diff --git a/ci-operator/step-registry/baremetalds/e2e/test/baremetalds-e2e-test-ref.yaml b/ci-operator/step-registry/baremetalds/e2e/test/baremetalds-e2e-test-ref.yaml index a299b60b80204..a7609f237069a 100644 --- a/ci-operator/step-registry/baremetalds/e2e/test/baremetalds-e2e-test-ref.yaml +++ b/ci-operator/step-registry/baremetalds/e2e/test/baremetalds-e2e-test-ref.yaml @@ -42,7 +42,6 @@ ref: \[Conformance\]\[sig-api-machinery\]\[Feature:APIServer\] local kubeconfig .* should be present on all masters and work \[k8s.io\] Container Runtime blackbox test when running a container with a new image should be able to pull from private registry with secret \[k8s.io\] \[sig-node\] Pods Extended \[k8s.io\] Pod Container Status should never report success for a pending container - \[sig-api-machinery\] API priority and fairness should ensure that requests can be classified by testing flow-schemas/priority-levels \[sig-api-machinery\] CustomResourcePublishOpenAPI \[Privileged:ClusterAdmin\] works for CRD with validation schema \[sig-api-machinery\]\[Feature:APIServer\]\[Late\] kube-apiserver terminates within graceful termination period \[sig-api-machinery\]\[Feature:APIServer\]\[Late\] kubelet terminates kube-apiserver gracefully @@ -55,19 +54,6 @@ ref: \[sig-auth\] \[Feature:NodeAuthenticator\] The kubelet's main port 10250 should reject requests with no credentials \[sig-auth\]\[Feature:HTPasswdAuth\] HTPasswd IDP should successfully configure htpasswd and be responsive \[sig-auth\]\[Feature:LDAP\] LDAP IDP should authenticate against an ldap server - \[sig-auth\]\[Feature:OAuthServer\] \[Headers\] expected headers returned from the authorize URL - \[sig-auth\]\[Feature:OAuthServer\] \[Headers\] expected headers returned from the grant URL - \[sig-auth\]\[Feature:OAuthServer\] \[Headers\] expected headers returned from the login URL for the allow all IDP - \[sig-auth\]\[Feature:OAuthServer\] \[Headers\] expected headers returned from the login URL for the bootstrap IDP - \[sig-auth\]\[Feature:OAuthServer\] \[Headers\] expected headers returned from the login URL for when there is only one IDP - \[sig-auth\]\[Feature:OAuthServer\] \[Headers\] expected headers returned from the logout URL - \[sig-auth\]\[Feature:OAuthServer\] \[Headers\] expected headers returned from the root URL - \[sig-auth\]\[Feature:OAuthServer\] \[Headers\] expected headers returned from the token URL - \[sig-auth\]\[Feature:OAuthServer\] \[Headers\] expected headers returned from the token request URL - \[sig-auth\]\[Feature:OAuthServer\] \[Token Expiration\] Using a OAuth client with a non-default token max age to generate tokens that do not expire works as expected when using a code authorization flow - \[sig-auth\]\[Feature:OAuthServer\] \[Token Expiration\] Using a OAuth client with a non-default token max age to generate tokens that do not expire works as expected when using a token authorization flow - \[sig-auth\]\[Feature:OAuthServer\] \[Token Expiration\] Using a OAuth client with a non-default token max age to generate tokens that expire shortly works as expected when using a code authorization flow - \[sig-auth\]\[Feature:OAuthServer\] \[Token Expiration\] Using a OAuth client with a non-default token max age to generate tokens that expire shortly works as expected when using a token authorization flow \[sig-auth\]\[Feature:SCC\]\[Early\] should not have pod creation failures during install \[sig-builds\]\[Feature:Builds\] result image should have proper labels set Docker build from a template should create a image from .* template with proper Docker labels \[sig-builds\]\[Feature:Builds\] result image should have proper labels set S2I build from a template should create a image from .* template with proper Docker labels @@ -78,7 +64,6 @@ ref: \[sig-cli\] oc debug ensure it works with image streams \[sig-cli\] oc explain should contain proper fields description for special types \[sig-cli\] oc explain should contain proper spec+status for CRDs - \[sig-cli\] oc observe works as expected \[sig-cli\] oc rsh rsh specific flags should work well when access to a remote shell \[sig-devex\] check registry.redhat.io is available and samples operator can import sample imagestreams run sample related validations \[sig-devex\]\[Feature:Templates\] templateinstance readiness test should report failed soon after an annotated objects has failed