@@ -41,7 +41,7 @@ var _ = g.Describe("[sig-mco][Suite:openshift/machine-config-operator/disruptive
4141 preChecks (oc )
4242 })
4343
44- g .It ("PolarionID:59417- MCD create/update password with MachineConfig in CoreOS nodes" , func () {
44+ g .It ("[ PolarionID:59417][OTP] MCD create/update password with MachineConfig in CoreOS nodes" , func () {
4545 var (
4646 mcName = "tc-59417-test-core-passwd"
4747 mcc = NewController (oc .AsAdmin ()).IgnoreLogsBeforeNowOrFail ()
@@ -129,7 +129,7 @@ var _ = g.Describe("[sig-mco][Suite:openshift/machine-config-operator/disruptive
129129
130130 })
131131
132- g .It ("PolarionID:72137- Create a password for a user different from 'core' user" , func () {
132+ g .It ("[ PolarionID:72137][OTP] Create a password for a user different from 'core' user" , func () {
133133 var (
134134 mcName = "mco-tc-59900-wrong-user-password"
135135 wrongUser = "root"
@@ -149,7 +149,7 @@ var _ = g.Describe("[sig-mco][Suite:openshift/machine-config-operator/disruptive
149149 })
150150
151151 // https://issues.redhat.com/browse/MCO-1696
152- g .It ("PolarionID:59424- ssh keys can be found in new dir on RHCOS9 node" , func () {
152+ g .It ("[ PolarionID:59424][OTP] ssh keys can be found in new dir on RHCOS9 node" , func () {
153153 var (
154154 allCoreOsNodes = wMcp .GetCoreOsNodesOrFail ()
155155 allMasters = mMcp .GetNodesOrFail ()
@@ -191,7 +191,7 @@ var _ = g.Describe("[sig-mco][Suite:openshift/machine-config-operator/disruptive
191191 }
192192 })
193193
194- g .It ("PolarionID:59426- ssh keys can be updated in new dir on RHCOS9 node" , func () {
194+ g .It ("[ PolarionID:59426][LEVEL0][OTP] ssh keys can be updated in new dir on RHCOS9 node" , func () {
195195
196196 var (
197197 mcName = "tc-59426-add-ssh-key"
@@ -276,7 +276,7 @@ var _ = g.Describe("[sig-mco][Suite:openshift/machine-config-operator/disruptive
276276
277277 })
278278
279- g .It ("PolarionID:62533- Passwd login must not work with ssh" , func () {
279+ g .It ("[ PolarionID:62533][OTP] Passwd login must not work with ssh" , func () {
280280 var (
281281 mcName = "tc-62533-test-passwd-ssh-login"
282282 password = exutil .GetRandomString ()
@@ -312,7 +312,7 @@ var _ = g.Describe("[sig-mco][Suite:openshift/machine-config-operator/disruptive
312312 logger .Infof ("OK!\n " )
313313 })
314314
315- g .It ("PolarionID:64986- Remove all ssh keys" , func () {
315+ g .It ("[ PolarionID:64986][OTP] Remove all ssh keys" , func () {
316316 var (
317317 sshMCName = "99-" + mcp .GetName () + "-ssh"
318318 backupMCFile = filepath .Join (e2e .TestContext .OutputDir , "tc-64986-" + sshMCName + ".backup.json" )
@@ -373,7 +373,7 @@ var _ = g.Describe("[sig-mco][Suite:openshift/machine-config-operator/disruptive
373373 logger .Infof ("OK!\n " )
374374 })
375375
376- g .It ("PolarionID:75552- apply ssh keys when root owns .ssh" , func () {
376+ g .It ("[ PolarionID:75552][OTP] apply ssh keys when root owns .ssh" , func () {
377377 var (
378378 node = mcp .GetSortedNodesOrFail ()[0 ]
379379 authKeysdDir = NewRemoteFile (node , "/home/core/.ssh/authorized_keys.d" )
0 commit comments