cert-manager-operator icon indicating copy to clipboard operation
cert-manager-operator copied to clipboard

CM-354: [PoC] RouteExternalCertificate - TechPreview e2e

Open swghosh opened this issue 1 year ago • 19 comments

OpenShift TechPreview feature RouteExternalCertificate e2e test case

Test is passing on a GCP OpenShift 4.16 cluster locally.

------------------------------
Route ExternalCertificateRef [TechPreview]
/home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:46
  dns-01 challenge using explicit credentials
  /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:115
    should obtain a valid LetsEncrypt certificate
    /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116
  > Enter [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 03:11:11.154
  STEP: creating Kube clients - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:52 @ 07/03/24 03:11:11.155
  STEP: adding override args for dns-01 private zone passthrough - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:60 @ 07/03/24 03:11:11.208
  < Exit [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 03:11:11.385 (230ms)
  > Enter [It] should obtain a valid LetsEncrypt certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 03:11:11.385
  STEP: creating a test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:118 @ 07/03/24 03:11:11.385
  STEP: obtaining GCP credentials from kube-system namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:123 @ 07/03/24 03:11:11.559
  STEP: copying GCP service account to test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:130 @ 07/03/24 03:11:11.62
  STEP: getting GCP project from Infrastructure object - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:143 @ 07/03/24 03:11:11.683
  STEP: creating new certificate Issuer - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:150 @ 07/03/24 03:11:11.739
  STEP: creating new certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:189 @ 07/03/24 03:11:11.81
  STEP: creating the rbac for ingress to read the certificate secret - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:213 @ 07/03/24 03:11:11.868
  STEP: waiting for certificate to get ready - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:219 @ 07/03/24 03:11:12.33
  STEP: checking for certificate validity from secret contents - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:223 @ 07/03/24 03:13:08.444
  STEP: creating a sample app deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:227 @ 07/03/24 03:13:08.68
W0703 03:13:08.985538  143418 warnings.go:70] unknown field "spec.template.spec.securityContext.allowPrivilegeEscalation"
W0703 03:13:08.985556  143418 warnings.go:70] unknown field "spec.template.spec.securityContext.capabilities"
W0703 03:13:08.985564  143418 warnings.go:70] unknown field "spec.template.spec.securityContext.privileged"
  STEP: creating the service exposing the deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:231 @ 07/03/24 03:13:08.985
  STEP: creating a route that exposes the service externally - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:235 @ 07/03/24 03:13:09.225
  STEP: sleeping 30 seconds - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:260 @ 07/03/24 03:13:09.302
  STEP: performing HTTPS GET request on exposed route - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:263 @ 07/03/24 03:13:39.303
  < Exit [It] should obtain a valid LetsEncrypt certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 03:13:46.658 (2m35.274s)
  > Enter [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 03:13:46.659
  STEP: resetting cert-manager state - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:68 @ 07/03/24 03:13:46.659
  < Exit [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 03:13:46.903 (244ms)
• [155.748 seconds]

Test is also passing on an AWS OpenShift 4.16 cluster.

------------------------------
Route ExternalCertificateRef [TechPreview]
/home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:46
  dns-01 challenge for LetsEncrypt
  /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:115
    should expose a route with a valid certificate secret reference
    /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116
  > Enter [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 15:02:40.139
  STEP: creating Kube clients - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:52 @ 07/03/24 15:02:40.139
  STEP: adding override args for dns-01 private zone passthrough - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:60 @ 07/03/24 15:02:40.42
  < Exit [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 15:02:41.274 (1.135s)
  > Enter [It] should expose a route with a valid certificate secret reference - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 15:02:41.274
  STEP: creating a test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:118 @ 07/03/24 15:02:41.274
  STEP: obtaining AWS credentials from kube-system namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:123 @ 07/03/24 15:02:42.374
  STEP: copying AWS secret access key to test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:130 @ 07/03/24 15:02:42.646
  STEP: getting AWS zone from Infrastructure object - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:145 @ 07/03/24 15:02:42.922
  STEP: creating new certificate Issuer - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:152 @ 07/03/24 15:02:43.205
  STEP: creating new certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:192 @ 07/03/24 15:02:43.498
  STEP: creating the rbac for ingress to read the certificate secret - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:216 @ 07/03/24 15:02:43.786
  STEP: waiting for certificate to get ready - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:222 @ 07/03/24 15:02:46.266
  STEP: checking for certificate validity from secret contents - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:226 @ 07/03/24 15:04:46.828
  STEP: creating a sample app deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:230 @ 07/03/24 15:04:48.321
W0703 15:04:49.723788   39733 warnings.go:70] unknown field "spec.template.spec.securityContext.allowPrivilegeEscalation"
W0703 15:04:49.723808   39733 warnings.go:70] unknown field "spec.template.spec.securityContext.capabilities"
W0703 15:04:49.723815   39733 warnings.go:70] unknown field "spec.template.spec.securityContext.privileged"
  STEP: creating the service exposing the deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:234 @ 07/03/24 15:04:49.724
  STEP: creating a route that exposes the service externally - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:238 @ 07/03/24 15:04:50.952
  STEP: sleeping for some time - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:263 @ 07/03/24 15:04:52.959
  STEP: performing HTTPS GET request on exposed route - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:266 @ 07/03/24 15:05:02.968
  < Exit [It] should expose a route with a valid certificate secret reference - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 15:05:37.681 (2m56.407s)
  > Enter [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 15:05:37.681
  STEP: resetting cert-manager state - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:68 @ 07/03/24 15:05:37.681
  < Exit [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 15:05:38.822 (1.142s)
• [178.684 seconds]

swghosh avatar Jul 02 '24 18:07 swghosh

@swghosh: This pull request references CM-354 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the epic to target either version "4.17." or "openshift-4.17.", but it targets "cert-manager-1.15" instead.

In response to this:

OpenShift TechPreview feature RouteExternalCertificate e2e test case

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

openshift-ci-robot avatar Jul 02 '24 18:07 openshift-ci-robot

Skipping CI for Draft Pull Request. If you want CI signal for your change, please convert it to an actual PR. You can still manually trigger a test run with /test all

openshift-ci[bot] avatar Jul 02 '24 18:07 openshift-ci[bot]

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: swghosh Once this PR has been reviewed and has the lgtm label, please assign deads2k for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment Approvers can cancel approval by writing /approve cancel in a comment

openshift-ci[bot] avatar Jul 02 '24 18:07 openshift-ci[bot]

/test e2e-operator

swghosh avatar Jul 02 '24 18:07 swghosh

@swghosh: This pull request references CM-354 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the epic to target either version "4.17." or "openshift-4.17.", but it targets "cert-manager-1.15" instead.

In response to this:

OpenShift TechPreview feature RouteExternalCertificate e2e test case

Test is passing on a GCP cluster

------------------------------
Route ExternalCertificateRef [TechPreview]
/home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:46
 dns-01 challenge using explicit credentials
 /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:115
   should obtain a valid LetsEncrypt certificate
   /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116
 > Enter [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 03:11:11.154
 STEP: creating Kube clients - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:52 @ 07/03/24 03:11:11.155
 STEP: adding override args for dns-01 private zone passthrough - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:60 @ 07/03/24 03:11:11.208
 < Exit [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 03:11:11.385 (230ms)
 > Enter [It] should obtain a valid LetsEncrypt certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 03:11:11.385
 STEP: creating a test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:118 @ 07/03/24 03:11:11.385
 STEP: obtaining GCP credentials from kube-system namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:123 @ 07/03/24 03:11:11.559
 STEP: copying GCP service account to test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:130 @ 07/03/24 03:11:11.62
 STEP: getting GCP project from Infrastructure object - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:143 @ 07/03/24 03:11:11.683
 STEP: creating new certificate Issuer - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:150 @ 07/03/24 03:11:11.739
 STEP: creating new certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:189 @ 07/03/24 03:11:11.81
 STEP: creating the rbac for ingress to read the certificate secret - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:213 @ 07/03/24 03:11:11.868
 STEP: waiting for certificate to get ready - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:219 @ 07/03/24 03:11:12.33
 STEP: checking for certificate validity from secret contents - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:223 @ 07/03/24 03:13:08.444
 STEP: creating a sample app deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:227 @ 07/03/24 03:13:08.68
W0703 03:13:08.985538  143418 warnings.go:70] unknown field "spec.template.spec.securityContext.allowPrivilegeEscalation"
W0703 03:13:08.985556  143418 warnings.go:70] unknown field "spec.template.spec.securityContext.capabilities"
W0703 03:13:08.985564  143418 warnings.go:70] unknown field "spec.template.spec.securityContext.privileged"
 STEP: creating the service exposing the deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:231 @ 07/03/24 03:13:08.985
 STEP: creating a route that exposes the service externally - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:235 @ 07/03/24 03:13:09.225
 STEP: sleeping 30 seconds - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:260 @ 07/03/24 03:13:09.302
 STEP: performing HTTPS GET request on exposed route - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:263 @ 07/03/24 03:13:39.303
 < Exit [It] should obtain a valid LetsEncrypt certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 03:13:46.658 (2m35.274s)
 > Enter [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 03:13:46.659
 STEP: resetting cert-manager state - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:68 @ 07/03/24 03:13:46.659
 < Exit [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 03:13:46.903 (244ms)
• [155.748 seconds]

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

openshift-ci-robot avatar Jul 02 '24 21:07 openshift-ci-robot

@swghosh: This pull request references CM-354 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the epic to target either version "4.17." or "openshift-4.17.", but it targets "cert-manager-1.15" instead.

In response to this:

OpenShift TechPreview feature RouteExternalCertificate e2e test case

Test is passing on a GCP cluster locally.

------------------------------
Route ExternalCertificateRef [TechPreview]
/home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:46
 dns-01 challenge using explicit credentials
 /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:115
   should obtain a valid LetsEncrypt certificate
   /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116
 > Enter [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 03:11:11.154
 STEP: creating Kube clients - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:52 @ 07/03/24 03:11:11.155
 STEP: adding override args for dns-01 private zone passthrough - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:60 @ 07/03/24 03:11:11.208
 < Exit [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 03:11:11.385 (230ms)
 > Enter [It] should obtain a valid LetsEncrypt certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 03:11:11.385
 STEP: creating a test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:118 @ 07/03/24 03:11:11.385
 STEP: obtaining GCP credentials from kube-system namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:123 @ 07/03/24 03:11:11.559
 STEP: copying GCP service account to test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:130 @ 07/03/24 03:11:11.62
 STEP: getting GCP project from Infrastructure object - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:143 @ 07/03/24 03:11:11.683
 STEP: creating new certificate Issuer - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:150 @ 07/03/24 03:11:11.739
 STEP: creating new certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:189 @ 07/03/24 03:11:11.81
 STEP: creating the rbac for ingress to read the certificate secret - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:213 @ 07/03/24 03:11:11.868
 STEP: waiting for certificate to get ready - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:219 @ 07/03/24 03:11:12.33
 STEP: checking for certificate validity from secret contents - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:223 @ 07/03/24 03:13:08.444
 STEP: creating a sample app deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:227 @ 07/03/24 03:13:08.68
W0703 03:13:08.985538  143418 warnings.go:70] unknown field "spec.template.spec.securityContext.allowPrivilegeEscalation"
W0703 03:13:08.985556  143418 warnings.go:70] unknown field "spec.template.spec.securityContext.capabilities"
W0703 03:13:08.985564  143418 warnings.go:70] unknown field "spec.template.spec.securityContext.privileged"
 STEP: creating the service exposing the deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:231 @ 07/03/24 03:13:08.985
 STEP: creating a route that exposes the service externally - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:235 @ 07/03/24 03:13:09.225
 STEP: sleeping 30 seconds - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:260 @ 07/03/24 03:13:09.302
 STEP: performing HTTPS GET request on exposed route - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:263 @ 07/03/24 03:13:39.303
 < Exit [It] should obtain a valid LetsEncrypt certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 03:13:46.658 (2m35.274s)
 > Enter [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 03:13:46.659
 STEP: resetting cert-manager state - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:68 @ 07/03/24 03:13:46.659
 < Exit [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 03:13:46.903 (244ms)
• [155.748 seconds]

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

openshift-ci-robot avatar Jul 02 '24 21:07 openshift-ci-robot

/cc @chiragkyal

swghosh avatar Jul 03 '24 07:07 swghosh

/test e2e-operator

swghosh avatar Jul 03 '24 07:07 swghosh

@swghosh: This pull request references CM-354 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the epic to target either version "4.17." or "openshift-4.17.", but it targets "cert-manager-1.15" instead.

In response to this:

OpenShift TechPreview feature RouteExternalCertificate e2e test case

Test is passing on a GCP cluster locally.

------------------------------
Route ExternalCertificateRef [TechPreview]
/home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:46
 dns-01 challenge using explicit credentials
 /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:115
   should obtain a valid LetsEncrypt certificate
   /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116
 > Enter [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 03:11:11.154
 STEP: creating Kube clients - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:52 @ 07/03/24 03:11:11.155
 STEP: adding override args for dns-01 private zone passthrough - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:60 @ 07/03/24 03:11:11.208
 < Exit [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 03:11:11.385 (230ms)
 > Enter [It] should obtain a valid LetsEncrypt certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 03:11:11.385
 STEP: creating a test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:118 @ 07/03/24 03:11:11.385
 STEP: obtaining GCP credentials from kube-system namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:123 @ 07/03/24 03:11:11.559
 STEP: copying GCP service account to test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:130 @ 07/03/24 03:11:11.62
 STEP: getting GCP project from Infrastructure object - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:143 @ 07/03/24 03:11:11.683
 STEP: creating new certificate Issuer - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:150 @ 07/03/24 03:11:11.739
 STEP: creating new certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:189 @ 07/03/24 03:11:11.81
 STEP: creating the rbac for ingress to read the certificate secret - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:213 @ 07/03/24 03:11:11.868
 STEP: waiting for certificate to get ready - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:219 @ 07/03/24 03:11:12.33
 STEP: checking for certificate validity from secret contents - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:223 @ 07/03/24 03:13:08.444
 STEP: creating a sample app deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:227 @ 07/03/24 03:13:08.68
W0703 03:13:08.985538  143418 warnings.go:70] unknown field "spec.template.spec.securityContext.allowPrivilegeEscalation"
W0703 03:13:08.985556  143418 warnings.go:70] unknown field "spec.template.spec.securityContext.capabilities"
W0703 03:13:08.985564  143418 warnings.go:70] unknown field "spec.template.spec.securityContext.privileged"
 STEP: creating the service exposing the deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:231 @ 07/03/24 03:13:08.985
 STEP: creating a route that exposes the service externally - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:235 @ 07/03/24 03:13:09.225
 STEP: sleeping 30 seconds - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:260 @ 07/03/24 03:13:09.302
 STEP: performing HTTPS GET request on exposed route - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:263 @ 07/03/24 03:13:39.303
 < Exit [It] should obtain a valid LetsEncrypt certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 03:13:46.658 (2m35.274s)
 > Enter [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 03:13:46.659
 STEP: resetting cert-manager state - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:68 @ 07/03/24 03:13:46.659
 < Exit [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 03:13:46.903 (244ms)
• [155.748 seconds]

Test is also passing on AWS cluster.

------------------------------
Route ExternalCertificateRef [TechPreview]
/home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:46
 dns-01 challenge for LetsEncrypt
 /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:115
   should expose a route with a valid certificate secret reference
   /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116
 > Enter [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 15:02:40.139
 STEP: creating Kube clients - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:52 @ 07/03/24 15:02:40.139
 STEP: adding override args for dns-01 private zone passthrough - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:60 @ 07/03/24 15:02:40.42
 < Exit [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 15:02:41.274 (1.135s)
 > Enter [It] should expose a route with a valid certificate secret reference - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 15:02:41.274
 STEP: creating a test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:118 @ 07/03/24 15:02:41.274
 STEP: obtaining AWS credentials from kube-system namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:123 @ 07/03/24 15:02:42.374
 STEP: copying AWS secret access key to test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:130 @ 07/03/24 15:02:42.646
 STEP: getting AWS zone from Infrastructure object - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:145 @ 07/03/24 15:02:42.922
 STEP: creating new certificate Issuer - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:152 @ 07/03/24 15:02:43.205
 STEP: creating new certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:192 @ 07/03/24 15:02:43.498
 STEP: creating the rbac for ingress to read the certificate secret - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:216 @ 07/03/24 15:02:43.786
 STEP: waiting for certificate to get ready - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:222 @ 07/03/24 15:02:46.266
 STEP: checking for certificate validity from secret contents - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:226 @ 07/03/24 15:04:46.828
 STEP: creating a sample app deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:230 @ 07/03/24 15:04:48.321
W0703 15:04:49.723788   39733 warnings.go:70] unknown field "spec.template.spec.securityContext.allowPrivilegeEscalation"
W0703 15:04:49.723808   39733 warnings.go:70] unknown field "spec.template.spec.securityContext.capabilities"
W0703 15:04:49.723815   39733 warnings.go:70] unknown field "spec.template.spec.securityContext.privileged"
 STEP: creating the service exposing the deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:234 @ 07/03/24 15:04:49.724
 STEP: creating a route that exposes the service externally - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:238 @ 07/03/24 15:04:50.952
 STEP: sleeping for some time - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:263 @ 07/03/24 15:04:52.959
 STEP: performing HTTPS GET request on exposed route - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:266 @ 07/03/24 15:05:02.968
 < Exit [It] should expose a route with a valid certificate secret reference - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 15:05:37.681 (2m56.407s)
 > Enter [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 15:05:37.681
 STEP: resetting cert-manager state - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:68 @ 07/03/24 15:05:37.681
 < Exit [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 15:05:38.822 (1.142s)
• [178.684 seconds]

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

openshift-ci-robot avatar Jul 03 '24 09:07 openshift-ci-robot

@swghosh: This pull request references CM-354 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the epic to target either version "4.17." or "openshift-4.17.", but it targets "cert-manager-1.15" instead.

In response to this:

OpenShift TechPreview feature RouteExternalCertificate e2e test case

Test is passing on a GCP OpenShift 4.16 cluster locally.

------------------------------
Route ExternalCertificateRef [TechPreview]
/home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:46
 dns-01 challenge using explicit credentials
 /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:115
   should obtain a valid LetsEncrypt certificate
   /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116
 > Enter [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 03:11:11.154
 STEP: creating Kube clients - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:52 @ 07/03/24 03:11:11.155
 STEP: adding override args for dns-01 private zone passthrough - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:60 @ 07/03/24 03:11:11.208
 < Exit [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 03:11:11.385 (230ms)
 > Enter [It] should obtain a valid LetsEncrypt certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 03:11:11.385
 STEP: creating a test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:118 @ 07/03/24 03:11:11.385
 STEP: obtaining GCP credentials from kube-system namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:123 @ 07/03/24 03:11:11.559
 STEP: copying GCP service account to test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:130 @ 07/03/24 03:11:11.62
 STEP: getting GCP project from Infrastructure object - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:143 @ 07/03/24 03:11:11.683
 STEP: creating new certificate Issuer - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:150 @ 07/03/24 03:11:11.739
 STEP: creating new certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:189 @ 07/03/24 03:11:11.81
 STEP: creating the rbac for ingress to read the certificate secret - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:213 @ 07/03/24 03:11:11.868
 STEP: waiting for certificate to get ready - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:219 @ 07/03/24 03:11:12.33
 STEP: checking for certificate validity from secret contents - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:223 @ 07/03/24 03:13:08.444
 STEP: creating a sample app deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:227 @ 07/03/24 03:13:08.68
W0703 03:13:08.985538  143418 warnings.go:70] unknown field "spec.template.spec.securityContext.allowPrivilegeEscalation"
W0703 03:13:08.985556  143418 warnings.go:70] unknown field "spec.template.spec.securityContext.capabilities"
W0703 03:13:08.985564  143418 warnings.go:70] unknown field "spec.template.spec.securityContext.privileged"
 STEP: creating the service exposing the deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:231 @ 07/03/24 03:13:08.985
 STEP: creating a route that exposes the service externally - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:235 @ 07/03/24 03:13:09.225
 STEP: sleeping 30 seconds - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:260 @ 07/03/24 03:13:09.302
 STEP: performing HTTPS GET request on exposed route - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:263 @ 07/03/24 03:13:39.303
 < Exit [It] should obtain a valid LetsEncrypt certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 03:13:46.658 (2m35.274s)
 > Enter [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 03:13:46.659
 STEP: resetting cert-manager state - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:68 @ 07/03/24 03:13:46.659
 < Exit [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 03:13:46.903 (244ms)
• [155.748 seconds]

Test is also passing on an AWS OpenShift 4.16 cluster.

------------------------------
Route ExternalCertificateRef [TechPreview]
/home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:46
 dns-01 challenge for LetsEncrypt
 /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:115
   should expose a route with a valid certificate secret reference
   /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116
 > Enter [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 15:02:40.139
 STEP: creating Kube clients - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:52 @ 07/03/24 15:02:40.139
 STEP: adding override args for dns-01 private zone passthrough - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:60 @ 07/03/24 15:02:40.42
 < Exit [BeforeAll] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:51 @ 07/03/24 15:02:41.274 (1.135s)
 > Enter [It] should expose a route with a valid certificate secret reference - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 15:02:41.274
 STEP: creating a test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:118 @ 07/03/24 15:02:41.274
 STEP: obtaining AWS credentials from kube-system namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:123 @ 07/03/24 15:02:42.374
 STEP: copying AWS secret access key to test namespace - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:130 @ 07/03/24 15:02:42.646
 STEP: getting AWS zone from Infrastructure object - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:145 @ 07/03/24 15:02:42.922
 STEP: creating new certificate Issuer - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:152 @ 07/03/24 15:02:43.205
 STEP: creating new certificate - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:192 @ 07/03/24 15:02:43.498
 STEP: creating the rbac for ingress to read the certificate secret - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:216 @ 07/03/24 15:02:43.786
 STEP: waiting for certificate to get ready - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:222 @ 07/03/24 15:02:46.266
 STEP: checking for certificate validity from secret contents - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:226 @ 07/03/24 15:04:46.828
 STEP: creating a sample app deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:230 @ 07/03/24 15:04:48.321
W0703 15:04:49.723788   39733 warnings.go:70] unknown field "spec.template.spec.securityContext.allowPrivilegeEscalation"
W0703 15:04:49.723808   39733 warnings.go:70] unknown field "spec.template.spec.securityContext.capabilities"
W0703 15:04:49.723815   39733 warnings.go:70] unknown field "spec.template.spec.securityContext.privileged"
 STEP: creating the service exposing the deployment - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:234 @ 07/03/24 15:04:49.724
 STEP: creating a route that exposes the service externally - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:238 @ 07/03/24 15:04:50.952
 STEP: sleeping for some time - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:263 @ 07/03/24 15:04:52.959
 STEP: performing HTTPS GET request on exposed route - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:266 @ 07/03/24 15:05:02.968
 < Exit [It] should expose a route with a valid certificate secret reference - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:116 @ 07/03/24 15:05:37.681 (2m56.407s)
 > Enter [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 15:05:37.681
 STEP: resetting cert-manager state - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:68 @ 07/03/24 15:05:37.681
 < Exit [DeferCleanup (All)] Route ExternalCertificateRef - /home/swghosh/go/src/github.com/openshift/cert-manager-operator/test/e2e/tp_suite_test.go:67 @ 07/03/24 15:05:38.822 (1.142s)
• [178.684 seconds]

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

openshift-ci-robot avatar Jul 03 '24 09:07 openshift-ci-robot

/test e2e-operator

swghosh avatar Jul 03 '24 09:07 swghosh

/test e2e-operator

swghosh avatar Jul 03 '24 11:07 swghosh

/test e2e-operator

swghosh avatar Jul 03 '24 12:07 swghosh

/test e2e-operator

swghosh avatar Jul 03 '24 21:07 swghosh

/test e2e-operator

swghosh avatar Jul 04 '24 06:07 swghosh

/cc @lunarwhite feel free to review/re-use in the future whenever we want full-scale e2e's on Route secret reference current test implementation is only a draft PoC to check e2e compatibility on OpenShift 4.16 with cert-manager 1.14

swghosh avatar Jul 04 '24 06:07 swghosh

/test e2e-operator

swghosh avatar Jul 17 '24 15:07 swghosh

@swghosh: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-operator d4cfc2c1d284dc97ce4aa62f24326ff1c0eb0e0f link true /test e2e-operator

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

openshift-ci[bot] avatar Jul 17 '24 17:07 openshift-ci[bot]

PR needs rebase.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

openshift-merge-robot avatar Jul 23 '24 13:07 openshift-merge-robot

Issues go stale after 90d of inactivity.

Mark the issue as fresh by commenting /remove-lifecycle stale. Stale issues rot after an additional 30d of inactivity and eventually close. Exclude this issue from closing by commenting /lifecycle frozen.

If this issue is safe to close now please do so with /close.

/lifecycle stale

openshift-bot avatar Oct 22 '24 01:10 openshift-bot

Stale issues rot after 30d of inactivity.

Mark the issue as fresh by commenting /remove-lifecycle rotten. Rotten issues close after an additional 30d of inactivity. Exclude this issue from closing by commenting /lifecycle frozen.

If this issue is safe to close now please do so with /close.

/lifecycle rotten /remove-lifecycle stale

openshift-bot avatar Nov 21 '24 08:11 openshift-bot

Rotten issues close after 30d of inactivity.

Reopen the issue by commenting /reopen. Mark the issue as fresh by commenting /remove-lifecycle rotten. Exclude this issue from closing again by commenting /lifecycle frozen.

/close

openshift-bot avatar Dec 22 '24 00:12 openshift-bot

@openshift-bot: Closed this PR.

In response to this:

Rotten issues close after 30d of inactivity.

Reopen the issue by commenting /reopen. Mark the issue as fresh by commenting /remove-lifecycle rotten. Exclude this issue from closing again by commenting /lifecycle frozen.

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

openshift-ci[bot] avatar Dec 22 '24 00:12 openshift-ci[bot]