cert-manager-operator
cert-manager-operator copied to clipboard
CM-354: [PoC] RouteExternalCertificate - TechPreview e2e
OpenShift TechPreview feature RouteExternalCertificate e2e test case
Test is passing on a GCP OpenShift 4.16 cluster locally.
------------------------------
Route ExternalCertificateRef [TechPreview]
/home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:46
dns-01 challenge using explicit credentials
/home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:115
should obtain a valid LetsEncrypt certificate
/home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116
> Enter [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 03:11:11.154
STEP: creating Kube clients - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:52 @ 07/03/24 03:11:11.155
STEP: adding override args for dns-01 private zone passthrough - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:60 @ 07/03/24 03:11:11.208
< Exit [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 03:11:11.385 (230ms)
> Enter [It] should obtain a valid LetsEncrypt certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 03:11:11.385
STEP: creating a test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:118 @ 07/03/24 03:11:11.385
STEP: obtaining GCP credentials from kube-system namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:123 @ 07/03/24 03:11:11.559
STEP: copying GCP service account to test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:130 @ 07/03/24 03:11:11.62
STEP: getting GCP project from Infrastructure object - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:143 @ 07/03/24 03:11:11.683
STEP: creating new certificate Issuer - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:150 @ 07/03/24 03:11:11.739
STEP: creating new certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:189 @ 07/03/24 03:11:11.81
STEP: creating the rbac for ingress to read the certificate secret - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:213 @ 07/03/24 03:11:11.868
STEP: waiting for certificate to get ready - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:219 @ 07/03/24 03:11:12.33
STEP: checking for certificate validity from secret contents - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:223 @ 07/03/24 03:13:08.444
STEP: creating a sample app deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:227 @ 07/03/24 03:13:08.68
W0703 03:13:08.985538 143418 warnings.go:70] unknown field "spec.template.spec.securityContext.allowPrivilegeEscalation"
W0703 03:13:08.985556 143418 warnings.go:70] unknown field "spec.template.spec.securityContext.capabilities"
W0703 03:13:08.985564 143418 warnings.go:70] unknown field "spec.template.spec.securityContext.privileged"
STEP: creating the service exposing the deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:231 @ 07/03/24 03:13:08.985
STEP: creating a route that exposes the service externally - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:235 @ 07/03/24 03:13:09.225
STEP: sleeping 30 seconds - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:260 @ 07/03/24 03:13:09.302
STEP: performing HTTPS GET request on exposed route - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:263 @ 07/03/24 03:13:39.303
< Exit [It] should obtain a valid LetsEncrypt certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 03:13:46.658 (2m35.274s)
> Enter [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 03:13:46.659
STEP: resetting cert-manager state - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:68 @ 07/03/24 03:13:46.659
< Exit [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 03:13:46.903 (244ms)
• [155.748 seconds]
Test is also passing on an AWS OpenShift 4.16 cluster.
------------------------------
Route ExternalCertificateRef [TechPreview]
/home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:46
dns-01 challenge for LetsEncrypt
/home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:115
should expose a route with a valid certificate secret reference
/home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116
> Enter [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 15:02:40.139
STEP: creating Kube clients - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:52 @ 07/03/24 15:02:40.139
STEP: adding override args for dns-01 private zone passthrough - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:60 @ 07/03/24 15:02:40.42
< Exit [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 15:02:41.274 (1.135s)
> Enter [It] should expose a route with a valid certificate secret reference - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 15:02:41.274
STEP: creating a test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:118 @ 07/03/24 15:02:41.274
STEP: obtaining AWS credentials from kube-system namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:123 @ 07/03/24 15:02:42.374
STEP: copying AWS secret access key to test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:130 @ 07/03/24 15:02:42.646
STEP: getting AWS zone from Infrastructure object - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:145 @ 07/03/24 15:02:42.922
STEP: creating new certificate Issuer - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:152 @ 07/03/24 15:02:43.205
STEP: creating new certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:192 @ 07/03/24 15:02:43.498
STEP: creating the rbac for ingress to read the certificate secret - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:216 @ 07/03/24 15:02:43.786
STEP: waiting for certificate to get ready - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:222 @ 07/03/24 15:02:46.266
STEP: checking for certificate validity from secret contents - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:226 @ 07/03/24 15:04:46.828
STEP: creating a sample app deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:230 @ 07/03/24 15:04:48.321
W0703 15:04:49.723788 39733 warnings.go:70] unknown field "spec.template.spec.securityContext.allowPrivilegeEscalation"
W0703 15:04:49.723808 39733 warnings.go:70] unknown field "spec.template.spec.securityContext.capabilities"
W0703 15:04:49.723815 39733 warnings.go:70] unknown field "spec.template.spec.securityContext.privileged"
STEP: creating the service exposing the deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:234 @ 07/03/24 15:04:49.724
STEP: creating a route that exposes the service externally - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:238 @ 07/03/24 15:04:50.952
STEP: sleeping for some time - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:263 @ 07/03/24 15:04:52.959
STEP: performing HTTPS GET request on exposed route - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:266 @ 07/03/24 15:05:02.968
< Exit [It] should expose a route with a valid certificate secret reference - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 15:05:37.681 (2m56.407s)
> Enter [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 15:05:37.681
STEP: resetting cert-manager state - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:68 @ 07/03/24 15:05:37.681
< Exit [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 15:05:38.822 (1.142s)
• [178.684 seconds]
@swghosh: This pull request references CM-354 which is a valid jira issue.
Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the epic to target either version "4.17." or "openshift-4.17.", but it targets "cert-manager-1.15" instead.
In response to this:
OpenShift TechPreview feature RouteExternalCertificate e2e test case
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.
Skipping CI for Draft Pull Request.
If you want CI signal for your change, please convert it to an actual PR.
You can still manually trigger a test run with /test all
[APPROVALNOTIFIER] This PR is NOT APPROVED
This pull-request has been approved by: swghosh Once this PR has been reviewed and has the lgtm label, please assign deads2k for approval. For more information see the Kubernetes Code Review Process.
The full list of commands accepted by this bot can be found here.
Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment
/test e2e-operator
@swghosh: This pull request references CM-354 which is a valid jira issue.
Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the epic to target either version "4.17." or "openshift-4.17.", but it targets "cert-manager-1.15" instead.
In response to this:
OpenShift TechPreview feature RouteExternalCertificate e2e test case
Test is passing on a GCP cluster
------------------------------ Route ExternalCertificateRef [TechPreview] /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:46 dns-01 challenge using explicit credentials /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:115 should obtain a valid LetsEncrypt certificate /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 > Enter [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 03:11:11.154 STEP: creating Kube clients - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:52 @ 07/03/24 03:11:11.155 STEP: adding override args for dns-01 private zone passthrough - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:60 @ 07/03/24 03:11:11.208 < Exit [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 03:11:11.385 (230ms) > Enter [It] should obtain a valid LetsEncrypt certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 03:11:11.385 STEP: creating a test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:118 @ 07/03/24 03:11:11.385 STEP: obtaining GCP credentials from kube-system namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:123 @ 07/03/24 03:11:11.559 STEP: copying GCP service account to test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:130 @ 07/03/24 03:11:11.62 STEP: getting GCP project from Infrastructure object - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:143 @ 07/03/24 03:11:11.683 STEP: creating new certificate Issuer - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:150 @ 07/03/24 03:11:11.739 STEP: creating new certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:189 @ 07/03/24 03:11:11.81 STEP: creating the rbac for ingress to read the certificate secret - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:213 @ 07/03/24 03:11:11.868 STEP: waiting for certificate to get ready - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:219 @ 07/03/24 03:11:12.33 STEP: checking for certificate validity from secret contents - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:223 @ 07/03/24 03:13:08.444 STEP: creating a sample app deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:227 @ 07/03/24 03:13:08.68 W0703 03:13:08.985538 143418 warnings.go:70] unknown field "spec.template.spec.securityContext.allowPrivilegeEscalation" W0703 03:13:08.985556 143418 warnings.go:70] unknown field "spec.template.spec.securityContext.capabilities" W0703 03:13:08.985564 143418 warnings.go:70] unknown field "spec.template.spec.securityContext.privileged" STEP: creating the service exposing the deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:231 @ 07/03/24 03:13:08.985 STEP: creating a route that exposes the service externally - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:235 @ 07/03/24 03:13:09.225 STEP: sleeping 30 seconds - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:260 @ 07/03/24 03:13:09.302 STEP: performing HTTPS GET request on exposed route - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:263 @ 07/03/24 03:13:39.303 < Exit [It] should obtain a valid LetsEncrypt certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 03:13:46.658 (2m35.274s) > Enter [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 03:13:46.659 STEP: resetting cert-manager state - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:68 @ 07/03/24 03:13:46.659 < Exit [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 03:13:46.903 (244ms) • [155.748 seconds]
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.
@swghosh: This pull request references CM-354 which is a valid jira issue.
Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the epic to target either version "4.17." or "openshift-4.17.", but it targets "cert-manager-1.15" instead.
In response to this:
OpenShift TechPreview feature RouteExternalCertificate e2e test case
Test is passing on a GCP cluster locally.
------------------------------ Route ExternalCertificateRef [TechPreview] /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:46 dns-01 challenge using explicit credentials /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:115 should obtain a valid LetsEncrypt certificate /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 > Enter [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 03:11:11.154 STEP: creating Kube clients - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:52 @ 07/03/24 03:11:11.155 STEP: adding override args for dns-01 private zone passthrough - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:60 @ 07/03/24 03:11:11.208 < Exit [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 03:11:11.385 (230ms) > Enter [It] should obtain a valid LetsEncrypt certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 03:11:11.385 STEP: creating a test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:118 @ 07/03/24 03:11:11.385 STEP: obtaining GCP credentials from kube-system namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:123 @ 07/03/24 03:11:11.559 STEP: copying GCP service account to test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:130 @ 07/03/24 03:11:11.62 STEP: getting GCP project from Infrastructure object - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:143 @ 07/03/24 03:11:11.683 STEP: creating new certificate Issuer - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:150 @ 07/03/24 03:11:11.739 STEP: creating new certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:189 @ 07/03/24 03:11:11.81 STEP: creating the rbac for ingress to read the certificate secret - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:213 @ 07/03/24 03:11:11.868 STEP: waiting for certificate to get ready - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:219 @ 07/03/24 03:11:12.33 STEP: checking for certificate validity from secret contents - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:223 @ 07/03/24 03:13:08.444 STEP: creating a sample app deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:227 @ 07/03/24 03:13:08.68 W0703 03:13:08.985538 143418 warnings.go:70] unknown field "spec.template.spec.securityContext.allowPrivilegeEscalation" W0703 03:13:08.985556 143418 warnings.go:70] unknown field "spec.template.spec.securityContext.capabilities" W0703 03:13:08.985564 143418 warnings.go:70] unknown field "spec.template.spec.securityContext.privileged" STEP: creating the service exposing the deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:231 @ 07/03/24 03:13:08.985 STEP: creating a route that exposes the service externally - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:235 @ 07/03/24 03:13:09.225 STEP: sleeping 30 seconds - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:260 @ 07/03/24 03:13:09.302 STEP: performing HTTPS GET request on exposed route - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:263 @ 07/03/24 03:13:39.303 < Exit [It] should obtain a valid LetsEncrypt certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 03:13:46.658 (2m35.274s) > Enter [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 03:13:46.659 STEP: resetting cert-manager state - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:68 @ 07/03/24 03:13:46.659 < Exit [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 03:13:46.903 (244ms) • [155.748 seconds]
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.
/cc @chiragkyal
/test e2e-operator
@swghosh: This pull request references CM-354 which is a valid jira issue.
Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the epic to target either version "4.17." or "openshift-4.17.", but it targets "cert-manager-1.15" instead.
In response to this:
OpenShift TechPreview feature RouteExternalCertificate e2e test case
Test is passing on a GCP cluster locally.
------------------------------ Route ExternalCertificateRef [TechPreview] /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:46 dns-01 challenge using explicit credentials /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:115 should obtain a valid LetsEncrypt certificate /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 > Enter [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 03:11:11.154 STEP: creating Kube clients - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:52 @ 07/03/24 03:11:11.155 STEP: adding override args for dns-01 private zone passthrough - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:60 @ 07/03/24 03:11:11.208 < Exit [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 03:11:11.385 (230ms) > Enter [It] should obtain a valid LetsEncrypt certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 03:11:11.385 STEP: creating a test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:118 @ 07/03/24 03:11:11.385 STEP: obtaining GCP credentials from kube-system namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:123 @ 07/03/24 03:11:11.559 STEP: copying GCP service account to test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:130 @ 07/03/24 03:11:11.62 STEP: getting GCP project from Infrastructure object - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:143 @ 07/03/24 03:11:11.683 STEP: creating new certificate Issuer - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:150 @ 07/03/24 03:11:11.739 STEP: creating new certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:189 @ 07/03/24 03:11:11.81 STEP: creating the rbac for ingress to read the certificate secret - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:213 @ 07/03/24 03:11:11.868 STEP: waiting for certificate to get ready - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:219 @ 07/03/24 03:11:12.33 STEP: checking for certificate validity from secret contents - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:223 @ 07/03/24 03:13:08.444 STEP: creating a sample app deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:227 @ 07/03/24 03:13:08.68 W0703 03:13:08.985538 143418 warnings.go:70] unknown field "spec.template.spec.securityContext.allowPrivilegeEscalation" W0703 03:13:08.985556 143418 warnings.go:70] unknown field "spec.template.spec.securityContext.capabilities" W0703 03:13:08.985564 143418 warnings.go:70] unknown field "spec.template.spec.securityContext.privileged" STEP: creating the service exposing the deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:231 @ 07/03/24 03:13:08.985 STEP: creating a route that exposes the service externally - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:235 @ 07/03/24 03:13:09.225 STEP: sleeping 30 seconds - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:260 @ 07/03/24 03:13:09.302 STEP: performing HTTPS GET request on exposed route - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:263 @ 07/03/24 03:13:39.303 < Exit [It] should obtain a valid LetsEncrypt certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 03:13:46.658 (2m35.274s) > Enter [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 03:13:46.659 STEP: resetting cert-manager state - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:68 @ 07/03/24 03:13:46.659 < Exit [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 03:13:46.903 (244ms) • [155.748 seconds]Test is also passing on AWS cluster.
------------------------------ Route ExternalCertificateRef [TechPreview] /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:46 dns-01 challenge for LetsEncrypt /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:115 should expose a route with a valid certificate secret reference /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 > Enter [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 15:02:40.139 STEP: creating Kube clients - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:52 @ 07/03/24 15:02:40.139 STEP: adding override args for dns-01 private zone passthrough - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:60 @ 07/03/24 15:02:40.42 < Exit [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 15:02:41.274 (1.135s) > Enter [It] should expose a route with a valid certificate secret reference - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 15:02:41.274 STEP: creating a test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:118 @ 07/03/24 15:02:41.274 STEP: obtaining AWS credentials from kube-system namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:123 @ 07/03/24 15:02:42.374 STEP: copying AWS secret access key to test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:130 @ 07/03/24 15:02:42.646 STEP: getting AWS zone from Infrastructure object - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:145 @ 07/03/24 15:02:42.922 STEP: creating new certificate Issuer - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:152 @ 07/03/24 15:02:43.205 STEP: creating new certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:192 @ 07/03/24 15:02:43.498 STEP: creating the rbac for ingress to read the certificate secret - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:216 @ 07/03/24 15:02:43.786 STEP: waiting for certificate to get ready - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:222 @ 07/03/24 15:02:46.266 STEP: checking for certificate validity from secret contents - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:226 @ 07/03/24 15:04:46.828 STEP: creating a sample app deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:230 @ 07/03/24 15:04:48.321 W0703 15:04:49.723788 39733 warnings.go:70] unknown field "spec.template.spec.securityContext.allowPrivilegeEscalation" W0703 15:04:49.723808 39733 warnings.go:70] unknown field "spec.template.spec.securityContext.capabilities" W0703 15:04:49.723815 39733 warnings.go:70] unknown field "spec.template.spec.securityContext.privileged" STEP: creating the service exposing the deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:234 @ 07/03/24 15:04:49.724 STEP: creating a route that exposes the service externally - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:238 @ 07/03/24 15:04:50.952 STEP: sleeping for some time - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:263 @ 07/03/24 15:04:52.959 STEP: performing HTTPS GET request on exposed route - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:266 @ 07/03/24 15:05:02.968 < Exit [It] should expose a route with a valid certificate secret reference - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 15:05:37.681 (2m56.407s) > Enter [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 15:05:37.681 STEP: resetting cert-manager state - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:68 @ 07/03/24 15:05:37.681 < Exit [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 15:05:38.822 (1.142s) • [178.684 seconds]
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.
@swghosh: This pull request references CM-354 which is a valid jira issue.
Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the epic to target either version "4.17." or "openshift-4.17.", but it targets "cert-manager-1.15" instead.
In response to this:
OpenShift TechPreview feature RouteExternalCertificate e2e test case
Test is passing on a GCP OpenShift 4.16 cluster locally.
------------------------------ Route ExternalCertificateRef [TechPreview] /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:46 dns-01 challenge using explicit credentials /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:115 should obtain a valid LetsEncrypt certificate /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 > Enter [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 03:11:11.154 STEP: creating Kube clients - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:52 @ 07/03/24 03:11:11.155 STEP: adding override args for dns-01 private zone passthrough - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:60 @ 07/03/24 03:11:11.208 < Exit [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 03:11:11.385 (230ms) > Enter [It] should obtain a valid LetsEncrypt certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 03:11:11.385 STEP: creating a test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:118 @ 07/03/24 03:11:11.385 STEP: obtaining GCP credentials from kube-system namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:123 @ 07/03/24 03:11:11.559 STEP: copying GCP service account to test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:130 @ 07/03/24 03:11:11.62 STEP: getting GCP project from Infrastructure object - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:143 @ 07/03/24 03:11:11.683 STEP: creating new certificate Issuer - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:150 @ 07/03/24 03:11:11.739 STEP: creating new certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:189 @ 07/03/24 03:11:11.81 STEP: creating the rbac for ingress to read the certificate secret - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:213 @ 07/03/24 03:11:11.868 STEP: waiting for certificate to get ready - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:219 @ 07/03/24 03:11:12.33 STEP: checking for certificate validity from secret contents - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:223 @ 07/03/24 03:13:08.444 STEP: creating a sample app deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:227 @ 07/03/24 03:13:08.68 W0703 03:13:08.985538 143418 warnings.go:70] unknown field "spec.template.spec.securityContext.allowPrivilegeEscalation" W0703 03:13:08.985556 143418 warnings.go:70] unknown field "spec.template.spec.securityContext.capabilities" W0703 03:13:08.985564 143418 warnings.go:70] unknown field "spec.template.spec.securityContext.privileged" STEP: creating the service exposing the deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:231 @ 07/03/24 03:13:08.985 STEP: creating a route that exposes the service externally - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:235 @ 07/03/24 03:13:09.225 STEP: sleeping 30 seconds - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:260 @ 07/03/24 03:13:09.302 STEP: performing HTTPS GET request on exposed route - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:263 @ 07/03/24 03:13:39.303 < Exit [It] should obtain a valid LetsEncrypt certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 03:13:46.658 (2m35.274s) > Enter [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 03:13:46.659 STEP: resetting cert-manager state - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:68 @ 07/03/24 03:13:46.659 < Exit [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 03:13:46.903 (244ms) • [155.748 seconds]Test is also passing on an AWS OpenShift 4.16 cluster.
------------------------------ Route ExternalCertificateRef [TechPreview] /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:46 dns-01 challenge for LetsEncrypt /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:115 should expose a route with a valid certificate secret reference /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 > Enter [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 15:02:40.139 STEP: creating Kube clients - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:52 @ 07/03/24 15:02:40.139 STEP: adding override args for dns-01 private zone passthrough - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:60 @ 07/03/24 15:02:40.42 < Exit [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 15:02:41.274 (1.135s) > Enter [It] should expose a route with a valid certificate secret reference - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 15:02:41.274 STEP: creating a test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:118 @ 07/03/24 15:02:41.274 STEP: obtaining AWS credentials from kube-system namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:123 @ 07/03/24 15:02:42.374 STEP: copying AWS secret access key to test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:130 @ 07/03/24 15:02:42.646 STEP: getting AWS zone from Infrastructure object - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:145 @ 07/03/24 15:02:42.922 STEP: creating new certificate Issuer - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:152 @ 07/03/24 15:02:43.205 STEP: creating new certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:192 @ 07/03/24 15:02:43.498 STEP: creating the rbac for ingress to read the certificate secret - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:216 @ 07/03/24 15:02:43.786 STEP: waiting for certificate to get ready - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:222 @ 07/03/24 15:02:46.266 STEP: checking for certificate validity from secret contents - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:226 @ 07/03/24 15:04:46.828 STEP: creating a sample app deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:230 @ 07/03/24 15:04:48.321 W0703 15:04:49.723788 39733 warnings.go:70] unknown field "spec.template.spec.securityContext.allowPrivilegeEscalation" W0703 15:04:49.723808 39733 warnings.go:70] unknown field "spec.template.spec.securityContext.capabilities" W0703 15:04:49.723815 39733 warnings.go:70] unknown field "spec.template.spec.securityContext.privileged" STEP: creating the service exposing the deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:234 @ 07/03/24 15:04:49.724 STEP: creating a route that exposes the service externally - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:238 @ 07/03/24 15:04:50.952 STEP: sleeping for some time - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:263 @ 07/03/24 15:04:52.959 STEP: performing HTTPS GET request on exposed route - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:266 @ 07/03/24 15:05:02.968 < Exit [It] should expose a route with a valid certificate secret reference - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 15:05:37.681 (2m56.407s) > Enter [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 15:05:37.681 STEP: resetting cert-manager state - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:68 @ 07/03/24 15:05:37.681 < Exit [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 15:05:38.822 (1.142s) • [178.684 seconds]
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.
/test e2e-operator
/test e2e-operator
/test e2e-operator
/test e2e-operator
/test e2e-operator
/cc @lunarwhite feel free to review/re-use in the future whenever we want full-scale e2e's on Route secret reference current test implementation is only a draft PoC to check e2e compatibility on OpenShift 4.16 with cert-manager 1.14
/test e2e-operator
@swghosh: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:
| Test name | Commit | Details | Required | Rerun command |
|---|---|---|---|---|
| ci/prow/e2e-operator | d4cfc2c1d284dc97ce4aa62f24326ff1c0eb0e0f | link | true | /test e2e-operator |
Full PR test history. Your PR dashboard.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.
PR needs rebase.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.
Issues go stale after 90d of inactivity.
Mark the issue as fresh by commenting /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.
Exclude this issue from closing by commenting /lifecycle frozen.
If this issue is safe to close now please do so with /close.
/lifecycle stale
Stale issues rot after 30d of inactivity.
Mark the issue as fresh by commenting /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.
Exclude this issue from closing by commenting /lifecycle frozen.
If this issue is safe to close now please do so with /close.
/lifecycle rotten /remove-lifecycle stale
Rotten issues close after 30d of inactivity.
Reopen the issue by commenting /reopen.
Mark the issue as fresh by commenting /remove-lifecycle rotten.
Exclude this issue from closing again by commenting /lifecycle frozen.
/close
@openshift-bot: Closed this PR.
In response to this:
Rotten issues close after 30d of inactivity.
Reopen the issue by commenting
/reopen. Mark the issue as fresh by commenting/remove-lifecycle rotten. Exclude this issue from closing again by commenting/lifecycle frozen./close
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.