AutoHivePartitioningMode HivePartitioningMode = "AUTO" + // StringHivePartitioningMode automatically infers partitioning keys and treats values as string. + StringHivePartitioningMode HivePartitioningMode = "STRINGS" + // CustomHivePartitioningMode allows custom definition of the external partitioning. + CustomHivePartitioningMode HivePartitioningMode = "CUSTOM" +) + +// HivePartitioningOptions defines the behavior of Hive partitioning +// when working with external data. +type HivePartitioningOptions struct { + + // Mode defines which hive partitioning mode to use when reading data. + Mode HivePartitioningMode + + // When hive partition detection is requested, a common prefix for + // all source uris should be supplied. The prefix must end immediately + // before the partition key encoding begins. + // + // For example, consider files following this data layout. + // gs://bucket/path_to_table/dt=2019-01-01/country=BR/id=7/file.avro + // gs://bucket/path_to_table/dt=2018-12-31/country=CA/id=3/file.avro + // + // When hive partitioning is requested with either AUTO or STRINGS + // detection, the common prefix can be either of + // gs://bucket/path_to_table or gs://bucket/path_to_table/ (trailing + // slash does not matter). + SourceURIPrefix string + + // If set to true, queries against this external table require + // a partition filter to be present that can perform partition + // elimination. Hive-partitioned load jobs with this field + // set to true will fail. + RequirePartitionFilter bool +} + +func (o *HivePartitioningOptions) toBQ() *bq.HivePartitioningOptions { + if o == nil { + return nil + } + return &bq.HivePartitioningOptions{ + Mode: string(o.Mode), + SourceUriPrefix: o.SourceURIPrefix, + RequirePartitionFilter: o.RequirePartitionFilter, + } +} + +func bqToHivePartitioningOptions(q *bq.HivePartitioningOptions) *HivePartitioningOptions { + if q == nil { + return nil + } + return &HivePartitioningOptions{ + Mode: HivePartitioningMode(q.Mode), + SourceURIPrefix: q.SourceUriPrefix, + RequirePartitionFilter: q.RequirePartitionFilter, + } +} diff --git a/vendor/cloud.google.com/go/bigquery/extract.go b/vendor/cloud.google.com/go/bigquery/extract.go new file mode 100644 index 000000000000..1687f7b09ee3 --- /dev/null +++ b/vendor/cloud.google.com/go/bigquery/extract.go @@ -0,0 +1,167 @@ +// Copyright 2016 Google LLC +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +package bigquery + +import ( + "context" + "time" + + "cloud.google.com/go/internal/trace" + bq "google.golang.org/api/bigquery/v2" +) + +// ExtractConfig holds the configuration for an extract job. +type ExtractConfig struct { + // Src is the table from which data will be extracted. + // Only one of Src or SrcModel should be specified. + Src *Table + + // SrcModel is the ML model from which the data will be extracted. + // Only one of Src or SrcModel should be specified. + SrcModel *Model + + // Dst is the destination into which the data will be extracted. + Dst *GCSReference + + // DisableHeader disables the printing of a header row in exported data. + DisableHeader bool + + // The labels associated with this job. + Labels map[string]string + + // For Avro-based extracts, controls whether logical type annotations are generated. + // + // Example: With this enabled, writing a BigQuery TIMESTAMP column will result in + // an integer column annotated with the appropriate timestamp-micros/millis annotation + // in the resulting Avro files. + UseAvroLogicalTypes bool + + // Sets a best-effort deadline on a specific job. If job execution exceeds this + // timeout, BigQuery may attempt to cancel this work automatically. + // + // This deadline cannot be adjusted or removed once the job is created. Consider + // using Job.Cancel in situations where you need more dynamic behavior. + // + // Experimental: this option is experimental and may be modified or removed in future versions, + // regardless of any other documented package stability guarantees. + JobTimeout time.Duration + + // The reservation that job would use. User can specify a reservation to + // execute the job. If reservation is not set, reservation is determined + // based on the rules defined by the reservation assignments. The expected + // format is + // `projects/{project}/locations/{location}/reservations/{reservation}`. + Reservation string +} + +func (e *ExtractConfig) toBQ() *bq.JobConfiguration { + var printHeader *bool + if e.DisableHeader { + f := false + printHeader = &f + } + cfg := &bq.JobConfiguration{ + Labels: e.Labels, + Extract: &bq.JobConfigurationExtract{ + DestinationUris: append([]string{}, e.Dst.URIs...), + Compression: string(e.Dst.Compression), + DestinationFormat: string(e.Dst.DestinationFormat), + FieldDelimiter: e.Dst.FieldDelimiter, + + PrintHeader: printHeader, + UseAvroLogicalTypes: e.UseAvroLogicalTypes, + }, + JobTimeoutMs: e.JobTimeout.Milliseconds(), + Reservation: e.Reservation, + } + if e.Src != nil { + cfg.Extract.SourceTable = e.Src.toBQ() + } + if e.SrcModel != nil { + cfg.Extract.SourceModel = e.SrcModel.toBQ() + } + return cfg +} + +func bqToExtractConfig(q *bq.JobConfiguration, c *Client) *ExtractConfig { + qe := q.Extract + return &ExtractConfig{ + Labels: q.Labels, + Dst: &GCSReference{ + URIs: qe.DestinationUris, + Compression: Compression(qe.Compression), + DestinationFormat: DataFormat(qe.DestinationFormat), + FileConfig: FileConfig{ + CSVOptions: CSVOptions{ + FieldDelimiter: qe.FieldDelimiter, + }, + }, + }, + DisableHeader: qe.PrintHeader != nil && !*qe.PrintHeader, + Src: bqToTable(qe.SourceTable, c), + SrcModel: bqToModel(qe.SourceModel, c), + UseAvroLogicalTypes: qe.UseAvroLogicalTypes, + JobTimeout: time.Duration(q.JobTimeoutMs) * time.Millisecond, + Reservation: q.Reservation, + } +} + +// An Extractor extracts data from a BigQuery table into Google Cloud Storage. +type Extractor struct { + JobIDConfig + ExtractConfig + c *Client +} + +// ExtractorTo returns an Extractor which can be used to extract data from a +// BigQuery table into Google Cloud Storage. +// The returned Extractor may optionally be further configured before its Run method is called. +func (t *Table) ExtractorTo(dst *GCSReference) *Extractor { + return &Extractor{ + c: t.c, + ExtractConfig: ExtractConfig{ + Src: t, + Dst: dst, + }, + } +} + +// ExtractorTo returns an Extractor which can be persist a BigQuery Model into +// Google Cloud Storage. +// The returned Extractor may be further configured before its Run method is called. +func (m *Model) ExtractorTo(dst *GCSReference) *Extractor { + return &Extractor{ + c: m.c, + ExtractConfig: ExtractConfig{ + SrcModel: m, + Dst: dst, + }, + } +} + +// Run initiates an extract job. +func (e *Extractor) Run(ctx context.Context) (j *Job, err error) { + ctx = trace.StartSpan(ctx, "cloud.google.com/go/bigquery.Extractor.Run") + defer func() { trace.EndSpan(ctx, err) }() + + return e.c.insertJob(ctx, e.newJob(), nil) +} + +func (e *Extractor) newJob() *bq.Job { + return &bq.Job{ + JobReference: e.JobIDConfig.createJobRef(e.c), + Configuration: e.ExtractConfig.toBQ(), + } +} diff --git a/vendor/cloud.google.com/go/bigquery/file.go b/vendor/cloud.google.com/go/bigquery/file.go new file mode 100644 index 000000000000..9afdbb53599d --- /dev/null +++ b/vendor/cloud.google.com/go/bigquery/file.go @@ -0,0 +1,167 @@ +// Copyright 2016 Google LLC +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +package bigquery + +import ( + "io" + + bq "google.golang.org/api/bigquery/v2" +) + +// A ReaderSource is a source for a load operation that gets +// data from an io.Reader. +// +// When a ReaderSource is part of a LoadConfig obtained via Job.Config, +// its internal io.Reader will be nil, so it cannot be used for a +// subsequent load operation. +type ReaderSource struct { + r io.Reader + FileConfig +} + +// NewReaderSource creates a ReaderSource from an io.Reader. You may +// optionally configure properties on the ReaderSource that describe the +// data being read, before passing it to Table.LoaderFrom. +func NewReaderSource(r io.Reader) *ReaderSource { + return &ReaderSource{r: r} +} + +func (r *ReaderSource) populateLoadConfig(lc *bq.JobConfigurationLoad) io.Reader { + r.FileConfig.populateLoadConfig(lc) + return r.r +} + +// FileConfig contains configuration options that pertain to files, typically +// text files that require interpretation to be used as a BigQuery table. A +// file may live in Google Cloud Storage (see GCSReference), or it may be +// loaded into a table via the Table.LoaderFromReader. +type FileConfig struct { + // SourceFormat is the format of the data to be read. + // Allowed values are: Avro, CSV, DatastoreBackup, JSON, ORC, and Parquet. The default is CSV. + SourceFormat DataFormat + + // Indicates if we should automatically infer the options and + // schema for CSV and JSON sources. + AutoDetect bool + + // MaxBadRecords is the maximum number of bad records that will be ignored + // when reading data. + MaxBadRecords int64 + + // IgnoreUnknownValues causes values not matching the schema to be + // tolerated. Unknown values are ignored. For CSV this ignores extra values + // at the end of a line. For JSON this ignores named values that do not + // match any column name. If this field is not set, records containing + // unknown values are treated as bad records. The MaxBadRecords field can + // be used to customize how bad records are handled. + IgnoreUnknownValues bool + + // Schema describes the data. It is required when reading CSV or JSON data, + // unless the data is being loaded into a table that already exists. + Schema Schema + + // Additional options for CSV files. + CSVOptions + + // Additional options for Parquet files. + ParquetOptions *ParquetOptions + + // Additional options for Avro files. + AvroOptions *AvroOptions +} + +func (fc *FileConfig) populateLoadConfig(conf *bq.JobConfigurationLoad) { + conf.SkipLeadingRows = fc.SkipLeadingRows + conf.SourceFormat = string(fc.SourceFormat) + conf.Autodetect = fc.AutoDetect + conf.AllowJaggedRows = fc.AllowJaggedRows + conf.AllowQuotedNewlines = fc.AllowQuotedNewlines + conf.Encoding = string(fc.Encoding) + conf.FieldDelimiter = fc.FieldDelimiter + conf.IgnoreUnknownValues = fc.IgnoreUnknownValues + conf.MaxBadRecords = fc.MaxBadRecords + conf.NullMarker = fc.NullMarker + conf.PreserveAsciiControlCharacters = fc.PreserveASCIIControlCharacters + if fc.Schema != nil { + conf.Schema = fc.Schema.toBQ() + } + if fc.ParquetOptions != nil { + conf.ParquetOptions = &bq.ParquetOptions{ + EnumAsString: fc.ParquetOptions.EnumAsString, + EnableListInference: fc.ParquetOptions.EnableListInference, + } + } + if fc.AvroOptions != nil { + conf.UseAvroLogicalTypes = fc.AvroOptions.UseAvroLogicalTypes + } + conf.Quote = fc.quote() +} + +func bqPopulateFileConfig(conf *bq.JobConfigurationLoad, fc *FileConfig) { + fc.SourceFormat = DataFormat(conf.SourceFormat) + fc.AutoDetect = conf.Autodetect + fc.MaxBadRecords = conf.MaxBadRecords + fc.IgnoreUnknownValues = conf.IgnoreUnknownValues + fc.Schema = bqToSchema(conf.Schema) + fc.SkipLeadingRows = conf.SkipLeadingRows + fc.AllowJaggedRows = conf.AllowJaggedRows + fc.AllowQuotedNewlines = conf.AllowQuotedNewlines + fc.Encoding = Encoding(conf.Encoding) + fc.FieldDelimiter = conf.FieldDelimiter + fc.CSVOptions.NullMarker = conf.NullMarker + fc.CSVOptions.PreserveASCIIControlCharacters = conf.PreserveAsciiControlCharacters + fc.CSVOptions.setQuote(conf.Quote) +} + +func (fc *FileConfig) populateExternalDataConfig(conf *bq.ExternalDataConfiguration) { + format := fc.SourceFormat + if format == "" { + // Format must be explicitly set for external data sources. + format = CSV + } + conf.Autodetect = fc.AutoDetect + conf.IgnoreUnknownValues = fc.IgnoreUnknownValues + conf.MaxBadRecords = fc.MaxBadRecords + conf.SourceFormat = string(format) + if fc.Schema != nil { + conf.Schema = fc.Schema.toBQ() + } + if format == CSV { + fc.CSVOptions.populateExternalDataConfig(conf) + } + if fc.AvroOptions != nil { + conf.AvroOptions = &bq.AvroOptions{ + UseAvroLogicalTypes: fc.AvroOptions.UseAvroLogicalTypes, + } + } + if fc.ParquetOptions != nil { + conf.ParquetOptions = &bq.ParquetOptions{ + EnumAsString: fc.ParquetOptions.EnumAsString, + EnableListInference: fc.ParquetOptions.EnableListInference, + } + } +} + +// Encoding specifies the character encoding of data to be loaded into BigQuery. +// See https://cloud.google.com/bigquery/docs/reference/v2/jobs#configuration.load.encoding +// for more details about how this is used. +type Encoding string + +const ( + // UTF_8 specifies the UTF-8 encoding type. + UTF_8 Encoding = "UTF-8" + // ISO_8859_1 specifies the ISO-8859-1 encoding type. + ISO_8859_1 Encoding = "ISO-8859-1" +) diff --git a/vendor/cloud.google.com/go/bigquery/gcs.go b/vendor/cloud.google.com/go/bigquery/gcs.go new file mode 100644 index 000000000000..977fd0090620 --- /dev/null +++ b/vendor/cloud.google.com/go/bigquery/gcs.go @@ -0,0 +1,81 @@ +// Copyright 2015 Google LLC +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +package bigquery + +import ( + "io" + + bq "google.golang.org/api/bigquery/v2" +) + +// GCSReference is a reference to one or more Google Cloud Storage objects, which together constitute +// an input or output to a BigQuery operation. +type GCSReference struct { + // URIs refer to Google Cloud Storage objects. + URIs []string + + FileConfig + + // DestinationFormat is the format to use when writing exported files. + // Allowed values are: CSV, Avro, JSON. The default is CSV. + // CSV is not supported for tables with nested or repeated fields. + DestinationFormat DataFormat + + // Compression specifies the type of compression to apply when writing data + // to Google Cloud Storage, or using this GCSReference as an ExternalData + // source with CSV or JSON SourceFormat. Default is None. + // + // Avro files allow additional compression types: DEFLATE and SNAPPY. + Compression Compression +} + +// NewGCSReference constructs a reference to one or more Google Cloud Storage objects, which together constitute a data source or destination. +// In the simple case, a single URI in the form gs://bucket/object may refer to a single GCS object. +// Data may also be split into mutiple files, if multiple URIs or URIs containing wildcards are provided. +// Each URI may contain one '*' wildcard character, which (if present) must come after the bucket name. +// For more information about the treatment of wildcards and multiple URIs, +// see https://cloud.google.com/bigquery/exporting-data-from-bigquery#exportingmultiple +func NewGCSReference(uri ...string) *GCSReference { + return &GCSReference{URIs: uri} +} + +// Compression is the type of compression to apply when writing data to Google Cloud Storage. +type Compression string + +const ( + // None specifies no compression. + None Compression = "NONE" + // Gzip specifies gzip compression. + Gzip Compression = "GZIP" + // Deflate specifies DEFLATE compression for Avro files. + Deflate Compression = "DEFLATE" + // Snappy specifies SNAPPY compression for Avro files. + Snappy Compression = "SNAPPY" +) + +func (gcs *GCSReference) populateLoadConfig(lc *bq.JobConfigurationLoad) io.Reader { + lc.SourceUris = gcs.URIs + gcs.FileConfig.populateLoadConfig(lc) + return nil +} + +func (gcs *GCSReference) toBQ() bq.ExternalDataConfiguration { + conf := bq.ExternalDataConfiguration{ + Compression: string(gcs.Compression), + SourceUris: append([]string{}, gcs.URIs...), + } + gcs.FileConfig.populateExternalDataConfig(&conf) + return conf +} diff --git a/vendor/cloud.google.com/go/bigquery/iam.go b/vendor/cloud.google.com/go/bigquery/iam.go new file mode 100644 index 000000000000..00059345b1b8 --- /dev/null +++ b/vendor/cloud.google.com/go/bigquery/iam.go @@ -0,0 +1,142 @@ +// Copyright 2020 Google LLC +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +package bigquery + +import ( + "context" + "errors" + "fmt" + + "cloud.google.com/go/iam" + "cloud.google.com/go/iam/apiv1/iampb" + "cloud.google.com/go/internal/trace" + bq "google.golang.org/api/bigquery/v2" +) + +// IAM provides access to an iam.Handle that allows access to IAM functionality for +// the given BigQuery table. For more information, see +// https://pkg.go.dev/cloud.google.com/go/iam +func (t *Table) IAM() *iam.Handle { + return iam.InternalNewHandleClient(&bqIAMClient{ + bqs: t.c.bqs, + }, fmt.Sprintf("projects/%s/datasets/%s/tables/%s", + t.ProjectID, t.DatasetID, t.TableID)) +} + +// bqIAMClient is a client that satisfies the IAM "client" interface. +// +// This client has an explicit assumption that it's only working with Table resources. +type bqIAMClient struct { + bqs *bq.Service +} + +func (c *bqIAMClient) Get(ctx context.Context, resource string) (p *iampb.Policy, err error) { + return c.GetWithVersion(ctx, resource, 1) +} + +func (c *bqIAMClient) GetWithVersion(ctx context.Context, resource string, requestedPolicyVersion int32) (p *iampb.Policy, err error) { + if requestedPolicyVersion > 1 { + return nil, errors.New("bigquery: only IAM policy version 1 is supported") + } + ctx = trace.StartSpan(ctx, "cloud.google.com/go/bigquery.IAM.Get") + defer func() { trace.EndSpan(ctx, err) }() + + iamReq := &bq.GetIamPolicyRequest{ + Options: &bq.GetPolicyOptions{ + RequestedPolicyVersion: int64(requestedPolicyVersion), + }, + } + call := c.bqs.Tables.GetIamPolicy(resource, iamReq).Context(ctx) + setClientHeader(call.Header()) + + var bqp *bq.Policy + err = runWithRetry(ctx, func() error { + bqp, err = call.Do() + return err + }) + if err != nil { + return nil, err + } + return iamFromBigQueryPolicy(bqp), nil +} + +func (c *bqIAMClient) Set(ctx context.Context, resource string, p *iampb.Policy) (err error) { + ctx = trace.StartSpan(ctx, "cloud.google.com/go/bigquery.IAM.Set") + defer func() { trace.EndSpan(ctx, err) }() + + bqp := iamToBigQueryPolicy(p) + call := c.bqs.Tables.SetIamPolicy(resource, &bq.SetIamPolicyRequest{Policy: bqp}).Context(ctx) + setClientHeader(call.Header()) + return runWithRetry(ctx, func() error { + _, err := call.Do() + return err + }) +} + +func (c *bqIAMClient) Test(ctx context.Context, resource string, perms []string) (p []string, err error) { + ctx = trace.StartSpan(ctx, "cloud.google.com/go/bigquery.IAM.Test") + defer func() { trace.EndSpan(ctx, err) }() + + call := c.bqs.Tables.TestIamPermissions(resource, &bq.TestIamPermissionsRequest{Permissions: perms}).Context(ctx) + setClientHeader(call.Header()) + + var res *bq.TestIamPermissionsResponse + err = runWithRetry(ctx, func() error { + res, err = call.Do() + return err + }) + if err != nil { + return nil, err + } + return res.Permissions, nil +} + +func iamToBigQueryPolicy(ip *iampb.Policy) *bq.Policy { + return &bq.Policy{ + Bindings: iamToBigQueryBindings(ip.Bindings), + Etag: string(ip.Etag), + Version: int64(ip.Version), + } +} + +func iamToBigQueryBindings(ibs []*iampb.Binding) []*bq.Binding { + var bqBindings []*bq.Binding + for _, ib := range ibs { + bqBindings = append(bqBindings, &bq.Binding{ + Role: ib.Role, + Members: ib.Members, + }) + } + return bqBindings +} + +func iamFromBigQueryPolicy(bqPolicy *bq.Policy) *iampb.Policy { + return &iampb.Policy{ + Bindings: iamFromBigQueryBindings(bqPolicy.Bindings), + Etag: []byte(bqPolicy.Etag), + Version: int32(bqPolicy.Version), + } +} + +func iamFromBigQueryBindings(bqBindings []*bq.Binding) []*iampb.Binding { + var ibs []*iampb.Binding + for _, bqb := range bqBindings { + ibs = append(ibs, &iampb.Binding{ + Role: bqb.Role, + Members: bqb.Members, + }) + } + return ibs +} diff --git a/vendor/cloud.google.com/go/bigquery/inserter.go b/vendor/cloud.google.com/go/bigquery/inserter.go new file mode 100644 index 000000000000..5cc30d0dd520 --- /dev/null +++ b/vendor/cloud.google.com/go/bigquery/inserter.go @@ -0,0 +1,249 @@ +// Copyright 2015 Google LLC +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +package bigquery + +import ( + "context" + "errors" + "fmt" + "reflect" + + "cloud.google.com/go/internal/trace" + bq "google.golang.org/api/bigquery/v2" +) + +// NoDedupeID indicates a streaming insert row wants to opt out of best-effort +// deduplication. +// It is EXPERIMENTAL and subject to change or removal without notice. +const NoDedupeID = "NoDedupeID" + +// An Inserter does streaming inserts into a BigQuery table. +// It is safe for concurrent use. +type Inserter struct { + t *Table + + // SkipInvalidRows causes rows containing invalid data to be silently + // ignored. The default value is false, which causes the entire request to + // fail if there is an attempt to insert an invalid row. + SkipInvalidRows bool + + // IgnoreUnknownValues causes values not matching the schema to be ignored. + // The default value is false, which causes records containing such values + // to be treated as invalid records. + IgnoreUnknownValues bool + + // A TableTemplateSuffix allows Inserters to create tables automatically. + // + // Experimental: this option is experimental and may be modified or removed in future versions, + // regardless of any other documented package stability guarantees. In general, + // the BigQuery team recommends the use of partitioned tables over sharding + // tables by suffix. + // + // When you specify a suffix, the table you upload data to + // will be used as a template for creating a new table, with the same schema, + // called