@@ -75,7 +75,7 @@ var _ bool = ginkgo.Describe("[rwx-vmsvc-vm] RWX support with VMService Vms", fu
7575 adminClient clientset.Interface
7676 userName string
7777 fullSyncWaitTime int
78- clusterRef types.ManagedObjectReference
78+ // clusterRef types.ManagedObjectReference
7979 )
8080
8181 ginkgo .BeforeEach (func () {
@@ -169,9 +169,9 @@ var _ bool = ginkgo.Describe("[rwx-vmsvc-vm] RWX support with VMService Vms", fu
169169 }
170170 }
171171
172- clusterName := env .GetAndExpectStringEnvVar (constants .EnvComputeClusterName )
172+ /* clusterName := env.GetAndExpectStringEnvVar(constants.EnvComputeClusterName)
173173 clusterRef, err = vcutil.GetClusterRefFromClusterName(ctx, e2eTestConfig, clusterName)
174- gomega .Expect (err ).NotTo (gomega .HaveOccurred ())
174+ gomega.Expect(err).NotTo(gomega.HaveOccurred())*/
175175
176176 })
177177
@@ -288,10 +288,10 @@ var _ bool = ginkgo.Describe("[rwx-vmsvc-vm] RWX support with VMService Vms", fu
288288 gomega .Expect (err ).NotTo (gomega .HaveOccurred ())
289289 }
290290
291- ginkgo .By ("verify ACL permissions on file share volumes" )
291+ /* ginkgo.By("verify ACL permissions on file share volumes")
292292 vsanFileShares := vcutil.QueryVsanFileShares(ctx, e2eTestConfig, []string{volHandle}, clusterRef)
293293 err = VerifyACLPermissionsOnFileShare(vsanFileShares, volHandle, vmIPs)
294- gomega .Expect (err ).NotTo (gomega .HaveOccurred ())
294+ gomega.Expect(err).NotTo(gomega.HaveOccurred())*/
295295
296296 ginkgo .By ("Create volume snapshot class" )
297297 volumeSnapshotClass , err := csisnapshot .CreateVolumeSnapshotClass (ctx , e2eTestConfig , snapc , constants .DeletionPolicy )
@@ -307,14 +307,14 @@ var _ bool = ginkgo.Describe("[rwx-vmsvc-vm] RWX support with VMService Vms", fu
307307 namespace , volumeSnapshot .Name , pandoraSyncWaitTime )
308308 }()
309309 framework .Logf ("Volume snapshot name is : %s" , volumeSnapshot .Name )
310- expectedErrMsg := "queried volume doesn't have the expected volume type"
310+ /* expectedErrMsg := "queried volume doesn't have the expected volume type"
311311 volumeSnapshot, err = snapc.SnapshotV1().VolumeSnapshots(namespace).Get(ctx,
312312 volumeSnapshot.Name, metav1.GetOptions{})
313313 actualErr := volumeSnapshot.Status.Error
314314 framework.Logf("Expected error: %s, actual error: %s", expectedErrMsg, *actualErr.Message)
315315 if !strings.Contains(*actualErr.Message, expectedErrMsg) {
316316 framework.Failf("Expected error: %s, actual error: %s", expectedErrMsg, *actualErr.Message)
317- }
317+ }*/
318318
319319 ginkgo .By ("Expanding the current pvc" )
320320 currentPvcSize := pvc .Spec .Resources .Requests [v1 .ResourceStorage ]
@@ -442,10 +442,10 @@ var _ bool = ginkgo.Describe("[rwx-vmsvc-vm] RWX support with VMService Vms", fu
442442 gomega .Expect (err ).NotTo (gomega .HaveOccurred ())
443443 }
444444
445- ginkgo .By ("verify ACL permissions on file share volumes" )
445+ /* ginkgo.By("verify ACL permissions on file share volumes")
446446 vsanFileShares := vcutil.QueryVsanFileShares(ctx, e2eTestConfig, []string{volHandle}, clusterRef)
447447 err = VerifyACLPermissionsOnFileShare(vsanFileShares, volHandle, vmIPs)
448- gomega .Expect (err ).NotTo (gomega .HaveOccurred ())
448+ gomega.Expect(err).NotTo(gomega.HaveOccurred())*/
449449
450450 err = fpv .DeletePersistentVolumeClaim (ctx , client , pvc .Name , namespace )
451451 gomega .Expect (err ).NotTo (gomega .HaveOccurred ())
@@ -589,9 +589,9 @@ var _ bool = ginkgo.Describe("[rwx-vmsvc-vm] RWX support with VMService Vms", fu
589589 gomega .Expect (err ).NotTo (gomega .HaveOccurred ())
590590 }
591591
592- ginkgo .By ("verify ACL permissions on file share volumes" )
592+ /* ginkgo.By("verify ACL permissions on file share volumes")
593593 vsanFileShares := vcutil.QueryVsanFileShares(ctx, e2eTestConfig, []string{volHandle}, clusterRef)
594594 err = VerifyACLPermissionsOnFileShare(vsanFileShares, volHandle, vmIPs)
595- gomega .Expect (err ).NotTo (gomega .HaveOccurred ())
595+ gomega.Expect(err).NotTo(gomega.HaveOccurred())*/
596596 })
597597})
0 commit comments