Skip to content

Conversation

@jianzhangbjz
Copy link
Member

As the title shows.
Assisted-by: Claude Code

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Nov 14, 2025
@openshift-ci-robot
Copy link

openshift-ci-robot commented Nov 14, 2025

@jianzhangbjz: This pull request references OCPQE-30672 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the sub-task to target the "4.21.0" version, but no target version was set.

Details

In response to this:

As the title shows.
Assisted-by: Claude Code

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 14, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: jianzhangbjz

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Nov 14, 2025
@jianzhangbjz jianzhangbjz force-pushed the OTE branch 2 times, most recently from 058490c to 9eb7151 Compare November 14, 2025 07:30

})

g.It("PolarionID:83026-[OTP][Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource: unknown change, refusing to determine that change is safe", g.Label("original-name:[sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource: unknown change, refusing to determine that change is safe"), func() {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@jianzhangbjz FYI. Required For all QE cases: Do not use &|!,()/ in case title.

g.It("PolarionID:83026-[OTP][Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource: unknown change, refusing to determine that change is safe", g.Label("original-name:[sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource: unknown change, refusing to determine that change is safe")

to

g.It("PolarionID:83026-[OTP][Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource: unknown change and refusing to determine that change is safe", g.Label("original-name:[sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource: unknown change and refusing to determine that change is safe")


})

g.It("PolarionID:80458-[OTP][Level0][Skipped:Disconnected]clustercatalog get x509 error since it cannot get the custom CA automatically", g.Label("original-name:[sig-olmv1][Jira:OLM] clustercatalog PolarionID:80458-[Skipped:Disconnected]clustercatalog get x509 error since it cannot get the custom CA automatically"), g.Label("Serial"), func() {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@jianzhangbjz Slow, Serial, Disruptive: Preserved

so,

g.It("PolarionID:80458-[OTP][Level0][Skipped:Disconnected]clustercatalog get x509 error since it cannot get the custom CA automatically", g.Label("original-name:[sig-olmv1][Jira:OLM] clustercatalog PolarionID:80458-[Skipped:Disconnected]clustercatalog get x509 error since it cannot get the custom CA automatically"), g.Label("Serial"), func() {

to

g.It("PolarionID:80458-[OTP][Level0][Skipped:Disconnected]clustercatalog get x509 error since it cannot get the custom CA automatically [Serial]", g.Label("original-name:[sig-olmv1][Jira:OLM] clustercatalog PolarionID:80458-[Skipped:Disconnected]clustercatalog get x509 error since it cannot get the custom CA automatically [Serial]"),  func() {

package specs

import (
"context"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

var _ = g.Describe("[sig-olmv1][Jira:OLM] cluster-olm-operator", g.Label("NonHyperShiftHOST"), func() {
defer g.GinkgoRecover()
var (
oc = exutil.NewCLI("olmv1-cluster-olm-operator"+exutil.GetRandomString(), exutil.KubeConfigPath())
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@jianzhangbjz it seem be better as 'oc = exutil.NewCLIWithoutNamespace("default")'

@kuiwang02
Copy link
Contributor

/payload-aggregate periodic-ci-openshift-operator-framework-operator-controller-release-4.21-periodics-e2e-aws-ovn-techpreview-extended-f1 5

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 14, 2025

@kuiwang02: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-operator-framework-operator-controller-release-4.21-periodics-e2e-aws-ovn-techpreview-extended-f1

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/a5c63760-c12f-11f0-9b55-1a10b38dcec1-0

@jianzhangbjz
Copy link
Member Author

Hi @kuiwang02 , seems like the test passed, could you help approve it? Thanks!
/payload-job periodic-ci-openshift-operator-framework-operator-controller-release-4.21-periodics-e2e-aws-ovn-techpreview-extended-f1

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 17, 2025

@jianzhangbjz: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-operator-framework-operator-controller-release-4.21-periodics-e2e-aws-ovn-techpreview-extended-f1

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/a48d8990-c34e-11f0-85ec-e02c83f76b12-0

@kuiwang02
Copy link
Contributor

kuiwang02 commented Nov 17, 2025

@jianzhangbjz

the case 83026 is failing for some job run, for example
https://prow.ci.openshift.org/view/gs/test-platform-results/logs/openshift-operator-framework-operator-controller-558-periodics-e2e-aws-ovn-techpreview-extended-f1/1989241414868799488

I think it is caused by job duplicated. so, I will add lgtm. and then please monitor the case running late.

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Nov 17, 2025
@openshift-ci openshift-ci bot removed the lgtm Indicates that a PR is ready to be merged. label Nov 17, 2025
@jianzhangbjz
Copy link
Member Author

For case 83026, I believe the root cause is that the message content checks no longer ignore capital and small letters.

  I1117 15:45:30.519280 99994 clusterextension.go:293] message is Desired state reached, not include desired state reached, and try next
  I1117 15:45:35.512875 99994 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].message}'

Now, in this repo, https://github.com/openshift/operator-framework-operator-controller/blob/main/openshift/tests-extension/test/qe/util/olmv1util/clusterextension.go#L292

		if !strings.Contains(output, expect) {
			e2e.Logf("message is %v, not include %v, and try next", output, expect)
			return false, nil
		}

In private repo: https://github.com/openshift/openshift-tests-private/blob/master/test/extended/operators/olmv1util/clusterextension.go#L221

		if !strings.Contains(strings.ToLower(output), strings.ToLower(expect)) {
			e2e.Logf("message is %v, not include %v, and try next", output, expect)
			return false, nil
		}

Anyway, I have updated case 83026. Test passed. Could you help approve it? Thanks!

jiazha-mac:tests-extension jiazha$ ./bin/olmv1-tests-ext run-test -n "[sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[OTP][Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource unknown change and refusing to determine that change is safe"
  [INFO] [env] Using kubeconfig: /Users/jiazha/21-kubeconfig
  [INFO] [env] Cluster environment initialized (OpenShift: true)
  I1117 16:17:51.176668 2999 test_context.go:567] The --provider flag is not set. Continuing as if --provider=skeleton had been used.
  Running Suite:  - /Users/jiazha/goproject/operator-framework-operator-controller/openshift/tests-extension
  ==========================================================================================================
  Random Seed: 1763367467 - will randomize all specs

  Will run 1 of 1 specs
  ------------------------------
  [sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[OTP][Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource unknown change and refusing to determine that change is safe [NonHyperShiftHOST, original-name:[sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource unknown change and refusing to determine that change is safe]
  /Users/jiazha/goproject/operator-framework-operator-controller/openshift/tests-extension/test/qe/specs/olmv1_ce.go:1448
    STEP: Creating a kubernetes client @ 11/17/25 16:17:51.178
  I1117 16:17:56.186423 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig explain template.apiVersion'
    STEP: 1)install Argocd operator v0.4.0 in a random namespace @ 11/17/25 16:17:58.349
  I1117 16:17:58.349236 2999 client.go:349] do not know if it is external oidc cluster or not, and try to check it again
  I1117 16:17:58.349299 2999 client.go:753] showInfo is true
  I1117 16:17:58.349307 2999 client.go:755] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get authentication/cluster -o=jsonpath={.spec.type}'
  I1117 16:17:59.683024 2999 clusters.go:568] Found authentication type used: 
  I1117 16:18:02.110863 2999 client.go:200] configPath is now "/var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/configfile4273393105"
  I1117 16:18:02.110940 2999 client.go:363] The user is now "e2e-test-default-plvr2-user"
  I1117 16:18:02.110955 2999 client.go:366] Creating project "e2e-test-default-plvr2"
  I1117 16:18:02.501987 2999 client.go:375] Waiting on permissions in project "e2e-test-default-plvr2" ...
  I1117 16:18:03.726973 2999 client.go:436] Waiting for ServiceAccount "default" to be provisioned...
  I1117 16:18:04.111916 2999 client.go:436] Waiting for ServiceAccount "builder" to be provisioned...
  I1117 16:18:04.585624 2999 client.go:436] Waiting for ServiceAccount "deployer" to be provisioned...
  I1117 16:18:04.964527 2999 client.go:446] Waiting for RoleBinding "system:image-builders" to be provisioned...
  I1117 16:18:05.526785 2999 client.go:446] Waiting for RoleBinding "system:deployers" to be provisioned...
  I1117 16:18:06.635110 2999 client.go:446] Waiting for RoleBinding "system:image-pullers" to be provisioned...
  I1117 16:18:07.193231 2999 client.go:477] Project "e2e-test-default-plvr2" has been fully provisioned.
  I1117 16:18:07.193466 2999 sa-clusterrolebinding.go:34] =========Create sacrb argocd-83026=========
  I1117 16:18:07.193505 2999 sa-clusterrolebinding.go:58] =========CreateWithoutCheck sacrb argocd-83026=========
  I1117 16:18:10.195284 2999 client.go:753] showInfo is true
  I1117 16:18:10.195432 2999 client.go:755] Running 'oc --namespace=e2e-test-default-plvr2 --kubeconfig=/Users/jiazha/21-kubeconfig process -n default --ignore-unknown-parameters=true -f /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/fixture-testdata-dir2605615212/test/qe/testdata/olm/sa-admin.yaml -p NAME=argocd-83026 NAMESPACE=e2e-test-default-plvr2'
  I1117 16:18:11.163713 2999 template.go:128] generated resource configuration file: /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/e2e-test-default-plvr2-3466189cconfig.json.stdout
  I1117 16:18:11.164011 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig apply -f /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/e2e-test-default-plvr2-3466189cconfig.json.stdout'
  clusterrole.rbac.authorization.k8s.io/argocd-83026-installer-admin-clusterrole created
  serviceaccount/argocd-83026 created
  clusterrolebinding.rbac.authorization.k8s.io/argocd-83026-installer-admin-clusterrole-binding created
  I1117 16:18:18.017198 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get ServiceAccount argocd-83026 -n e2e-test-default-plvr2'
  I1117 16:18:19.133975 2999 tools.go:379] output: NAME           SECRETS   AGE
  argocd-83026   1         6s
  I1117 16:18:23.136157 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get ClusterRole argocd-83026-installer-admin-clusterrole'
  I1117 16:18:24.612219 2999 tools.go:379] output: NAME                                       CREATED AT
  argocd-83026-installer-admin-clusterrole   2025-11-17T08:18:12Z
  I1117 16:18:28.614485 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get ClusterRoleBinding argocd-83026-installer-admin-clusterrole-binding'
  I1117 16:18:29.683551 2999 tools.go:379] output: NAME                                               ROLE                                                   AGE
  argocd-83026-installer-admin-clusterrole-binding   ClusterRole/argocd-83026-installer-admin-clusterrole   15s
  I1117 16:18:29.683797 2999 clusterextension.go:43] =========Create clusterextension extension-argocd-83026=========
  I1117 16:18:29.683868 2999 clusterextension.go:64] =========CreateWithoutCheck clusterextension extension-argocd-83026=========
  I1117 16:18:32.685822 2999 client.go:753] showInfo is true
  I1117 16:18:32.686105 2999 client.go:755] Running 'oc --namespace=e2e-test-default-plvr2 --kubeconfig=/Users/jiazha/21-kubeconfig process -n default --ignore-unknown-parameters=true -f /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/fixture-testdata-dir2605615212/test/qe/testdata/olm/clusterextension.yaml -p NAME=extension-argocd-83026 PACKAGE=argocd-operator CHANNEL=alpha VERSION=v0.4.0 INSTALLNAMESPACE=e2e-test-default-plvr2 SANAME=argocd-83026'
  I1117 16:18:33.651267 2999 template.go:128] generated resource configuration file: /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/e2e-test-default-plvr2-d572c0d1config.json.stdout
  I1117 16:18:33.651493 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig apply -f /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/e2e-test-default-plvr2-d572c0d1config.json.stdout'
  clusterextension.olm.operatorframework.io/extension-argocd-83026 created
  I1117 16:18:34.898481 2999 clusterextension.go:169] ========= check clusterextension extension-argocd-83026 Progressing reason expect is Succeeded =========
  I1117 16:18:37.900376 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}'
  I1117 16:18:38.981556 2999 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}], the returned resource:Succeeded
  I1117 16:18:38.981723 2999 clusterextension.go:126] ========= wait clusterextension extension-argocd-83026 Installed status is True =========
  I1117 16:18:41.983122 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Installed")].status}'
  I1117 16:18:42.995218 2999 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Installed")].status}], the returned resource:True
  I1117 16:18:42.995365 2999 clusterextension.go:347] =========Get clusterextension extension-argocd-83026 BundleResource =========
  I1117 16:18:42.995634 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.install.bundle.name}'
  I1117 16:18:44.016408 2999 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.install.bundle.name}], the returned resource:argocd-operator.v0.4.0
    STEP: 2)upgrade it to v0.5.0 @ 11/17/25 16:18:44.016
  I1117 16:18:44.016770 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig patch clusterextension extension-argocd-83026 -p {"spec": {"source": {"catalog": {"version": "v0.5.0"}}}} --type=merge'
  clusterextension.olm.operatorframework.io/extension-argocd-83026 patched
  I1117 16:18:45.293415 2999 clusterextension.go:284] ========= wait clusterextension extension-argocd-83026 Progressing message includes Desired state reached =========
  I1117 16:18:51.295263 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].message}'
  I1117 16:18:52.257323 2999 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].message}], the returned resource:Desired state reached
    STEP: 3)upgrade it to v0.7.0 @ 11/17/25 16:18:52.257
  I1117 16:18:52.257823 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig patch clusterextension extension-argocd-83026 -p {"spec": {"source": {"catalog": {"version": "v0.7.0"}}}} --type=merge'
  clusterextension.olm.operatorframework.io/extension-argocd-83026 patched
  I1117 16:18:53.551219 2999 clusterextension.go:284] ========= wait clusterextension extension-argocd-83026 Progressing message includes Desired state reached =========
  I1117 16:18:59.553311 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].message}'
  I1117 16:19:00.611073 2999 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].message}], the returned resource:Desired state reached
  I1117 16:19:00.611245 2999 clusterextension.go:385] =========Delete clusterextension extension-argocd-83026=========
  I1117 16:19:00.611308 2999 clusterextension.go:376] =========DeleteWithoutCheck clusterextension extension-argocd-83026=========
  I1117 16:19:00.611543 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig delete clusterextension extension-argocd-83026'
  I1117 16:19:05.896421 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026'
  I1117 16:19:07.059936 2999 client.go:739] Error running /usr/local/bin/oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026:
  Error from server (NotFound): clusterextensions.olm.operatorframework.io "extension-argocd-83026" not found
  I1117 16:19:07.060241 2999 tools.go:410] the resource is delete successfully
  I1117 16:19:07.060292 2999 sa-clusterrolebinding.go:78] =========Delete sacrb argocd-83026=========
  I1117 16:19:07.060536 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig delete ClusterRoleBinding argocd-83026-installer-admin-clusterrole-binding'
  I1117 16:19:12.392926 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get ClusterRoleBinding argocd-83026-installer-admin-clusterrole-binding'
  I1117 16:19:13.511406 2999 client.go:739] Error running /usr/local/bin/oc --kubeconfig=/Users/jiazha/21-kubeconfig get ClusterRoleBinding argocd-83026-installer-admin-clusterrole-binding:
  Error from server (NotFound): clusterrolebindings.rbac.authorization.k8s.io "argocd-83026-installer-admin-clusterrole-binding" not found
  I1117 16:19:13.511542 2999 tools.go:410] the resource is delete successfully
  I1117 16:19:13.511820 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig delete ClusterRole argocd-83026-installer-admin-clusterrole'
  I1117 16:19:18.841698 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get ClusterRole argocd-83026-installer-admin-clusterrole'
  I1117 16:19:19.967155 2999 client.go:739] Error running /usr/local/bin/oc --kubeconfig=/Users/jiazha/21-kubeconfig get ClusterRole argocd-83026-installer-admin-clusterrole:
  Error from server (NotFound): clusterroles.rbac.authorization.k8s.io "argocd-83026-installer-admin-clusterrole" not found
  I1117 16:19:19.967375 2999 tools.go:410] the resource is delete successfully
  I1117 16:19:19.967881 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig delete ServiceAccount argocd-83026 -n e2e-test-default-plvr2'
  I1117 16:19:25.298439 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get ServiceAccount argocd-83026 -n e2e-test-default-plvr2'
  I1117 16:19:26.544832 2999 client.go:739] Error running /usr/local/bin/oc --kubeconfig=/Users/jiazha/21-kubeconfig get ServiceAccount argocd-83026 -n e2e-test-default-plvr2:
  Error from server (NotFound): serviceaccounts "argocd-83026" not found
  I1117 16:19:26.544932 2999 tools.go:410] the resource is delete successfully
  I1117 16:19:26.847404 2999 client.go:522] Deleted {user.openshift.io/v1, Resource=users  e2e-test-default-plvr2-user}, err: <nil>
  I1117 16:19:27.132926 2999 client.go:522] Deleted {oauth.openshift.io/v1, Resource=oauthclients  e2e-client-e2e-test-default-plvr2}, err: <nil>
  I1117 16:19:27.425236 2999 client.go:522] Deleted {oauth.openshift.io/v1, Resource=oauthaccesstokens  sha256~xx9b0TW231bAhrOfKWDZbVwW8Wvrjc58TXoBgKpNmUY}, err: <nil>
    STEP: Destroying namespace "e2e-test-default-plvr2" for this suite. @ 11/17/25 16:19:27.429
  • [96.550 seconds]
  ------------------------------

  Ran 1 of 1 Specs in 96.550 seconds
  SUCCESS! -- 1 Passed | 0 Failed | 0 Pending | 0 Skipped
[
  {
    "name": "[sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[OTP][Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource unknown change and refusing to determine that change is safe",
    "lifecycle": "blocking",
    "duration": 96551,
    "startTime": "2025-11-17 08:17:51.177472 UTC",
    "endTime": "2025-11-17 08:19:27.728812 UTC",
    "result": "passed",
...
...

@jianzhangbjz
Copy link
Member Author

/verified by @jianzhangbjz

@openshift-ci-robot openshift-ci-robot added the verified Signifies that the PR passed pre-merge verification criteria label Nov 17, 2025
@openshift-ci-robot
Copy link

@jianzhangbjz: This PR has been marked as verified by @jianzhangbjz.

Details

In response to this:

/verified by @jianzhangbjz

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@kuiwang02
Copy link
Contributor

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Nov 17, 2025
@openshift-ci-robot
Copy link

/retest-required

Remaining retests: 0 against base HEAD 009fb19 and 2 for PR HEAD 63baa57 in total

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 17, 2025

@jianzhangbjz: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/okd-scos-e2e-aws-ovn fefc570 link false /test okd-scos-e2e-aws-ovn

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@tmshort
Copy link
Contributor

tmshort commented Nov 17, 2025

/retest-required

@openshift-merge-bot openshift-merge-bot bot merged commit e4f8db5 into openshift:main Nov 17, 2025
12 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged. verified Signifies that the PR passed pre-merge verification criteria

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants