-
Notifications
You must be signed in to change notification settings - Fork 38
OCPQE-30672: migrate jiazha test cases to OTE #558
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
@jianzhangbjz: This pull request references OCPQE-30672 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the sub-task to target the "4.21.0" version, but no target version was set. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: jianzhangbjz The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
058490c to
9eb7151
Compare
|
|
||
| }) | ||
|
|
||
| g.It("PolarionID:83026-[OTP][Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource: unknown change, refusing to determine that change is safe", g.Label("original-name:[sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource: unknown change, refusing to determine that change is safe"), func() { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@jianzhangbjz FYI. Required For all QE cases: Do not use &|!,()/ in case title.
g.It("PolarionID:83026-[OTP][Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource: unknown change, refusing to determine that change is safe", g.Label("original-name:[sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource: unknown change, refusing to determine that change is safe")to
g.It("PolarionID:83026-[OTP][Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource: unknown change and refusing to determine that change is safe", g.Label("original-name:[sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource: unknown change and refusing to determine that change is safe")|
|
||
| }) | ||
|
|
||
| g.It("PolarionID:80458-[OTP][Level0][Skipped:Disconnected]clustercatalog get x509 error since it cannot get the custom CA automatically", g.Label("original-name:[sig-olmv1][Jira:OLM] clustercatalog PolarionID:80458-[Skipped:Disconnected]clustercatalog get x509 error since it cannot get the custom CA automatically"), g.Label("Serial"), func() { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@jianzhangbjz Slow, Serial, Disruptive: Preserved
so,
g.It("PolarionID:80458-[OTP][Level0][Skipped:Disconnected]clustercatalog get x509 error since it cannot get the custom CA automatically", g.Label("original-name:[sig-olmv1][Jira:OLM] clustercatalog PolarionID:80458-[Skipped:Disconnected]clustercatalog get x509 error since it cannot get the custom CA automatically"), g.Label("Serial"), func() {to
g.It("PolarionID:80458-[OTP][Level0][Skipped:Disconnected]clustercatalog get x509 error since it cannot get the custom CA automatically [Serial]", g.Label("original-name:[sig-olmv1][Jira:OLM] clustercatalog PolarionID:80458-[Skipped:Disconnected]clustercatalog get x509 error since it cannot get the custom CA automatically [Serial]"), func() {| package specs | ||
|
|
||
| import ( | ||
| "context" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@jianzhangbjz FYI https://github.com/openshift/operator-framework-operator-controller/blob/main/openshift/tests-extension/test/qe/README.md#before-submitting-pr
need to run make update-metadata to update json file.
| var _ = g.Describe("[sig-olmv1][Jira:OLM] cluster-olm-operator", g.Label("NonHyperShiftHOST"), func() { | ||
| defer g.GinkgoRecover() | ||
| var ( | ||
| oc = exutil.NewCLI("olmv1-cluster-olm-operator"+exutil.GetRandomString(), exutil.KubeConfigPath()) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@jianzhangbjz it seem be better as 'oc = exutil.NewCLIWithoutNamespace("default")'
|
/payload-aggregate periodic-ci-openshift-operator-framework-operator-controller-release-4.21-periodics-e2e-aws-ovn-techpreview-extended-f1 5 |
|
@kuiwang02: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command
See details on https://pr-payload-tests.ci.openshift.org/runs/ci/a5c63760-c12f-11f0-9b55-1a10b38dcec1-0 |
|
Hi @kuiwang02 , seems like the test passed, could you help approve it? Thanks! |
|
@jianzhangbjz: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command
See details on https://pr-payload-tests.ci.openshift.org/runs/ci/a48d8990-c34e-11f0-85ec-e02c83f76b12-0 |
|
the case 83026 is failing for some job run, for example I think it is caused by job duplicated. so, I will add lgtm. and then please monitor the case running late. /lgtm |
|
For case 83026, I believe the root cause is that the message content checks no longer ignore capital and small letters. I1117 15:45:30.519280 99994 clusterextension.go:293] message is Desired state reached, not include desired state reached, and try next
I1117 15:45:35.512875 99994 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].message}'Now, in this repo, https://github.com/openshift/operator-framework-operator-controller/blob/main/openshift/tests-extension/test/qe/util/olmv1util/clusterextension.go#L292 if !strings.Contains(output, expect) {
e2e.Logf("message is %v, not include %v, and try next", output, expect)
return false, nil
}In private repo: https://github.com/openshift/openshift-tests-private/blob/master/test/extended/operators/olmv1util/clusterextension.go#L221 if !strings.Contains(strings.ToLower(output), strings.ToLower(expect)) {
e2e.Logf("message is %v, not include %v, and try next", output, expect)
return false, nil
}Anyway, I have updated case 83026. Test passed. Could you help approve it? Thanks! jiazha-mac:tests-extension jiazha$ ./bin/olmv1-tests-ext run-test -n "[sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[OTP][Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource unknown change and refusing to determine that change is safe"
[INFO] [env] Using kubeconfig: /Users/jiazha/21-kubeconfig
[INFO] [env] Cluster environment initialized (OpenShift: true)
I1117 16:17:51.176668 2999 test_context.go:567] The --provider flag is not set. Continuing as if --provider=skeleton had been used.
Running Suite: - /Users/jiazha/goproject/operator-framework-operator-controller/openshift/tests-extension
==========================================================================================================
Random Seed: 1763367467 - will randomize all specs
Will run 1 of 1 specs
------------------------------
[sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[OTP][Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource unknown change and refusing to determine that change is safe [NonHyperShiftHOST, original-name:[sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource unknown change and refusing to determine that change is safe]
/Users/jiazha/goproject/operator-framework-operator-controller/openshift/tests-extension/test/qe/specs/olmv1_ce.go:1448
STEP: Creating a kubernetes client @ 11/17/25 16:17:51.178
I1117 16:17:56.186423 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig explain template.apiVersion'
STEP: 1)install Argocd operator v0.4.0 in a random namespace @ 11/17/25 16:17:58.349
I1117 16:17:58.349236 2999 client.go:349] do not know if it is external oidc cluster or not, and try to check it again
I1117 16:17:58.349299 2999 client.go:753] showInfo is true
I1117 16:17:58.349307 2999 client.go:755] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get authentication/cluster -o=jsonpath={.spec.type}'
I1117 16:17:59.683024 2999 clusters.go:568] Found authentication type used:
I1117 16:18:02.110863 2999 client.go:200] configPath is now "/var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/configfile4273393105"
I1117 16:18:02.110940 2999 client.go:363] The user is now "e2e-test-default-plvr2-user"
I1117 16:18:02.110955 2999 client.go:366] Creating project "e2e-test-default-plvr2"
I1117 16:18:02.501987 2999 client.go:375] Waiting on permissions in project "e2e-test-default-plvr2" ...
I1117 16:18:03.726973 2999 client.go:436] Waiting for ServiceAccount "default" to be provisioned...
I1117 16:18:04.111916 2999 client.go:436] Waiting for ServiceAccount "builder" to be provisioned...
I1117 16:18:04.585624 2999 client.go:436] Waiting for ServiceAccount "deployer" to be provisioned...
I1117 16:18:04.964527 2999 client.go:446] Waiting for RoleBinding "system:image-builders" to be provisioned...
I1117 16:18:05.526785 2999 client.go:446] Waiting for RoleBinding "system:deployers" to be provisioned...
I1117 16:18:06.635110 2999 client.go:446] Waiting for RoleBinding "system:image-pullers" to be provisioned...
I1117 16:18:07.193231 2999 client.go:477] Project "e2e-test-default-plvr2" has been fully provisioned.
I1117 16:18:07.193466 2999 sa-clusterrolebinding.go:34] =========Create sacrb argocd-83026=========
I1117 16:18:07.193505 2999 sa-clusterrolebinding.go:58] =========CreateWithoutCheck sacrb argocd-83026=========
I1117 16:18:10.195284 2999 client.go:753] showInfo is true
I1117 16:18:10.195432 2999 client.go:755] Running 'oc --namespace=e2e-test-default-plvr2 --kubeconfig=/Users/jiazha/21-kubeconfig process -n default --ignore-unknown-parameters=true -f /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/fixture-testdata-dir2605615212/test/qe/testdata/olm/sa-admin.yaml -p NAME=argocd-83026 NAMESPACE=e2e-test-default-plvr2'
I1117 16:18:11.163713 2999 template.go:128] generated resource configuration file: /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/e2e-test-default-plvr2-3466189cconfig.json.stdout
I1117 16:18:11.164011 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig apply -f /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/e2e-test-default-plvr2-3466189cconfig.json.stdout'
clusterrole.rbac.authorization.k8s.io/argocd-83026-installer-admin-clusterrole created
serviceaccount/argocd-83026 created
clusterrolebinding.rbac.authorization.k8s.io/argocd-83026-installer-admin-clusterrole-binding created
I1117 16:18:18.017198 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get ServiceAccount argocd-83026 -n e2e-test-default-plvr2'
I1117 16:18:19.133975 2999 tools.go:379] output: NAME SECRETS AGE
argocd-83026 1 6s
I1117 16:18:23.136157 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get ClusterRole argocd-83026-installer-admin-clusterrole'
I1117 16:18:24.612219 2999 tools.go:379] output: NAME CREATED AT
argocd-83026-installer-admin-clusterrole 2025-11-17T08:18:12Z
I1117 16:18:28.614485 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get ClusterRoleBinding argocd-83026-installer-admin-clusterrole-binding'
I1117 16:18:29.683551 2999 tools.go:379] output: NAME ROLE AGE
argocd-83026-installer-admin-clusterrole-binding ClusterRole/argocd-83026-installer-admin-clusterrole 15s
I1117 16:18:29.683797 2999 clusterextension.go:43] =========Create clusterextension extension-argocd-83026=========
I1117 16:18:29.683868 2999 clusterextension.go:64] =========CreateWithoutCheck clusterextension extension-argocd-83026=========
I1117 16:18:32.685822 2999 client.go:753] showInfo is true
I1117 16:18:32.686105 2999 client.go:755] Running 'oc --namespace=e2e-test-default-plvr2 --kubeconfig=/Users/jiazha/21-kubeconfig process -n default --ignore-unknown-parameters=true -f /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/fixture-testdata-dir2605615212/test/qe/testdata/olm/clusterextension.yaml -p NAME=extension-argocd-83026 PACKAGE=argocd-operator CHANNEL=alpha VERSION=v0.4.0 INSTALLNAMESPACE=e2e-test-default-plvr2 SANAME=argocd-83026'
I1117 16:18:33.651267 2999 template.go:128] generated resource configuration file: /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/e2e-test-default-plvr2-d572c0d1config.json.stdout
I1117 16:18:33.651493 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig apply -f /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/e2e-test-default-plvr2-d572c0d1config.json.stdout'
clusterextension.olm.operatorframework.io/extension-argocd-83026 created
I1117 16:18:34.898481 2999 clusterextension.go:169] ========= check clusterextension extension-argocd-83026 Progressing reason expect is Succeeded =========
I1117 16:18:37.900376 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}'
I1117 16:18:38.981556 2999 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}], the returned resource:Succeeded
I1117 16:18:38.981723 2999 clusterextension.go:126] ========= wait clusterextension extension-argocd-83026 Installed status is True =========
I1117 16:18:41.983122 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Installed")].status}'
I1117 16:18:42.995218 2999 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Installed")].status}], the returned resource:True
I1117 16:18:42.995365 2999 clusterextension.go:347] =========Get clusterextension extension-argocd-83026 BundleResource =========
I1117 16:18:42.995634 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.install.bundle.name}'
I1117 16:18:44.016408 2999 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.install.bundle.name}], the returned resource:argocd-operator.v0.4.0
STEP: 2)upgrade it to v0.5.0 @ 11/17/25 16:18:44.016
I1117 16:18:44.016770 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig patch clusterextension extension-argocd-83026 -p {"spec": {"source": {"catalog": {"version": "v0.5.0"}}}} --type=merge'
clusterextension.olm.operatorframework.io/extension-argocd-83026 patched
I1117 16:18:45.293415 2999 clusterextension.go:284] ========= wait clusterextension extension-argocd-83026 Progressing message includes Desired state reached =========
I1117 16:18:51.295263 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].message}'
I1117 16:18:52.257323 2999 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].message}], the returned resource:Desired state reached
STEP: 3)upgrade it to v0.7.0 @ 11/17/25 16:18:52.257
I1117 16:18:52.257823 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig patch clusterextension extension-argocd-83026 -p {"spec": {"source": {"catalog": {"version": "v0.7.0"}}}} --type=merge'
clusterextension.olm.operatorframework.io/extension-argocd-83026 patched
I1117 16:18:53.551219 2999 clusterextension.go:284] ========= wait clusterextension extension-argocd-83026 Progressing message includes Desired state reached =========
I1117 16:18:59.553311 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].message}'
I1117 16:19:00.611073 2999 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].message}], the returned resource:Desired state reached
I1117 16:19:00.611245 2999 clusterextension.go:385] =========Delete clusterextension extension-argocd-83026=========
I1117 16:19:00.611308 2999 clusterextension.go:376] =========DeleteWithoutCheck clusterextension extension-argocd-83026=========
I1117 16:19:00.611543 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig delete clusterextension extension-argocd-83026'
I1117 16:19:05.896421 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026'
I1117 16:19:07.059936 2999 client.go:739] Error running /usr/local/bin/oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026:
Error from server (NotFound): clusterextensions.olm.operatorframework.io "extension-argocd-83026" not found
I1117 16:19:07.060241 2999 tools.go:410] the resource is delete successfully
I1117 16:19:07.060292 2999 sa-clusterrolebinding.go:78] =========Delete sacrb argocd-83026=========
I1117 16:19:07.060536 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig delete ClusterRoleBinding argocd-83026-installer-admin-clusterrole-binding'
I1117 16:19:12.392926 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get ClusterRoleBinding argocd-83026-installer-admin-clusterrole-binding'
I1117 16:19:13.511406 2999 client.go:739] Error running /usr/local/bin/oc --kubeconfig=/Users/jiazha/21-kubeconfig get ClusterRoleBinding argocd-83026-installer-admin-clusterrole-binding:
Error from server (NotFound): clusterrolebindings.rbac.authorization.k8s.io "argocd-83026-installer-admin-clusterrole-binding" not found
I1117 16:19:13.511542 2999 tools.go:410] the resource is delete successfully
I1117 16:19:13.511820 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig delete ClusterRole argocd-83026-installer-admin-clusterrole'
I1117 16:19:18.841698 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get ClusterRole argocd-83026-installer-admin-clusterrole'
I1117 16:19:19.967155 2999 client.go:739] Error running /usr/local/bin/oc --kubeconfig=/Users/jiazha/21-kubeconfig get ClusterRole argocd-83026-installer-admin-clusterrole:
Error from server (NotFound): clusterroles.rbac.authorization.k8s.io "argocd-83026-installer-admin-clusterrole" not found
I1117 16:19:19.967375 2999 tools.go:410] the resource is delete successfully
I1117 16:19:19.967881 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig delete ServiceAccount argocd-83026 -n e2e-test-default-plvr2'
I1117 16:19:25.298439 2999 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get ServiceAccount argocd-83026 -n e2e-test-default-plvr2'
I1117 16:19:26.544832 2999 client.go:739] Error running /usr/local/bin/oc --kubeconfig=/Users/jiazha/21-kubeconfig get ServiceAccount argocd-83026 -n e2e-test-default-plvr2:
Error from server (NotFound): serviceaccounts "argocd-83026" not found
I1117 16:19:26.544932 2999 tools.go:410] the resource is delete successfully
I1117 16:19:26.847404 2999 client.go:522] Deleted {user.openshift.io/v1, Resource=users e2e-test-default-plvr2-user}, err: <nil>
I1117 16:19:27.132926 2999 client.go:522] Deleted {oauth.openshift.io/v1, Resource=oauthclients e2e-client-e2e-test-default-plvr2}, err: <nil>
I1117 16:19:27.425236 2999 client.go:522] Deleted {oauth.openshift.io/v1, Resource=oauthaccesstokens sha256~xx9b0TW231bAhrOfKWDZbVwW8Wvrjc58TXoBgKpNmUY}, err: <nil>
STEP: Destroying namespace "e2e-test-default-plvr2" for this suite. @ 11/17/25 16:19:27.429
• [96.550 seconds]
------------------------------
Ran 1 of 1 Specs in 96.550 seconds
SUCCESS! -- 1 Passed | 0 Failed | 0 Pending | 0 Skipped
[
{
"name": "[sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[OTP][Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource unknown change and refusing to determine that change is safe",
"lifecycle": "blocking",
"duration": 96551,
"startTime": "2025-11-17 08:17:51.177472 UTC",
"endTime": "2025-11-17 08:19:27.728812 UTC",
"result": "passed",
...
... |
|
/verified by @jianzhangbjz |
|
@jianzhangbjz: This PR has been marked as verified by DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
/lgtm |
|
@jianzhangbjz: The following test failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
|
/retest-required |
As the title shows.
Assisted-by: Claude Code