OCPQE-31637: fix 83026 for TP cluster#652
OCPQE-31637: fix 83026 for TP cluster#652jianzhangbjz wants to merge 1 commit intoopenshift:mainfrom
Conversation
|
@jianzhangbjz: This pull request references OCPQE-31637 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the sub-task to target the "4.22.0" version, but no target version was set. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: jianzhangbjz The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
Test passed. jiazha-mac:tests-extension jiazha$ ./bin/olmv1-tests-ext run-test "[sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[OTP][Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource unknown change and refusing to determine that change is safe"
[INFO] [env] Using kubeconfig: /Users/jiazha/tp-kubeconfig
[INFO] [env] Cluster environment initialized (OpenShift: true)
I0228 16:54:16.322378 96828 test_context.go:567] The --provider flag is not set. Continuing as if --provider=skeleton had been used.
Running Suite: - /Users/jiazha/goproject/operator-framework-operator-controller/openshift/tests-extension
==========================================================================================================
Random Seed: 1772268852 - will randomize all specs
Will run 1 of 1 specs
------------------------------
[sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[OTP][Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource unknown change and refusing to determine that change is safe [NonHyperShiftHOST, original-name:[sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource unknown change and refusing to determine that change is safe]
/Users/jiazha/goproject/operator-framework-operator-controller/openshift/tests-extension/test/qe/specs/olmv1_ce.go:1740
STEP: Creating a kubernetes client @ 02/28/26 16:54:16.323
I0228 16:54:21.328639 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig explain template.apiVersion'
STEP: 1)install Argocd operator v0.4.0 in a random namespace @ 02/28/26 16:54:24.018
I0228 16:54:24.018526 96828 client.go:349] do not know if it is external oidc cluster or not, and try to check it again
I0228 16:54:24.018653 96828 client.go:753] showInfo is true
I0228 16:54:24.018671 96828 client.go:755] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get authentication/cluster -o=jsonpath={.spec.type}'
I0228 16:54:25.437794 96828 clusters.go:568] Found authentication type used:
I0228 16:54:27.834547 96828 client.go:200] configPath is now "/var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/configfile2162391051"
I0228 16:54:27.834583 96828 client.go:363] The user is now "e2e-test-default-69dls-user"
I0228 16:54:27.834595 96828 client.go:366] Creating project "e2e-test-default-69dls"
I0228 16:54:28.296294 96828 client.go:375] Waiting on permissions in project "e2e-test-default-69dls" ...
I0228 16:54:30.048727 96828 client.go:436] Waiting for ServiceAccount "default" to be provisioned...
I0228 16:54:30.422576 96828 client.go:436] Waiting for ServiceAccount "builder" to be provisioned...
I0228 16:54:30.808251 96828 client.go:436] Waiting for ServiceAccount "deployer" to be provisioned...
I0228 16:54:31.180147 96828 client.go:446] Waiting for RoleBinding "system:image-builders" to be provisioned...
I0228 16:54:31.746884 96828 client.go:446] Waiting for RoleBinding "system:deployers" to be provisioned...
I0228 16:54:32.801023 96828 client.go:446] Waiting for RoleBinding "system:image-pullers" to be provisioned...
I0228 16:54:33.417428 96828 client.go:477] Project "e2e-test-default-69dls" has been fully provisioned.
I0228 16:54:33.417641 96828 sa-clusterrolebinding.go:34] =========Create sacrb argocd-83026=========
I0228 16:54:33.417669 96828 sa-clusterrolebinding.go:58] =========CreateWithoutCheck sacrb argocd-83026=========
I0228 16:54:36.418689 96828 client.go:753] showInfo is true
I0228 16:54:36.418872 96828 client.go:755] Running 'oc --namespace=e2e-test-default-69dls --kubeconfig=/Users/jiazha/tp-kubeconfig process -n default --ignore-unknown-parameters=true -f /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/fixture-testdata-dir1494240925/test/qe/testdata/olm/sa-admin.yaml -p NAME=argocd-83026 NAMESPACE=e2e-test-default-69dls'
I0228 16:54:37.440037 96828 template.go:128] generated resource configuration file: /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/e2e-test-default-69dls-163c9d26config.json.stdout
I0228 16:54:37.440364 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig apply -f /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/e2e-test-default-69dls-163c9d26config.json.stdout'
clusterrole.rbac.authorization.k8s.io/argocd-83026-installer-admin-clusterrole created
serviceaccount/argocd-83026 created
clusterrolebinding.rbac.authorization.k8s.io/argocd-83026-installer-admin-clusterrole-binding created
I0228 16:54:44.183076 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get ServiceAccount argocd-83026 -n e2e-test-default-69dls'
I0228 16:54:46.911120 96828 tools.go:379] output: NAME SECRETS AGE
argocd-83026 1 7s
I0228 16:54:50.912471 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get ClusterRole argocd-83026-installer-admin-clusterrole'
I0228 16:54:51.936142 96828 tools.go:379] output: NAME CREATED AT
argocd-83026-installer-admin-clusterrole 2026-02-28T08:54:38Z
I0228 16:54:55.937516 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get ClusterRoleBinding argocd-83026-installer-admin-clusterrole-binding'
I0228 16:54:56.974166 96828 tools.go:379] output: NAME ROLE AGE
argocd-83026-installer-admin-clusterrole-binding ClusterRole/argocd-83026-installer-admin-clusterrole 16s
I0228 16:54:56.974432 96828 clusterextension.go:43] =========Create clusterextension extension-argocd-83026=========
I0228 16:54:56.974488 96828 clusterextension.go:64] =========CreateWithoutCheck clusterextension extension-argocd-83026=========
I0228 16:54:59.975952 96828 client.go:753] showInfo is true
I0228 16:54:59.976082 96828 client.go:755] Running 'oc --namespace=e2e-test-default-69dls --kubeconfig=/Users/jiazha/tp-kubeconfig process -n default --ignore-unknown-parameters=true -f /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/fixture-testdata-dir1494240925/test/qe/testdata/olm/clusterextension-withselectorlabel.yaml -p NAME=extension-argocd-83026 PACKAGE=argocd-operator CHANNEL=alpha VERSION=v0.4.0 INSTALLNAMESPACE=e2e-test-default-69dls SANAME=argocd-83026 LABELKEY=olm.operatorframework.io/metadata.name LABELVALUE=openshift-community-operators'
I0228 16:55:00.967548 96828 template.go:128] generated resource configuration file: /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/e2e-test-default-69dls-fd0c536fconfig.json.stdout
I0228 16:55:00.967658 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig apply -f /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/e2e-test-default-69dls-fd0c536fconfig.json.stdout'
clusterextension.olm.operatorframework.io/extension-argocd-83026 created
I0228 16:55:02.613944 96828 clusterextension.go:169] ========= check clusterextension extension-argocd-83026 Progressing reason expect is Succeeded =========
I0228 16:55:05.616065 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}'
I0228 16:55:06.601538 96828 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}], the returned resource:Retrying
I0228 16:55:06.601640 96828 clusterextension.go:178] got is Retrying, not Succeeded, and try next
I0228 16:55:08.616671 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}'
I0228 16:55:10.334526 96828 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}], the returned resource:Retrying
I0228 16:55:10.334690 96828 clusterextension.go:178] got is Retrying, not Succeeded, and try next
I0228 16:55:11.615734 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}'
I0228 16:55:12.618069 96828 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}], the returned resource:Retrying
I0228 16:55:12.618239 96828 clusterextension.go:178] got is Retrying, not Succeeded, and try next
I0228 16:55:14.616695 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}'
I0228 16:55:15.715128 96828 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}], the returned resource:Retrying
I0228 16:55:15.715260 96828 clusterextension.go:178] got is Retrying, not Succeeded, and try next
I0228 16:55:17.616336 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}'
I0228 16:55:18.574601 96828 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}], the returned resource:Retrying
I0228 16:55:18.574739 96828 clusterextension.go:178] got is Retrying, not Succeeded, and try next
I0228 16:55:20.617368 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}'
I0228 16:55:22.528402 96828 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}], the returned resource:Retrying
I0228 16:55:22.528561 96828 clusterextension.go:178] got is Retrying, not Succeeded, and try next
I0228 16:55:23.615997 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}'
I0228 16:55:25.674670 96828 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}], the returned resource:Retrying
I0228 16:55:25.674824 96828 clusterextension.go:178] got is Retrying, not Succeeded, and try next
I0228 16:55:26.616241 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}'
I0228 16:55:27.689627 96828 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}], the returned resource:Succeeded
I0228 16:55:27.689861 96828 clusterextension.go:126] ========= wait clusterextension extension-argocd-83026 Installed status is True =========
I0228 16:55:30.691338 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Installed")].status}'
I0228 16:55:31.691349 96828 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Installed")].status}], the returned resource:True
I0228 16:55:31.691531 96828 clusterextension.go:347] =========Get clusterextension extension-argocd-83026 BundleResource =========
I0228 16:55:31.691819 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.install.bundle.name}'
I0228 16:55:32.715680 96828 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.install.bundle.name}], the returned resource:argocd-operator.v0.4.0
STEP: 2)upgrade it to v0.5.0 @ 02/28/26 16:55:32.715
I0228 16:55:32.716260 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig patch clusterextension extension-argocd-83026 -p {"spec": {"source": {"catalog": {"version": "v0.5.0"}}}} --type=merge'
clusterextension.olm.operatorframework.io/extension-argocd-83026 patched
I0228 16:55:35.067421 96828 clusterextension.go:169] ========= check clusterextension extension-argocd-83026 Progressing reason expect is Succeeded =========
I0228 16:55:38.068925 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}'
I0228 16:55:40.085770 96828 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}], the returned resource:RollingOut
I0228 16:55:40.085841 96828 clusterextension.go:178] got is RollingOut, not Succeeded, and try next
I0228 16:55:41.068970 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}'
I0228 16:55:42.039137 96828 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}], the returned resource:RollingOut
I0228 16:55:42.039200 96828 clusterextension.go:178] got is RollingOut, not Succeeded, and try next
I0228 16:55:44.068949 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}'
I0228 16:55:45.187824 96828 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}], the returned resource:RollingOut
I0228 16:55:45.187927 96828 clusterextension.go:178] got is RollingOut, not Succeeded, and try next
I0228 16:55:47.068623 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}'
I0228 16:55:47.997145 96828 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}], the returned resource:RollingOut
I0228 16:55:47.997200 96828 clusterextension.go:178] got is RollingOut, not Succeeded, and try next
I0228 16:55:50.068872 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}'
I0228 16:55:51.555704 96828 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}], the returned resource:RollingOut
I0228 16:55:51.555847 96828 clusterextension.go:178] got is RollingOut, not Succeeded, and try next
I0228 16:55:53.069566 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}'
I0228 16:55:54.450127 96828 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}], the returned resource:Succeeded
STEP: 3)upgrade it to v0.7.0 @ 02/28/26 16:55:54.45
I0228 16:55:54.450553 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig patch clusterextension extension-argocd-83026 -p {"spec": {"source": {"catalog": {"version": "v0.7.0"}}}} --type=merge'
clusterextension.olm.operatorframework.io/extension-argocd-83026 patched
I0228 16:55:55.722234 96828 clusterextension.go:169] ========= check clusterextension extension-argocd-83026 Progressing reason expect is Succeeded =========
I0228 16:55:58.724878 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}'
I0228 16:56:02.025263 96828 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}], the returned resource:Succeeded
I0228 16:56:02.025347 96828 clusterextension.go:385] =========Delete clusterextension extension-argocd-83026=========
I0228 16:56:02.025374 96828 clusterextension.go:376] =========DeleteWithoutCheck clusterextension extension-argocd-83026=========
I0228 16:56:02.025462 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig delete clusterextension extension-argocd-83026'
I0228 16:56:08.322772 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get clusterextension extension-argocd-83026'
I0228 16:56:09.341064 96828 client.go:739] Error running /usr/local/bin/oc --kubeconfig=/Users/jiazha/tp-kubeconfig get clusterextension extension-argocd-83026:
Error from server (NotFound): clusterextensions.olm.operatorframework.io "extension-argocd-83026" not found
I0228 16:56:09.341191 96828 tools.go:410] the resource is delete successfully
I0228 16:56:09.341224 96828 sa-clusterrolebinding.go:78] =========Delete sacrb argocd-83026=========
I0228 16:56:09.341412 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig delete ClusterRoleBinding argocd-83026-installer-admin-clusterrole-binding'
I0228 16:56:14.600306 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get ClusterRoleBinding argocd-83026-installer-admin-clusterrole-binding'
I0228 16:56:15.933981 96828 client.go:739] Error running /usr/local/bin/oc --kubeconfig=/Users/jiazha/tp-kubeconfig get ClusterRoleBinding argocd-83026-installer-admin-clusterrole-binding:
Error from server (NotFound): clusterrolebindings.rbac.authorization.k8s.io "argocd-83026-installer-admin-clusterrole-binding" not found
I0228 16:56:15.934225 96828 tools.go:410] the resource is delete successfully
I0228 16:56:15.934560 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig delete ClusterRole argocd-83026-installer-admin-clusterrole'
I0228 16:56:21.265958 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get ClusterRole argocd-83026-installer-admin-clusterrole'
I0228 16:56:23.915220 96828 client.go:739] Error running /usr/local/bin/oc --kubeconfig=/Users/jiazha/tp-kubeconfig get ClusterRole argocd-83026-installer-admin-clusterrole:
Error from server (NotFound): clusterroles.rbac.authorization.k8s.io "argocd-83026-installer-admin-clusterrole" not found
I0228 16:56:23.915452 96828 tools.go:410] the resource is delete successfully
I0228 16:56:23.915723 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig delete ServiceAccount argocd-83026 -n e2e-test-default-69dls'
I0228 16:56:29.242832 96828 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/tp-kubeconfig get ServiceAccount argocd-83026 -n e2e-test-default-69dls'
I0228 16:56:30.568516 96828 client.go:739] Error running /usr/local/bin/oc --kubeconfig=/Users/jiazha/tp-kubeconfig get ServiceAccount argocd-83026 -n e2e-test-default-69dls:
Error from server (NotFound): serviceaccounts "argocd-83026" not found
I0228 16:56:30.568615 96828 tools.go:410] the resource is delete successfully
I0228 16:56:31.476105 96828 client.go:522] Deleted {user.openshift.io/v1, Resource=users e2e-test-default-69dls-user}, err: <nil>
I0228 16:56:31.755002 96828 client.go:522] Deleted {oauth.openshift.io/v1, Resource=oauthclients e2e-client-e2e-test-default-69dls}, err: <nil>
I0228 16:56:32.100365 96828 client.go:522] Deleted {oauth.openshift.io/v1, Resource=oauthaccesstokens sha256~8j-Vj0SokNBNpts1JnbFVs_L_BZrDW5w8oFV6gc3AnE}, err: <nil>
STEP: Destroying namespace "e2e-test-default-69dls" for this suite. @ 02/28/26 16:56:32.1
• [136.065 seconds]
------------------------------
Ran 1 of 1 Specs in 136.066 seconds
SUCCESS! -- 1 Passed | 0 Failed | 0 Pending | 0 Skipped
jiazha-mac:tests-extension jiazha$ oc get clusterversion
NAME VERSION AVAILABLE PROGRESSING SINCE STATUS
version 4.22.0-0-2026-02-28-013207-test-ci-ln-68tnrk2-latest True False 6h26m Cluster version is 4.22.0-0-2026-02-28-013207-test-ci-ln-68tnrk2-latest
jiazha-mac:tests-extension jiazha$ oc get featuregate cluster -o yaml
apiVersion: config.openshift.io/v1
kind: FeatureGate
metadata:
annotations:
include.release.openshift.io/self-managed-high-availability: "true"
creationTimestamp: "2026-02-28T02:04:00Z"
generation: 1
name: cluster
resourceVersion: "643"
uid: 194aec9d-28c7-4667-b07f-127ba1b7a2ec
spec:
featureSet: TechPreviewNoUpgrade
status:
featureGates:
- disabled:
- name: ClientsAllowCBOR
- name: ClusterAPIComputeInstall
- name: ClusterAPIControlPlaneInstall
- name: ClusterAPIInstall
- name: ClusterAPIMachineManagementVSphere
- name: EventedPLEG
- name: Example2
- name: ExternalSnapshotMetadata
- name: HyperShiftOnlyDynamicResourceAllocation
- name: KMSEncryptionProvider
- name: MachineAPIOperatorDisableMachineHealthCheckController
- name: MultiArchInstallAzure
- name: NetworkConnect
- name: ProvisioningRequestAvailable
- name: ShortCertRotation
enabled:
- name: AWSClusterHostedDNS
- name: AWSClusterHostedDNSInstall
- name: AWSDedicatedHosts
- name: AWSDualStackInstall
- name: AWSServiceLBNetworkSecurityGroup
- name: AutomatedEtcdBackup
- name: AzureClusterHostedDNSInstall
- name: AzureDedicatedHosts
- name: AzureDualStackInstall
- name: AzureMultiDisk
- name: AzureWorkloadIdentity
- name: BootImageSkewEnforcement
- name: BootcNodeManagement
- name: BuildCSIVolumes
- name: CBORServingAndStorage
- name: CRDCompatibilityRequirementOperator
- name: CRIOCredentialProviderConfig
- name: ClientsPreferCBOR
- name: ClusterAPIInstallIBMCloud
- name: ClusterAPIMachineManagement
- name: ClusterMonitoringConfig
- name: ClusterUpdateAcceptRisks
- name: ClusterVersionOperatorConfiguration
- name: ConfigurablePKI
- name: ConsolePluginContentSecurityPolicy
- name: DNSNameResolver
- name: DRAPartitionableDevices
- name: DualReplica
- name: DyanmicServiceEndpointIBMCloud
- name: EVPN
- name: EtcdBackendQuota
- name: EventTTL
- name: Example
- name: ExternalOIDC
- name: ExternalOIDCWithUIDAndExtraClaimMappings
- name: ExternalOIDCWithUpstreamParity
- name: GCPClusterHostedDNS
- name: GCPClusterHostedDNSInstall
- name: GCPCustomAPIEndpoints
- name: GCPCustomAPIEndpointsInstall
- name: GCPDualStackInstall
- name: GatewayAPI
- name: GatewayAPIController
- name: GatewayAPIWithoutOLM
- name: HighlyAvailableArbiter
- name: ImageModeStatusReporting
- name: ImageStreamImportMode
- name: ImageVolume
- name: IngressControllerDynamicConfigurationManager
- name: InsightsConfig
- name: InsightsOnDemandDataGather
- name: IrreconcilableMachineConfig
- name: KMSEncryption
- name: KMSv1
- name: MachineAPIMigration
- name: MachineConfigNodes
- name: ManagedBootImages
- name: ManagedBootImagesAWS
- name: ManagedBootImagesAzure
- name: ManagedBootImagesCPMS
- name: ManagedBootImagesvSphere
- name: MaxUnavailableStatefulSet
- name: MetricsCollectionProfiles
- name: MinimumKubeletVersion
- name: MixedCPUsAllocation
- name: MultiDiskSetup
- name: MutableCSINodeAllocatableCount
- name: MutatingAdmissionPolicy
- name: NewOLM
- name: NewOLMBoxCutterRuntime
- name: NewOLMCatalogdAPIV1Metas
- name: NewOLMOwnSingleNamespace
- name: NewOLMPreflightPermissionChecks
- name: NewOLMWebhookProviderOpenshiftServiceCA
- name: NoRegistryClusterInstall
- name: NutanixMultiSubnets
- name: OSStreams
- name: OVNObservability
- name: OnPremDNSRecords
- name: OpenShiftPodSecurityAdmission
- name: PinnedImages
- name: RouteExternalCertificate
- name: SELinuxMount
- name: ServiceAccountTokenNodeBinding
- name: SignatureStores
- name: SigstoreImageVerification
- name: SigstoreImageVerificationPKI
- name: StoragePerformantSecurityPolicy
- name: UpgradeStatus
- name: UserNamespacesPodSecurityStandards
- name: UserNamespacesSupport
- name: VSphereConfigurableMaxAllowedBlockVolumesPerNode
- name: VSphereHostVMGroupZonal
- name: VSphereMixedNodeEnv
- name: VSphereMultiDisk
- name: VSphereMultiNetworks
- name: VolumeGroupSnapshot
version: 4.22.0-0-2026-02-28-013207-test-ci-ln-68tnrk2-latest |
|
Hi @Xia-Zhao-rh , could you help approve it? Thanks! |
|
@jianzhangbjz: This PR has been marked as verified by DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
70af302 to
5a6c360
Compare
|
@jianzhangbjz: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
To address:
Summary of the fix: