Skip to content

Commit

Permalink
Move e2e envs to workflow
Browse files Browse the repository at this point in the history
  • Loading branch information
cs-zhang committed Apr 9, 2024
1 parent 45f90ec commit f6075d1
Show file tree
Hide file tree
Showing 2 changed files with 12 additions and 76 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -717,82 +717,6 @@ tests:
env:
INSTALL_TYPE: assisted
OCP_VERSION: "4.15"
TEST_SKIPS: The HAProxy router should be able to connect to a service that is
idled\| HTPasswd IDP should successfully configure htpasswd and be responsive\|
LDAP IDP should authenticate against an ldap server\| expected headers returned
from the authorize URL\| expected headers returned from the grant URL\| expected
headers returned from the login URL for the allow all IDP\| expected headers
returned from the login URL for the bootstrap IDP\| expected headers returned
from the login URL for when there is only one IDP\| expected headers returned
from the logout URL\| expected headers returned from the root URL\| expected
headers returned from the token URL\| expected headers returned from the token
request URL\| Using a OAuth client with a non-default token max age\| well-known
endpoint should be reachable\|\[sig-api-machinery\]\[Feature:ClusterResourceQuota\]
Cluster resource quota should control resource limits across namespaces\|\[sig-api-machinery\]\[Feature:ServerSideApply\]
Server-Side Apply should work for route.openshift.io/v1, Resource=routes\|\[sig-api-machinery\]\[Feature:ServerSideApply\]
Server-Side Apply should work for template.openshift.io/v1, Resource=brokertemplateinstances\|
\[sig-apps\]\[Feature:DeploymentConfig\] deploymentconfigs with revision history
limits should never persist more old deployments than acceptable after being
observed by the controller\|\[sig-apps\]\[Feature:Jobs\] Users should be able
to create and run a job in a user project\|\[sig-arch\] ClusterOperators \[apigroup:config.openshift.io\]
should define valid related objects\|\[sig-arch\] Managed cluster should only
include cluster daemonsets that have maxUnavailable or maxSurge update of
10 percent or maxUnavailable of 33 percent\|\[sig-arch\] \[Conformance\] sysctl
whitelists net.ipv4.ip_local_port_range\|\[sig-arch\]\[Late\] all registered
tls artifacts must have no metadata violation regressions\|\[sig-arch\]\[Late\]
all tls artifacts must be registered\|\[sig-arch\]\[Late\] clients should
not use APIs that are removed in upcoming releases\|\[sig-auth\]\[Feature:OpenShiftAuthorization\]
self-SAR compatibility TestBootstrapPolicySelfSubjectAccessReviews should
succeed\|\[sig-auth\]\[Feature:RoleBindingRestrictions\] RoleBindingRestrictions
should be functional Create a rolebinding when subject is not already bound
and is not permitted by any RBR should fail\|\[sig-auth\]\[Feature:RoleBindingRestrictions\]
RoleBindingRestrictions should be functional Rolebinding restrictions tests
single project should succeed\|\[sig-builds\]\[Feature:Builds\] build with
empty source started build should build even with an empty source in build
config\|\[sig-builds\]\[Feature:Builds\] custom build with buildah being created
from new-build should complete build with custom builder image\|\[sig-builds\]\[Feature:Builds\]
prune builds based on settings in the buildconfig should prune failed builds
based on the failedBuildsHistoryLimit setting\|\[sig-builds\]\[Feature:Builds\]\[valueFrom\]
process valueFrom in build strategy environment variables should successfully
resolve valueFrom in s2i build environment variables\|\[sig-builds\]\[Feature:Builds\]\[volumes\]
build volumes should mount given secrets and configmaps into the build pod
for docker strategy builds\|\[sig-builds\]\[Feature:Builds\]\[webhook\] TestWebhookGitHubPushWithImageStream\|\[sig-ci\]
\[Early\] prow job name should match network type\|\[sig-ci\] \[Early\] prow
job name should match platform type\|\[sig-cli\] oc --request-timeout works
as expected\|\[sig-cli\] oc adm node-logs\|\[sig-cli\] oc adm serviceaccounts\|\[sig-cli\]
oc api-resources can output expected information about snapshot.storage.k8s.io
api-resources\| \[sig-cli\] oc basics can get version information from CLI
\|\[sig-cli\] oc debug does not require a real resource on the server\|\[sig-cli\]
oc explain should contain proper fields description for oauth.openshift.io\|\[sig-cli\]
oc explain should contain spec+status for build.openshift.io\|\[sig-cli\]
oc idle \[apigroup:apps.openshift.io\]\[apigroup:route.openshift.io\]\[apigroup:project.openshift.io\]\[apigroup:image.openshift.io\]
by all\|\[sig-cli\] oc secret creates and retrieves expected\|\[sig-cluster-lifecycle\]
Pods cannot access the /config/master API endpoint\|\[sig-devex\]\[Feature:Templates\]
templateinstance impersonation tests \[apigroup:user.openshift.io\]\[apigroup:authorization.openshift.io\]
should pass impersonation deletion tests\|\[sig-devex\]\[Feature:Templates\]
templateinstance security tests \[apigroup:authorization.openshift.io\]\[apigroup:template.openshift.io\]
should pass security tests\|\[sig-etcd\] etcd pod logs do not log slow fdatasync\|
\[sig-imageregistry\]\[Feature:ImageExtract\] Image extract should extract
content from an image\|\[sig-imageregistry\]\[Feature:ImageLayers\] Image
layer subresource should return layers from tagged images\|\[sig-instrumentation\]
Prometheus \[apigroup:image.openshift.io\] when installed on the cluster should
provide named network metrics\|\[sig-instrumentation\] Prometheus \[apigroup:image.openshift.io\]
when installed on the cluster should start and expose a secured proxy and
unsecured metrics\|\[sig-kubevirt\] services when running openshift cluster
on KubeVirt virtual machines should allow connections to pods from infra cluster
pod via NodePort across different infra nodes\|\[sig-network\] ovs-vswitchd
should not log any unreasonably long poll intervals to system journal\|\[sig-network\]
services basic functionality should allow connections to another pod on a
different node via a service IP\|\[sig-network\]\[Feature:EgressFirewall\]
when using openshift ovn-kubernetes should ensure egressfirewall is created\|
\[sig-network\]\[Feature:Router\]\[apigroup:route.openshift.io\] The HAProxy
router reports the expected host names in admitted routes' statuses\|\[sig-network\]\[Feature:Whereabouts\]
should use whereabouts net-attach-def to limit IP ranges for newly created
pods\| \[sig-network\]\[Feature:tuning\] sysctl allowlist update should start
a pod with custom sysctl only when the sysctl is added to whitelist\|\[sig-node\]
Pods Extended Pod Container Status should never report container start when
an init container fails
TEST_TYPE: suite
workflow: upi-powervs-sno
zz_generated_metadata:
branch: master
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,18 @@ workflow:
CIS_DOMAIN_ID: "9273c1b3cebc817d56b42fc7632a5dfc"
BASTION: "rh-sno-ci-bastion.ocp-dev-ppc64le.com"
BASTION_IP: "128.168.100.252"
TEST_TYPE: suite
TEST_SKIPS: The HAProxy router should be able to connect to a service that is
idled\| HTPasswd IDP should successfully configure htpasswd and be responsive\|
LDAP IDP should authenticate against an ldap server\| expected headers returned
from the authorize URL\| expected headers returned from the grant URL\| expected
headers returned from the login URL for the allow all IDP\| expected headers
returned from the login URL for the bootstrap IDP\| expected headers returned
from the login URL for when there is only one IDP\| expected headers returned
from the logout URL\| expected headers returned from the root URL\| expected
headers returned from the token URL\| expected headers returned from the token
request URL\| Using a OAuth client with a non-default token max age\| well-known
endpoint should be reachable
documentation: |-
upi-powervs-sno workflow will setup a single node openshift cluster via single-node-ignition-config command and ensure it
reaches a good state and destroys it.

0 comments on commit f6075d1

Please sign in to comment.