diff --git a/ci-operator/config/openshift/baremetal-operator/openshift-baremetal-operator-master.yaml b/ci-operator/config/openshift/baremetal-operator/openshift-baremetal-operator-master.yaml index 7c81499519f8b..b939b8c4c4d8c 100644 --- a/ci-operator/config/openshift/baremetal-operator/openshift-baremetal-operator-master.yaml +++ b/ci-operator/config/openshift/baremetal-operator/openshift-baremetal-operator-master.yaml @@ -85,6 +85,22 @@ tests: IP_STACK=v4v6 NETWORK_TYPE=OVNKubernetes workflow: baremetalds-e2e +- as: e2e-metal-ipi-ovn-ipv6-trigger + steps: + cluster_profile: packet + env: + DEVSCRIPTS_CONFIG: | + IP_STACK=v6 + NETWORK_TYPE=OVNKubernetes + workflow: baremetalds-e2e +- as: e2e-metal-ipi-ovn-dualstack-trigger + steps: + cluster_profile: packet + env: + DEVSCRIPTS_CONFIG: | + IP_STACK=v4v6 + NETWORK_TYPE=OVNKubernetes + workflow: baremetalds-e2e - as: e2e-metal-ipi-virtualmedia steps: cluster_profile: packet diff --git a/ci-operator/jobs/openshift/baremetal-operator/openshift-baremetal-operator-master-presubmits.yaml b/ci-operator/jobs/openshift/baremetal-operator/openshift-baremetal-operator-master-presubmits.yaml index 163c58049b54f..99b387b6adce8 100644 --- a/ci-operator/jobs/openshift/baremetal-operator/openshift-baremetal-operator-master-presubmits.yaml +++ b/ci-operator/jobs/openshift/baremetal-operator/openshift-baremetal-operator-master-presubmits.yaml @@ -140,6 +140,75 @@ presubmits: secret: secretName: result-aggregator trigger: (?m)^/test( | .* )e2e-metal-ipi-ovn-dualstack,?($|\s.*) + - agent: kubernetes + always_run: true + branches: + - master + cluster: build02 + context: ci/prow/e2e-metal-ipi-ovn-dualstack-trigger + decorate: true + decoration_config: + skip_cloning: true + labels: + ci-operator.openshift.io/prowgen-controlled: "true" + pj-rehearse.openshift.io/can-be-rehearsed: "true" + name: pull-ci-openshift-baremetal-operator-master-e2e-metal-ipi-ovn-dualstack-trigger + path_alias: github.com/metal3-io/baremetal-operator + rerun_command: /test e2e-metal-ipi-ovn-dualstack-trigger + spec: + containers: + - args: + - --gcs-upload-secret=/secrets/gcs/service-account.json + - --image-import-pull-secret=/etc/pull-secret/.dockerconfigjson + - --lease-server-credentials-file=/etc/boskos/credentials + - --report-credentials-file=/etc/report/credentials + - --secret-dir=/usr/local/e2e-metal-ipi-ovn-dualstack-trigger-cluster-profile + - --target=e2e-metal-ipi-ovn-dualstack-trigger + command: + - ci-operator + image: ci-operator:latest + imagePullPolicy: Always + name: "" + resources: + requests: + cpu: 10m + volumeMounts: + - mountPath: /etc/boskos + name: boskos + readOnly: true + - mountPath: /usr/local/e2e-metal-ipi-ovn-dualstack-trigger-cluster-profile + name: cluster-profile + - mountPath: /secrets/gcs + name: gcs-credentials + readOnly: true + - mountPath: /etc/pull-secret + name: pull-secret + readOnly: true + - mountPath: /etc/report + name: result-aggregator + readOnly: true + serviceAccountName: ci-operator + volumes: + - name: boskos + secret: + items: + - key: credentials + path: credentials + secretName: boskos-credentials + - name: cluster-profile + projected: + sources: + - secret: + name: cluster-secrets-packet + - configMap: + name: cluster-profile-packet + - name: pull-secret + secret: + secretName: registry-pull-credentials + - name: result-aggregator + secret: + secretName: result-aggregator + trigger: (?m)^/test( | .* )e2e-metal-ipi-ovn-dualstack-trigger,?($|\s.*) - agent: kubernetes always_run: true branches: @@ -209,6 +278,75 @@ presubmits: secret: secretName: result-aggregator trigger: (?m)^/test( | .* )e2e-metal-ipi-ovn-ipv6,?($|\s.*) + - agent: kubernetes + always_run: true + branches: + - master + cluster: build02 + context: ci/prow/e2e-metal-ipi-ovn-ipv6-trigger + decorate: true + decoration_config: + skip_cloning: true + labels: + ci-operator.openshift.io/prowgen-controlled: "true" + pj-rehearse.openshift.io/can-be-rehearsed: "true" + name: pull-ci-openshift-baremetal-operator-master-e2e-metal-ipi-ovn-ipv6-trigger + path_alias: github.com/metal3-io/baremetal-operator + rerun_command: /test e2e-metal-ipi-ovn-ipv6-trigger + spec: + containers: + - args: + - --gcs-upload-secret=/secrets/gcs/service-account.json + - --image-import-pull-secret=/etc/pull-secret/.dockerconfigjson + - --lease-server-credentials-file=/etc/boskos/credentials + - --report-credentials-file=/etc/report/credentials + - --secret-dir=/usr/local/e2e-metal-ipi-ovn-ipv6-trigger-cluster-profile + - --target=e2e-metal-ipi-ovn-ipv6-trigger + command: + - ci-operator + image: ci-operator:latest + imagePullPolicy: Always + name: "" + resources: + requests: + cpu: 10m + volumeMounts: + - mountPath: /etc/boskos + name: boskos + readOnly: true + - mountPath: /usr/local/e2e-metal-ipi-ovn-ipv6-trigger-cluster-profile + name: cluster-profile + - mountPath: /secrets/gcs + name: gcs-credentials + readOnly: true + - mountPath: /etc/pull-secret + name: pull-secret + readOnly: true + - mountPath: /etc/report + name: result-aggregator + readOnly: true + serviceAccountName: ci-operator + volumes: + - name: boskos + secret: + items: + - key: credentials + path: credentials + secretName: boskos-credentials + - name: cluster-profile + projected: + sources: + - secret: + name: cluster-secrets-packet + - configMap: + name: cluster-profile-packet + - name: pull-secret + secret: + secretName: registry-pull-credentials + - name: result-aggregator + secret: + secretName: result-aggregator + trigger: (?m)^/test( | .* )e2e-metal-ipi-ovn-ipv6-trigger,?($|\s.*) - agent: kubernetes always_run: false branches: diff --git a/ci-operator/step-registry/baremetalds/e2e/test/baremetalds-e2e-test-commands.sh b/ci-operator/step-registry/baremetalds/e2e/test/baremetalds-e2e-test-commands.sh index fd751098490d6..ded452e12c58e 100644 --- a/ci-operator/step-registry/baremetalds/e2e/test/baremetalds-e2e-test-commands.sh +++ b/ci-operator/step-registry/baremetalds/e2e/test/baremetalds-e2e-test-commands.sh @@ -23,7 +23,7 @@ function copy_test_binaries() { function mirror_test_images() { echo "### Mirroring test images" - DEVSCRIPTS_TEST_IMAGE_REPO=${DS_REGISTRY}/localimages/local-test-image + DEVSCRIPTS_TEST_IMAGE_REPO=${DS_REGISTRY}/localimages/local-test-image # shellcheck disable=SC2087 ssh "${SSHOPTS[@]}" "root@${IP}" bash - << EOF openshift-tests images --to-repository ${DEVSCRIPTS_TEST_IMAGE_REPO} > /tmp/mirror @@ -34,7 +34,7 @@ EOF function use_minimal_test_list() { echo "### Skipping test images mirroring, fall back to minimal tests list" - + TEST_ARGS="--file /tmp/tests" TEST_SKIPS="" echo "${TEST_MINIMAL_LIST}" > /tmp/tests @@ -47,12 +47,12 @@ packet) # shellcheck source=/dev/null source "${SHARED_DIR}/ds-vars.conf" copy_test_binaries - export TEST_PROVIDER=\"\" + export TEST_PROVIDER='{\"type\":\"baremetal\"}' echo "### Checking release version" # Mirroring test images is supported only for versions greater than or equal to 4.7 if printf '%s\n%s' "4.7" "${DS_OPENSHIFT_VERSION}" | sort -C -V; then - mirror_test_images + mirror_test_images else use_minimal_test_list fi @@ -65,7 +65,7 @@ function upgrade() { ssh "${SSHOPTS[@]}" "root@${IP}" \ openshift-tests run-upgrade all \ --to-image "${OPENSHIFT_UPGRADE_RELEASE_IMAGE_OVERRIDE}" \ - --provider "${TEST_PROVIDER}" \ + --provider "${TEST_PROVIDER:-}" \ -o "/tmp/artifacts/e2e.log" \ --junit-dir "/tmp/artifacts/junit" set +x @@ -73,7 +73,7 @@ function upgrade() { function suite() { if [[ -n "${TEST_SKIPS}" ]]; then - TESTS="$(ssh "${SSHOPTS[@]}" "root@${IP}" openshift-tests run --dry-run --provider "${TEST_PROVIDER}" "${TEST_SUITE}")" + TESTS="$(ssh "${SSHOPTS[@]}" "root@${IP}" openshift-tests run --dry-run --provider "${TEST_PROVIDER:-}" "${TEST_SUITE}")" echo "${TESTS}" | grep -v "${TEST_SKIPS}" >/tmp/tests echo "Skipping tests:" echo "${TESTS}" | grep "${TEST_SKIPS}" @@ -81,7 +81,7 @@ function suite() { fi scp "${SSHOPTS[@]}" /tmp/tests "root@${IP}:/tmp/tests" - + set -x ssh "${SSHOPTS[@]}" "root@${IP}" \ openshift-tests run "${TEST_SUITE}" "${TEST_ARGS:-}" \ @@ -112,4 +112,4 @@ suite) echo >&2 "Unsupported test type '${TEST_TYPE}'" exit 1 ;; -esac \ No newline at end of file +esac diff --git a/ci-operator/step-registry/baremetalds/e2e/test/baremetalds-e2e-test-ref.yaml b/ci-operator/step-registry/baremetalds/e2e/test/baremetalds-e2e-test-ref.yaml index 0ca73692bdd7e..afe80c3738a7a 100644 --- a/ci-operator/step-registry/baremetalds/e2e/test/baremetalds-e2e-test-ref.yaml +++ b/ci-operator/step-registry/baremetalds/e2e/test/baremetalds-e2e-test-ref.yaml @@ -161,71 +161,6 @@ ref: \[sig-instrumentation\]\[Late\] Alerts shouldn't report any alerts in firing state apart from Watchdog and AlertmanagerReceiversNotConfigured \[Suite:openshift/conformance/parallel\] \[sig-instrumentation\]\[sig-builds\]\[Feature:Builds\] Prometheus when installed on the cluster should start and expose a secured proxy and verify build metrics \[Suite:openshift/conformance/parallel\] \[sig-network-edge\]\[Conformance\]\[Area:Networking\]\[Feature:Router\] The HAProxy router should be able to connect to a service that is idled because a GET on the route will unidle it \[Suite:openshift/conformance/parallel/minimal\] - \[sig-network\] Conntrack should be able to preserve UDP traffic when server pod cycles for a ClusterIP service \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] Conntrack should be able to preserve UDP traffic when server pod cycles for a NodePort service \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] DNS should provide /etc/hosts entries for the cluster \[LinuxOnly\] \[Conformance\] \[Suite:openshift/conformance/parallel/minimal\] \[Suite:k8s\] - \[sig-network\] DNS should provide DNS for ExternalName services \[Conformance\] \[Suite:openshift/conformance/parallel/minimal\] \[Suite:k8s\] - \[sig-network\] DNS should provide DNS for pods for Hostname \[LinuxOnly\] \[Conformance\] \[Suite:openshift/conformance/parallel/minimal\] \[Suite:k8s\] - \[sig-network\] DNS should provide DNS for pods for Subdomain \[Conformance\] \[Suite:openshift/conformance/parallel/minimal\] \[Suite:k8s\] - \[sig-network\] DNS should provide DNS for services \[Conformance\] \[Suite:openshift/conformance/parallel/minimal\] \[Suite:k8s\] - \[sig-network\] DNS should provide DNS for the cluster \[Conformance\] \[Suite:openshift/conformance/parallel/minimal\] \[Suite:k8s\] - \[sig-network\] DNS should resolve DNS of partial qualified names for services \[LinuxOnly\] \[Conformance\] \[Suite:openshift/conformance/parallel/minimal\] \[Suite:k8s\] - \[sig-network\] DNS should resolve DNS of partial qualified names for the cluster \[LinuxOnly\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] Internal connectivity for TCP and UDP on ports 9000-9999 is allowed \[Suite:openshift/conformance/parallel\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should allow egress access on one named port \[Feature:NetworkPolicy\] \[Skipped:Network/OVNKubernetes\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Skipped:Network/OpenShiftSDN\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should allow egress access to server in CIDR block \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Skipped:Network/OpenShiftSDN\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should allow ingress access from namespace on one named port \[Feature:NetworkPolicy\] \[Skipped:Network/OVNKubernetes\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Skipped:Network/OpenShiftSDN\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should allow ingress access from updated namespace \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should allow ingress access from updated pod \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should allow ingress access on one named port \[Feature:NetworkPolicy\] \[Skipped:Network/OVNKubernetes\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Skipped:Network/OpenShiftSDN\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should deny ingress access to updated pod \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should enforce egress policy allowing traffic to a server in a different namespace based on PodSelector and NamespaceSelector \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Skipped:Network/OpenShiftSDN\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Skipped:Network/OpenShiftSDN\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should enforce multiple egress policies with egress allow-all policy taking precedence \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Skipped:Network/OpenShiftSDN\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should enforce multiple ingress policies with ingress allow-all policy taking precedence \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should enforce multiple, stacked policies with overlapping podSelectors \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should enforce policies to check ingress and egress policies can be controlled independently based on PodSelector \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Skipped:Network/OpenShiftSDN\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should enforce policy based on NamespaceSelector with MatchExpressions\[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should enforce policy based on PodSelector or NamespaceSelector \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should enforce policy based on PodSelector with MatchExpressions\[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should enforce policy based on Ports \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should enforce policy to allow traffic from pods within server namespace based on PodSelector \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should enforce policy to allow traffic only from a different namespace, based on NamespaceSelector \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should enforce policy to allow traffic only from a pod in a different namespace based on PodSelector and NamespaceSelector \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should enforce updated policy \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Skipped:Network/OpenShiftSDN\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should not allow access by TCP when a policy specifies only SCTP \[Feature:NetworkPolicy\] \[Feature:SCTP\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should stop enforcing policies after they are deleted \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should support a 'default-deny-all' policy \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Skipped:Network/OpenShiftSDN\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should support a 'default-deny-ingress' policy \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should support allow-all policy \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] NetworkPolicy \[LinuxOnly\] NetworkPolicy between server and client should work with Ingress,Egress specified together \[Feature:NetworkPolicy\] \[Skipped:Network/OpenShiftSDN/Multitenant\] \[Skipped:Network/OpenShiftSDN\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] Networking Granular Checks: Services should function for client IP based session affinity: udp \[LinuxOnly\] \[Skipped:Network/OVNKubernetes\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] Networking should provide Internet connection for containers \[Feature:Networking-IPv4\] \[Skipped:azure\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] - \[sig-network\] Services should be able to switch session affinity for NodePort service \[LinuxOnly\] \[Conformance\] \[Skipped:Network/OVNKubernetes\] \[Suite:openshift/conformance/parallel/minimal\] \[Suite:k8s\] - \[sig-network\] Services should be able to switch session affinity for service with type clusterIP \[LinuxOnly\] \[Conformance\] \[Skipped:Network/OVNKubernetes\] \[Suite:openshift/conformance/parallel/minimal\] \[Suite:k8s\] - \[sig-network\] Services should have session affinity timeout work for NodePort service \[LinuxOnly\] \[Conformance\] \[Skipped:Network/OVNKubernetes\] \[Suite:openshift/conformance/parallel/minimal\] \[Suite:k8s\] - \[sig-network\] Services should have session affinity timeout work for service with type clusterIP \[LinuxOnly\] \[Conformance\] \[Skipped:Network/OVNKubernetes\] \[Suite:openshift/conformance/parallel/minimal\] \[Suite:k8s\] - \[sig-network\] Services should have session affinity work for NodePort service \[LinuxOnly\] \[Conformance\] \[Skipped:Network/OVNKubernetes\] \[Suite:openshift/conformance/parallel/minimal\] \[Suite:k8s\] - \[sig-network\] Services should have session affinity work for service with type clusterIP \[LinuxOnly\] \[Conformance\] \[Skipped:Network/OVNKubernetes\] \[Suite:openshift/conformance/parallel/minimal\] \[Suite:k8s\] - \[sig-network\] services basic functionality should allow connections to another pod on a different node via a service IP \[Suite:openshift/conformance/parallel\] - \[sig-network\] services basic functionality should allow connections to another pod on the same node via a service IP \[Suite:openshift/conformance/parallel\] - \[sig-network\] services when using a plugin that does not isolate namespaces by default should allow connections to pods in different namespaces on different nodes via service IPs \[Suite:openshift/conformance/parallel\] - \[sig-network\] services when using a plugin that does not isolate namespaces by default should allow connections to pods in different namespaces on the same node via service IPs \[Suite:openshift/conformance/parallel\] - \[sig-network\]\[Feature:Router\] The HAProxy router should enable openshift-monitoring to pull metrics \[Suite:openshift/conformance/parallel\] - \[sig-network\]\[Feature:Router\] The HAProxy router should expose a health check on the metrics port \[Suite:openshift/conformance/parallel\] - \[sig-network\]\[Feature:Router\] The HAProxy router should expose prometheus metrics for a route \[Suite:openshift/conformance/parallel\] - \[sig-network\]\[Feature:Router\] The HAProxy router should expose the profiling endpoints \[Suite:openshift/conformance/parallel\] - \[sig-network\]\[Feature:Router\] The HAProxy router should override the route host for overridden domains with a custom value \[Suite:openshift/conformance/parallel\] - \[sig-network\]\[Feature:Router\] The HAProxy router should override the route host with a custom value \[Suite:openshift/conformance/parallel\] - \[sig-network\]\[Feature:Router\] The HAProxy router should respond with 503 to unrecognized hosts \[Suite:openshift/conformance/parallel\] - \[sig-network\]\[Feature:Router\] The HAProxy router should run even if it has no access to update status \[Suite:openshift/conformance/parallel\] - \[sig-network\]\[Feature:Router\] The HAProxy router should serve a route that points to two services and respect weights \[Suite:openshift/conformance/parallel\] - \[sig-network\]\[Feature:Router\] The HAProxy router should serve routes that were created from an ingress \[Suite:openshift/conformance/parallel\] - \[sig-network\]\[Feature:Router\] The HAProxy router should serve the correct routes when scoped to a single namespace and label set \[Suite:openshift/conformance/parallel\] - \[sig-network\]\[Feature:Router\] The HAProxy router should support reencrypt to services backed by a serving certificate automatically \[Suite:openshift/conformance/parallel\] - \[sig-network\]\[endpoints\] admission TestEndpointAdmission \[Suite:openshift/conformance/parallel\] \[sig-node\] Managed cluster should report ready nodes the entire duration of the test run \[Late\] \[Suite:openshift/conformance/parallel\] \[sig-operator\] an end user can use OLM can subscribe to the operator \[Suite:openshift/conformance/parallel\] \[sig-storage\] GCP Volumes GlusterFS should be mountable \[Skipped:ibmcloud\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] @@ -262,7 +197,6 @@ ref: \[sig-storage\] In-tree Volumes \[Driver: nfs\] \[Testpattern: Pre-provisioned PV (default fs)\] subPath should support existing directory \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] \[sig-storage\]\[Late\] Metrics should report short attach times \[Suite:openshift/conformance/parallel\] \[sig-storage\]\[Late\] Metrics should report short mount times \[Suite:openshift/conformance/parallel\] - \[sig-network\] Networking Granular Checks: Services should function for client IP based session affinity: http \[LinuxOnly\] \[Skipped:Network/OVNKubernetes\] \[Suite:openshift/conformance/parallel\] \[Suite:k8s\] documentation: Regular expression (POSIX basic regular expression) of tests to skip. Note that the current list it's just a temporary measure for the baremetal platform. - name: TEST_UPGRADE_OPTIONS default: "abort-at=100"