Skip to content

Conversation

@petr-muller
Copy link
Member

@petr-muller petr-muller commented Jul 4, 2025

  • Add a new subdirectory to hold OTA-owned oc adm upgrade subcommand tests
  • Add a way to pass env vars to oc CLI to enable gated subcommand testing
  • When not updating, the command emits a simple message stating just that

This has some overlap with #29831 (code placement, ownership, client support for enabling environment variables)

@openshift-ci-robot
Copy link

openshift-ci-robot commented Jul 4, 2025

@petr-muller: This pull request references OTA-1580 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "4.20.0" version, but no target version was set.

Details

In response to this:

  • Add a new subdirectory to hold OTA-owned oc adm upgrade subcommand tests
  • Add a way to pass env vars to oc CLI to enable gated subcommand testing
  • When not updating, the command emits a simple message stating just that

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Jul 4, 2025
@openshift-ci openshift-ci bot requested review from deads2k and mike-nguyen July 4, 2025 17:03
@petr-muller
Copy link
Member Author

/test e2e-gcp-ovn-techpreview
/test e2e-aws-ovn-single-node-techpreview
/test e2e-aws-ovn-virt-techpreview

@petr-muller petr-muller force-pushed the ota-1580-test-oc-adm-upgrade-status branch from dafa750 to d21513e Compare July 4, 2025 17:08
@petr-muller
Copy link
Member Author

/test e2e-gcp-ovn-techpreview
/test e2e-aws-ovn-single-node-techpreview
/test e2e-aws-ovn-virt-techpreview

@petr-muller
Copy link
Member Author

/test e2e-gcp-ovn-techpreview
/test e2e-aws-ovn-single-node-techpreview

2 similar comments
@petr-muller
Copy link
Member Author

/test e2e-gcp-ovn-techpreview
/test e2e-aws-ovn-single-node-techpreview

@petr-muller
Copy link
Member Author

/test e2e-gcp-ovn-techpreview
/test e2e-aws-ovn-single-node-techpreview

@openshift-ci-robot
Copy link

openshift-ci-robot commented Jul 11, 2025

@petr-muller: This pull request references OTA-1580 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "4.20.0" version, but no target version was set.

Details

In response to this:

  • Add a new subdirectory to hold OTA-owned oc adm upgrade subcommand tests
  • Add a way to pass env vars to oc CLI to enable gated subcommand testing
  • When not updating, the command emits a simple message stating just that

This has some overlap with #29831 (code placement, ownership, client support for enabling environment variables)

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@petr-muller
Copy link
Member Author

/retest-required

@petr-muller
Copy link
Member Author

/test ?

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jul 17, 2025

@petr-muller: The following commands are available to trigger required jobs:

/test e2e-aws-jenkins
/test e2e-aws-ovn-edge-zones
/test e2e-aws-ovn-fips
/test e2e-aws-ovn-image-registry
/test e2e-aws-ovn-serial-1of2
/test e2e-aws-ovn-serial-2of2
/test e2e-gcp-ovn
/test e2e-gcp-ovn-builds
/test e2e-gcp-ovn-image-ecosystem
/test e2e-gcp-ovn-upgrade
/test e2e-metal-ipi-ovn-ipv6
/test e2e-vsphere-ovn
/test e2e-vsphere-ovn-upi
/test images
/test lint
/test okd-scos-images
/test unit
/test verify
/test verify-deps

The following commands are available to trigger optional jobs:

/test e2e-agnostic-ovn-cmd
/test e2e-aws
/test e2e-aws-csi
/test e2e-aws-disruptive
/test e2e-aws-etcd-certrotation
/test e2e-aws-etcd-recovery
/test e2e-aws-ovn
/test e2e-aws-ovn-cgroupsv2
/test e2e-aws-ovn-etcd-scaling
/test e2e-aws-ovn-kube-apiserver-rollout
/test e2e-aws-ovn-kubevirt
/test e2e-aws-ovn-microshift
/test e2e-aws-ovn-microshift-serial
/test e2e-aws-ovn-serial-ipsec
/test e2e-aws-ovn-serial-publicnet-1of2
/test e2e-aws-ovn-serial-publicnet-2of2
/test e2e-aws-ovn-single-node
/test e2e-aws-ovn-single-node-serial
/test e2e-aws-ovn-single-node-techpreview
/test e2e-aws-ovn-single-node-techpreview-serial
/test e2e-aws-ovn-single-node-upgrade
/test e2e-aws-ovn-upgrade
/test e2e-aws-ovn-upgrade-rollback
/test e2e-aws-ovn-upi
/test e2e-aws-proxy
/test e2e-azure
/test e2e-azure-ovn-etcd-scaling
/test e2e-azure-ovn-upgrade
/test e2e-baremetalds-kubevirt
/test e2e-external-aws
/test e2e-external-aws-ccm
/test e2e-external-vsphere-ccm
/test e2e-gcp-csi
/test e2e-gcp-disruptive
/test e2e-gcp-fips-serial-1of2
/test e2e-gcp-fips-serial-2of2
/test e2e-gcp-ovn-etcd-scaling
/test e2e-gcp-ovn-rt-upgrade
/test e2e-gcp-ovn-techpreview
/test e2e-gcp-ovn-techpreview-serial-1of2
/test e2e-gcp-ovn-techpreview-serial-2of2
/test e2e-gcp-ovn-usernamespace
/test e2e-hypershift-conformance
/test e2e-metal-ipi-ovn
/test e2e-metal-ipi-ovn-bgp-virt-dualstack
/test e2e-metal-ipi-ovn-bgp-virt-dualstack-techpreview
/test e2e-metal-ipi-ovn-dualstack
/test e2e-metal-ipi-ovn-dualstack-bgp
/test e2e-metal-ipi-ovn-dualstack-bgp-local-gw
/test e2e-metal-ipi-ovn-dualstack-local-gateway
/test e2e-metal-ipi-ovn-kube-apiserver-rollout
/test e2e-metal-ipi-serial-1of2
/test e2e-metal-ipi-serial-2of2
/test e2e-metal-ipi-serial-ovn-ipv6-1of2
/test e2e-metal-ipi-serial-ovn-ipv6-2of2
/test e2e-metal-ipi-virtualmedia
/test e2e-metal-ovn-single-node-live-iso
/test e2e-metal-ovn-single-node-with-worker-live-iso
/test e2e-metal-ovn-two-node-arbiter
/test e2e-metal-ovn-two-node-fencing
/test e2e-openstack-ovn
/test e2e-openstack-serial
/test e2e-vsphere-ovn-dualstack-primaryv6
/test e2e-vsphere-ovn-etcd-scaling
/test okd-e2e-gcp
/test okd-scos-e2e-aws-ovn

Use /test all to run the following jobs that were automatically triggered:

pull-ci-openshift-origin-main-e2e-agnostic-ovn-cmd
pull-ci-openshift-origin-main-e2e-aws
pull-ci-openshift-origin-main-e2e-aws-csi
pull-ci-openshift-origin-main-e2e-aws-disruptive
pull-ci-openshift-origin-main-e2e-aws-ovn
pull-ci-openshift-origin-main-e2e-aws-ovn-cgroupsv2
pull-ci-openshift-origin-main-e2e-aws-ovn-edge-zones
pull-ci-openshift-origin-main-e2e-aws-ovn-etcd-scaling
pull-ci-openshift-origin-main-e2e-aws-ovn-fips
pull-ci-openshift-origin-main-e2e-aws-ovn-kube-apiserver-rollout
pull-ci-openshift-origin-main-e2e-aws-ovn-microshift
pull-ci-openshift-origin-main-e2e-aws-ovn-microshift-serial
pull-ci-openshift-origin-main-e2e-aws-ovn-serial-1of2
pull-ci-openshift-origin-main-e2e-aws-ovn-serial-2of2
pull-ci-openshift-origin-main-e2e-aws-ovn-serial-publicnet-1of2
pull-ci-openshift-origin-main-e2e-aws-ovn-serial-publicnet-2of2
pull-ci-openshift-origin-main-e2e-aws-ovn-single-node
pull-ci-openshift-origin-main-e2e-aws-ovn-single-node-serial
pull-ci-openshift-origin-main-e2e-aws-ovn-single-node-upgrade
pull-ci-openshift-origin-main-e2e-aws-ovn-upgrade
pull-ci-openshift-origin-main-e2e-aws-proxy
pull-ci-openshift-origin-main-e2e-azure
pull-ci-openshift-origin-main-e2e-azure-ovn-etcd-scaling
pull-ci-openshift-origin-main-e2e-azure-ovn-upgrade
pull-ci-openshift-origin-main-e2e-gcp-csi
pull-ci-openshift-origin-main-e2e-gcp-disruptive
pull-ci-openshift-origin-main-e2e-gcp-fips-serial-1of2
pull-ci-openshift-origin-main-e2e-gcp-fips-serial-2of2
pull-ci-openshift-origin-main-e2e-gcp-ovn
pull-ci-openshift-origin-main-e2e-gcp-ovn-etcd-scaling
pull-ci-openshift-origin-main-e2e-gcp-ovn-rt-upgrade
pull-ci-openshift-origin-main-e2e-gcp-ovn-upgrade
pull-ci-openshift-origin-main-e2e-hypershift-conformance
pull-ci-openshift-origin-main-e2e-metal-ipi-ovn
pull-ci-openshift-origin-main-e2e-metal-ipi-ovn-dualstack
pull-ci-openshift-origin-main-e2e-metal-ipi-ovn-dualstack-local-gateway
pull-ci-openshift-origin-main-e2e-metal-ipi-ovn-ipv6
pull-ci-openshift-origin-main-e2e-metal-ipi-ovn-kube-apiserver-rollout
pull-ci-openshift-origin-main-e2e-metal-ipi-serial-1of2
pull-ci-openshift-origin-main-e2e-metal-ipi-serial-2of2
pull-ci-openshift-origin-main-e2e-metal-ipi-serial-ovn-ipv6-1of2
pull-ci-openshift-origin-main-e2e-metal-ipi-serial-ovn-ipv6-2of2
pull-ci-openshift-origin-main-e2e-metal-ipi-virtualmedia
pull-ci-openshift-origin-main-e2e-openstack-ovn
pull-ci-openshift-origin-main-e2e-openstack-serial
pull-ci-openshift-origin-main-e2e-vsphere-ovn
pull-ci-openshift-origin-main-e2e-vsphere-ovn-dualstack-primaryv6
pull-ci-openshift-origin-main-e2e-vsphere-ovn-etcd-scaling
pull-ci-openshift-origin-main-e2e-vsphere-ovn-upi
pull-ci-openshift-origin-main-images
pull-ci-openshift-origin-main-lint
pull-ci-openshift-origin-main-okd-e2e-gcp
pull-ci-openshift-origin-main-okd-scos-e2e-aws-ovn
pull-ci-openshift-origin-main-okd-scos-images
pull-ci-openshift-origin-main-unit
pull-ci-openshift-origin-main-verify
pull-ci-openshift-origin-main-verify-deps
Details

In response to this:

/test ?

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@petr-muller
Copy link
Member Author

/test e2e-gcp-ovn-techpreview
/test e2e-aws-ovn-single-node-techpreview

@hongkailiu
Copy link
Member

/cc

@openshift-ci openshift-ci bot requested a review from hongkailiu July 17, 2025 20:09
// EnvVar sets an environment variable for the command, appended to the current process environment variables.
func (c *CLI) EnvVar(name, value string) *CLI {
if c.env == nil {
c.env = os.Environ()
Copy link
Member

@wking wking Jul 17, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: are process environment variables mutable (Setenv suggests yes?)? We might want to store the local-clobber options in the struct as a map[string]string. And then grab os.Environ() and inject the struct-property overrides within CLI.start right when we need them.

I'm fine if you don't want to address this nit. It seems unlikely that we'll be mutating environment variables within the e2e-suite process. And if we change our mind later, it would be an internal change within the CLI implementation; callers wouldn't have to adjust.

Copy link
Member Author

@petr-muller petr-muller Jul 18, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The concern would be a Setenv done between EnvVar and Run getting "lost", right? Good catch, addressed.

Copy link
Member

@wking wking left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Your approach to environment variables appending/overriding os.Environ makes sense to me. I left one nit inline, but I'm fine if you don't address the nit before this pull merges.

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Jul 17, 2025
"k8s.io/kubernetes/test/e2e/framework"
)

var _ = g.Describe("[sig-cli][OCPFeatureGate:UpgradeStatus] oc adm upgrade status", func() {
Copy link
Member

@wking wking Jul 17, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm conflicted about the [OCPFeatureGate:UpgradeStatus] tag. On the one hand, the status subcommand is tech-preview. And the UpgradeStatus feature gate exists, although it's not all that clear in #1725 whether it's trying to cover the oc-side unctionality or the planned-but-abandoned server-side APIs (openshift/enhancements#1701). Using the UpgradeStatus gate to enable this test keeps us from failing default-feature-set CI if the test starts failing, and failing default-feature-set CI on a tech-preview feature isn't desired.

On the other hand, our docs point out that you can run the tech-preview status subcommand against a default-feature-set cluster:

Your cluster does not need to be a Technology Preview-enabled cluster in order for you to use the oc adm upgrade status command.

and as your EnvVar call in the test shows, the knob that enables the status subcommand is the OC_ENABLE_CMD_UPGRADE_STATUS environment variable in the oc process, not the UpgradeStatus feature-gate in the cluster oc is connecting to. And we want CI coverage to verify we're delivering the functionality our docs claim we're delivering. But we don't currently have a CI bucket for "here's some tech-preview client-side stuff we want to confirm works against default-feature-set clusters", and it's not clear if there's enough demand to be worth creating that kind of CI flavor. So which of these options do we like most?

a. [OCPFeatureGate:UpgradeStatus] gating here. Only test the tech-preview oc subcommand against tech-preview clusters. Expose ourselves to regressions using the tech-preview oc against default-feature-gate clusters, even though we doc that as supported.
b. No OCPFeatureGate gating here. Potentially break default-feature-gate CI if this tech-preview functionality acts up. Also maybe miss the API-approver tooling that uses this as a marker of whether the feature is GA-ready?
c. Build a new CI flavor that understands how to test tech-preview client-side functionality against a default-feature-gate cluster, in a way compatible with API-approver tooling around deciding if a feature is GA-ready.

None of those sound awesome to me, but given the stability I think we can deliver for this particular subcommand, I think I currently prefer (b), if we can find some way to convince API-approvers that the passing test results mean we're GA-ready, even though we aren't using the OCPFeatureGate test-case naming they'd been used to. I'd also be happy with (c), if someone was able to wave a wand and deliver it for free 😄 , but I'm guessing that delivering it would be non-trivial work.

I also don't think this needs to block merging. We can pivot between strategies as we go, if we decide to reevaluate the weighting of the different options.

Copy link
Contributor

@xueqzhan xueqzhan Jul 18, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not knowing the super details of Trevor's concern about using [OCPFeatureGate:UpgradeStatus], but do I understand correctly that this UpgradeStatus might not be the most accurate FG to use for this test? If so, and in case this FG graduates to default in the future, this test will start running against the default-feature-set cluster (given the removal of the FG), and we might all of sudden start testing new scenarios (FG test against default-feature-set)? Will that be the risk if we just let PR go as it is? TRT has no problem of approving this if the dev team lgtm it. But we need to understand the situation and dev team's decision. Also, as Trevor pointed out, we know that we are not testing something we are advertising (FG test against default-feature-set).

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It has a bit of a history:

  1. The UpgradeStatus feature gate was created for the development of UpdateStatus API in 4.16
  2. To explore what exactly should the API do, we built a CLI-side implementation which we released as TechPreview because it was fast and allowed us to ship something customers could provide us feedback for. We "technically" put it behind the UpdateStatus gate (I say "technically" cause the o/api gate and the actual o/oc gating mechanisms are disconnected) to track its TechPreview status. The idea was that for eventual GA we will replace the client-side logic with cluster-side one that the command would just read through an API
  3. The UpgradeStatus API idea got killed eventually
  4. The BU has demand to ship the CLI-side implementation and we have architect and director-level mandate to GA it in 4.20
  5. The CLI is still technically TechPreview, and to be promoted we need tests -> hence this effort. The UpdateStatus gate lost its original purpose of shipping an API, its name fits and I may as well use it as a "promotion vehicle" because it has no other purpose. Its promotion equals this CLI promotion.
  6. The UpgradeStatus promotion changes no other behavior in the cluster currently: all that functionality was already removed (there's one very small exception which we track in OTA-1578 which we know has to be removed before the promotion and track it that way).

The ideal outcome is the feature gets promoted and then we do not have the TP / Default skew anymore. If I could set up the jobs to exercise this easily (while still feeding into the promotion process) I would do so but there seems to be no way to do so. And while the TP/Default skew is a risk in theory, there is no known reason why it should be a large risk because the API surface to which the CLI is sensitive is all old stable apis and we use no server-side TP features.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the explanation! This situation is indeed unique.

@openshift-trt
Copy link

openshift-trt bot commented Jul 17, 2025

Risk analysis has seen new tests most likely introduced by this PR.
Please ensure that new tests meet guidelines for naming and stability.

New Test Risks for sha: d21513e

Job Name New Test Risk
pull-ci-openshift-origin-main-e2e-aws-ovn-single-node-techpreview High - "[sig-cli][OCPFeatureGate:UpgradeStatus] oc adm upgrade status reports correctly when the cluster is not updating [Suite:openshift/conformance/parallel]" is a new test that was not present in all runs against the current commit.

New tests seen in this PR at sha: d21513e

  • "[sig-cli][OCPFeatureGate:UpgradeStatus] oc adm upgrade status reports correctly when the cluster is not updating [Suite:openshift/conformance/parallel]" [Total: 10, Pass: 10, Fail: 0, Flake: 0]

@petr-muller petr-muller force-pushed the ota-1580-test-oc-adm-upgrade-status branch from d21513e to 26628e3 Compare July 18, 2025 13:00
@openshift-ci openshift-ci bot removed the lgtm Indicates that a PR is ready to be merged. label Jul 18, 2025
@petr-muller petr-muller force-pushed the ota-1580-test-oc-adm-upgrade-status branch 3 times, most recently from c178927 to 5cadb10 Compare July 18, 2025 13:15
@petr-muller
Copy link
Member Author

/test e2e-gcp-ovn-techpreview
/test e2e-aws-ovn-single-node-techpreview

@petr-muller
Copy link
Member Author

/test e2e-gcp-ovn-techpreview
/test e2e-aws-ovn-single-node-techpreview

@neisw
Copy link
Contributor

neisw commented Jul 18, 2025

/approve

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jul 18, 2025
@openshift-trt
Copy link

openshift-trt bot commented Jul 18, 2025

Risk analysis has seen new tests most likely introduced by this PR.
Please ensure that new tests meet guidelines for naming and stability.

New tests seen in this PR at sha: 5cadb10

  • "[sig-cli][OCPFeatureGate:UpgradeStatus] oc adm upgrade status reports correctly when the cluster is not updating [Suite:openshift/conformance/parallel]" [Total: 4, Pass: 4, Fail: 0, Flake: 0]

Copy link
Member

@wking wking left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Jul 21, 2025
@openshift-merge-robot openshift-merge-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jul 21, 2025
- Add a new subdirectory to hold OTA-owned `oc adm upgrade` subcommand tests
- Add a way to pass env vars to `oc` CLI to enable gated subcommand testing
- When not updating, the command emits a simple message stating just that
@petr-muller petr-muller force-pushed the ota-1580-test-oc-adm-upgrade-status branch from 5cadb10 to 85cad81 Compare July 21, 2025 18:19
@openshift-ci openshift-ci bot removed the lgtm Indicates that a PR is ready to be merged. label Jul 21, 2025
@openshift-merge-robot openshift-merge-robot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jul 21, 2025
@petr-muller
Copy link
Member Author

/test e2e-gcp-ovn-techpreview
/test e2e-aws-ovn-single-node-techpreview

Copy link
Member

@wking wking left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Still looks good to me with the generated-file refresh :)

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Jul 21, 2025
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jul 21, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: neisw, petr-muller, wking

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci-robot
Copy link

/retest-required

Remaining retests: 0 against base HEAD 3fda4d8 and 2 for PR HEAD 85cad81 in total

@openshift-ci-robot
Copy link

/retest-required

Remaining retests: 0 against base HEAD bae05fb and 2 for PR HEAD 85cad81 in total

@openshift-ci-robot
Copy link

/retest-required

Remaining retests: 0 against base HEAD af0e85d and 1 for PR HEAD 85cad81 in total

@petr-muller
Copy link
Member Author

/retest-required

@openshift-trt
Copy link

openshift-trt bot commented Jul 22, 2025

Job Failure Risk Analysis for sha: 85cad81

Job Name Failure Risk
pull-ci-openshift-origin-main-e2e-aws-ovn-etcd-scaling Low
[bz-Cloud Compute] clusteroperator/control-plane-machine-set should not change condition/Degraded
This test has passed 50.00% of 2 runs on release 4.20 [Architecture:amd64 FeatureSet:default Installer:ipi JobTier:rare Network:ovn NetworkStack:ipv4 Owner:eng Platform:aws SecurityMode:default Topology:ha Upgrade:none] in the last week.

Open Bugs
etcd-scaling jobs failing ~60% of the time
pull-ci-openshift-origin-main-e2e-azure-ovn-upgrade Medium
Job run should complete before timeout
This test has passed 94.94% of 3599 runs on release 4.20 [Overall] in the last week.

Risk analysis has seen new tests most likely introduced by this PR.
Please ensure that new tests meet guidelines for naming and stability.

New tests seen in this PR at sha: 85cad81

  • "[sig-cli][OCPFeatureGate:UpgradeStatus] oc adm upgrade status reports correctly when the cluster is not updating [Suite:openshift/conformance/parallel]" [Total: 2, Pass: 2, Fail: 0, Flake: 0]

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jul 22, 2025

@petr-muller: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-aws-ovn-serial-publicnet-1of2 d21513e link false /test e2e-aws-ovn-serial-publicnet-1of2
ci/prow/e2e-gcp-disruptive 85cad81 link false /test e2e-gcp-disruptive
ci/prow/e2e-aws-ovn-etcd-scaling 85cad81 link false /test e2e-aws-ovn-etcd-scaling
ci/prow/e2e-gcp-ovn-etcd-scaling 85cad81 link false /test e2e-gcp-ovn-etcd-scaling
ci/prow/okd-e2e-gcp 85cad81 link false /test okd-e2e-gcp
ci/prow/e2e-gcp-ovn-techpreview-serial-1of2 85cad81 link false /test e2e-gcp-ovn-techpreview-serial-1of2
ci/prow/e2e-gcp-ovn-rt-upgrade 85cad81 link false /test e2e-gcp-ovn-rt-upgrade
ci/prow/e2e-aws-ovn-cgroupsv2 85cad81 link false /test e2e-aws-ovn-cgroupsv2
ci/prow/e2e-gcp-fips-serial-2of2 85cad81 link false /test e2e-gcp-fips-serial-2of2
ci/prow/e2e-azure 85cad81 link false /test e2e-azure
ci/prow/e2e-vsphere-ovn-dualstack-primaryv6 85cad81 link false /test e2e-vsphere-ovn-dualstack-primaryv6
ci/prow/e2e-azure-ovn-upgrade 85cad81 link false /test e2e-azure-ovn-upgrade
ci/prow/e2e-aws-ovn 85cad81 link false /test e2e-aws-ovn
ci/prow/e2e-vsphere-ovn-etcd-scaling 85cad81 link false /test e2e-vsphere-ovn-etcd-scaling
ci/prow/e2e-aws-ovn-microshift-serial 85cad81 link false /test e2e-aws-ovn-microshift-serial
ci/prow/e2e-azure-ovn-etcd-scaling 85cad81 link false /test e2e-azure-ovn-etcd-scaling
ci/prow/e2e-aws-ovn-microshift 85cad81 link false /test e2e-aws-ovn-microshift
ci/prow/e2e-openstack-serial 85cad81 link false /test e2e-openstack-serial
ci/prow/e2e-aws-disruptive 85cad81 link false /test e2e-aws-disruptive
ci/prow/e2e-openstack-ovn 85cad81 link false /test e2e-openstack-ovn
ci/prow/e2e-gcp-fips-serial-1of2 85cad81 link false /test e2e-gcp-fips-serial-1of2
ci/prow/e2e-aws-ovn-kube-apiserver-rollout 85cad81 link false /test e2e-aws-ovn-kube-apiserver-rollout

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@openshift-merge-bot openshift-merge-bot bot merged commit e1ae86a into openshift:main Jul 22, 2025
40 of 60 checks passed
@petr-muller petr-muller deleted the ota-1580-test-oc-adm-upgrade-status branch July 22, 2025 17:00
@openshift-bot
Copy link
Contributor

[ART PR BUILD NOTIFIER]

Distgit: openshift-enterprise-tests
This PR has been included in build openshift-enterprise-tests-container-v4.20.0-202507222018.p0.ge1ae86a.assembly.stream.el9.
All builds following this will include this PR.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

8 participants