Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -85,6 +85,14 @@ tests:
IP_STACK=v6
NETWORK_TYPE=OVNKubernetes
workflow: baremetalds-e2e
- as: e2e-metal-ipi-ovn-ipv6-trigger
steps:
cluster_profile: packet
env:
DEVSCRIPTS_CONFIG: |
IP_STACK=v6
NETWORK_TYPE=OVNKubernetes
workflow: baremetalds-e2e
- as: e2e-metal-ipi-ovn-dualstack
steps:
cluster_profile: packet
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -209,6 +209,75 @@ presubmits:
secret:
secretName: result-aggregator
trigger: (?m)^/test( | .* )e2e-metal-ipi-ovn-ipv6,?($|\s.*)
- agent: kubernetes
always_run: true
branches:
- master
cluster: build01
context: ci/prow/e2e-metal-ipi-ovn-ipv6-trigger
decorate: true
decoration_config:
skip_cloning: true
labels:
ci-operator.openshift.io/prowgen-controlled: "true"
pj-rehearse.openshift.io/can-be-rehearsed: "true"
name: pull-ci-openshift-baremetal-operator-master-e2e-metal-ipi-ovn-ipv6-trigger
path_alias: github.com/metal3-io/baremetal-operator
rerun_command: /test e2e-metal-ipi-ovn-ipv6-trigger
spec:
containers:
- args:
- --gcs-upload-secret=/secrets/gcs/service-account.json
- --image-import-pull-secret=/etc/pull-secret/.dockerconfigjson
- --lease-server-credentials-file=/etc/boskos/credentials
- --report-credentials-file=/etc/report/credentials
- --secret-dir=/usr/local/e2e-metal-ipi-ovn-ipv6-trigger-cluster-profile
- --target=e2e-metal-ipi-ovn-ipv6-trigger
command:
- ci-operator
image: ci-operator:latest
imagePullPolicy: Always
name: ""
resources:
requests:
cpu: 10m
volumeMounts:
- mountPath: /etc/boskos
name: boskos
readOnly: true
- mountPath: /usr/local/e2e-metal-ipi-ovn-ipv6-trigger-cluster-profile
name: cluster-profile
- mountPath: /secrets/gcs
name: gcs-credentials
readOnly: true
- mountPath: /etc/pull-secret
name: pull-secret
readOnly: true
- mountPath: /etc/report
name: result-aggregator
readOnly: true
serviceAccountName: ci-operator
volumes:
- name: boskos
secret:
items:
- key: credentials
path: credentials
secretName: boskos-credentials
- name: cluster-profile
projected:
sources:
- secret:
name: cluster-secrets-packet
- configMap:
name: cluster-profile-packet
- name: pull-secret
secret:
secretName: registry-pull-credentials
- name: result-aggregator
secret:
secretName: result-aggregator
trigger: (?m)^/test( | .* )e2e-metal-ipi-ovn-ipv6-trigger,?($|\s.*)
- agent: kubernetes
always_run: true
branches:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,19 @@ EOF
TEST_ARGS="--from-repository ${DEVSCRIPTS_TEST_IMAGE_REPO}"
}

function mirror_cso_images() {
echo "### Mirroring images required by cluster-samples-operator"

DEVSCRIPTS_CSO_IMAGE_REPO=${DS_REGISTRY}/localimages/local-cso-image
# shellcheck disable=SC2087
ssh "${SSHOPTS[@]}" "root@${IP}" bash - << EOF
oc patch configs.samples cluster --type merge --patch "{\"spec\":{\"managementState\":\"Removed\"}}"
oc get cm imagestreamtag-to-image -o "jsonpath={.data}" -n openshift-cluster-samples-operator | jq -r --arg repo "$DEVSCRIPTS_CSO_IMAGE_REPO" 'to_entries | map( "\(.value) " + \$repo + "/\(.value | sub( "(?<head>.[^/]*)/(?<tail>.*)"; "\(.tail)"))")|unique|.[]' > /tmp/mirror-cso
oc image mirror -f /tmp/mirror-cso --registry-config ${DS_WORKING_DIR}/pull_secret.json
oc patch configs.samples cluster --type merge --patch "{\"spec\":{\"managementState\":\"Managed\"}}"
EOF
}

function use_minimal_test_list() {
echo "### Skipping test images mirroring, fall back to minimal tests list"

Expand All @@ -52,7 +65,8 @@ packet)
echo "### Checking release version"
# Mirroring test images is supported only for versions greater than or equal to 4.7
if printf '%s\n%s' "4.8" "${DS_OPENSHIFT_VERSION}" | sort -C -V; then
mirror_test_images
mirror_test_images
mirror_cso_images
else
use_minimal_test_list
fi
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -90,38 +90,6 @@ ref:
\[sig-auth\]\[Feature:OAuthServer\] \[Token Expiration\] Using a OAuth client with a non-default token max age to generate tokens that expire shortly works as expected when using a token authorization flow
\[sig-auth\]\[Feature:SCC\]\[Early\] should not have pod creation failures during install
\[sig-auth\]\[Feature:SecurityContextConstraints\] TestPodDefaultCapabilities
\[sig-builds\]\[Feature:Builds\] Multi-stage image builds should succeed
\[sig-builds\]\[Feature:Builds\] Optimized image builds should succeed
\[sig-builds\]\[Feature:Builds\] build can reference a cluster service with a build being created from new-build should be able to run a build that references a cluster service
\[sig-builds\]\[Feature:Builds\] build have source revision metadata started build should contain source revision information
\[sig-builds\]\[Feature:Builds\] build with empty source started build should build even with an empty source in build config
\[sig-builds\]\[Feature:Builds\] build without output image building from templates should create an image from a S2i template without an output image reference defined
\[sig-builds\]\[Feature:Builds\] build without output image building from templates should create an image from a docker template without an output image reference defined
\[sig-builds\]\[Feature:Builds\] clone repository using git:// protocol should clone using git:// if no proxy is configured
\[sig-builds\]\[Feature:Builds\] custom build with buildah being created from new-build should complete build with custom builder image
\[sig-builds\]\[Feature:Builds\] imagechangetriggers imagechangetriggers should trigger builds of all types
\[sig-builds\]\[Feature:Builds\] oc new-app should fail with a --name longer than 58 characters
\[sig-builds\]\[Feature:Builds\] oc new-app should succeed with a --name of 58 characters
\[sig-builds\]\[Feature:Builds\] oc new-app should succeed with an imagestream
\[sig-builds\]\[Feature:Builds\] prune builds based on settings in the buildconfig buildconfigs should have a default history limit set when created via the group api
\[sig-builds\]\[Feature:Builds\] prune builds based on settings in the buildconfig should prune builds after a buildConfig change
\[sig-builds\]\[Feature:Builds\] prune builds based on settings in the buildconfig should prune canceled builds based on the failedBuildsHistoryLimit setting
\[sig-builds\]\[Feature:Builds\] prune builds based on settings in the buildconfig should prune completed builds based on the successfulBuildsHistoryLimit setting
\[sig-builds\]\[Feature:Builds\] prune builds based on settings in the buildconfig should prune errored builds based on the failedBuildsHistoryLimit setting
\[sig-builds\]\[Feature:Builds\] prune builds based on settings in the buildconfig should prune failed builds based on the failedBuildsHistoryLimit setting
\[sig-builds\]\[Feature:Builds\] result image should have proper labels set Docker build from a template should create a image from .* template with proper Docker labels
\[sig-builds\]\[Feature:Builds\] result image should have proper labels set S2I build from a template should create a image from .* template with proper Docker labels
\[sig-builds\]\[Feature:Builds\] s2i build with a quota Building from a template should create an s2i build with a quota and run it
\[sig-builds\]\[Feature:Builds\] s2i build with a root user image should create a root build and pass with a privileged SCC
\[sig-builds\]\[Feature:Builds\] verify /run filesystem contents are writeable using a simple Docker Strategy Build
\[sig-builds\]\[Feature:Builds\] verify /run filesystem contents do not have unexpected content using a simple Docker Strategy Build
\[sig-builds\]\[Feature:Builds\]\[pullsecret\] docker build using a pull secret Building from a template should create a docker build that pulls using a secret run it
\[sig-builds\]\[Feature:Builds\]\[timing\] capture build stages and durations should record build stages and durations for docker
\[sig-builds\]\[Feature:Builds\]\[timing\] capture build stages and durations should record build stages and durations for s2i
\[sig-builds\]\[Feature:Builds\]\[valueFrom\] process valueFrom in build strategy environment variables should fail resolving unresolvable valueFrom in docker build environment variable references
\[sig-builds\]\[Feature:Builds\]\[valueFrom\] process valueFrom in build strategy environment variables should fail resolving unresolvable valueFrom in sti build environment variable references
\[sig-builds\]\[Feature:Builds\]\[valueFrom\] process valueFrom in build strategy environment variables should successfully resolve valueFrom in docker build environment variables
\[sig-builds\]\[Feature:Builds\]\[valueFrom\] process valueFrom in build strategy environment variables should successfully resolve valueFrom in s2i build environment variables
\[sig-cli\] CLI can run inside of a busybox container
\[sig-cli\] oc adm must-gather runs successfully
\[sig-cli\] oc adm must-gather runs successfully for audit logs
Expand Down Expand Up @@ -160,7 +128,6 @@ ref:
\[sig-instrumentation\]\[Late\] Alerts should have a Watchdog alert in firing state the entire cluster run
\[sig-instrumentation\]\[Late\] Alerts shouldn't report any alerts in firing state apart from Watchdog and AlertmanagerReceiversNotConfigured
\[sig-instrumentation\]\[Late\] Alerts shouldn't report any alerts in firing or pending state apart from Watchdog and AlertmanagerReceiversNotConfigured and have no gaps in Watchdog firing
\[sig-instrumentation\]\[sig-builds\]\[Feature:Builds\] Prometheus when installed on the cluster should start and expose a secured proxy and verify build metrics
\[sig-network-edge\]\[Conformance\]\[Area:Networking\]\[Feature:Router\] The HAProxy router should be able to connect to a service that is idled because a GET on the route will unidle it
\[sig-network\] Conntrack should be able to preserve UDP traffic when server pod cycles for a ClusterIP service
\[sig-network\] Conntrack should be able to preserve UDP traffic when server pod cycles for a NodePort service
Expand Down