Skip to content

Conversation

dinhxuanvu
Copy link
Member

In HyperShift env, cluster-authentication-operator doesn't run in management cluster. Instead, control-plane operator will handle authenication operations.

In HyperShift env, cluster-authentication-operator doesn't run in
management cluster. Instead, control-plane operator will handle
authenication operations.

Signed-off-by: Vu Dinh <[email protected]>
@dinhxuanvu dinhxuanvu changed the title Check for control-plane operator in hypershift for oauth test [WIP] Check for control-plane operator in hypershift for oauth test Sep 2, 2025
@openshift-ci openshift-ci bot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Sep 2, 2025
@dinhxuanvu
Copy link
Member Author

/payload-job periodic-ci-openshift-hypershift-release-4.20-periodics-e2e-aws-ovn-conformance-serial

Copy link
Contributor

openshift-ci bot commented Sep 2, 2025

@dinhxuanvu: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-hypershift-release-4.20-periodics-e2e-aws-ovn-conformance-serial

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/74f7ed50-8803-11f0-8764-482860b01723-0

@openshift-ci openshift-ci bot requested review from everettraven and liouk September 2, 2025 13:51
Copy link
Contributor

openshift-ci bot commented Sep 2, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: dinhxuanvu
Once this PR has been reviewed and has the lgtm label, please assign everettraven for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

}
}
}
o.Expect(isCPODeployment).To(o.Equal(true), "control-plane-operator deployment exists")
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is checking existence of the CPO sufficient here?

It looks like on standalone we are intentionally looking for a signal that the cluster-authentication-operator is no longer progressing (presumably meaning the OAuth server is up and ready to accept requests). Is there an equivalent status condition or something we could use to identify that everything auth related is up and ready for connections?

Copy link
Member Author

@dinhxuanvu dinhxuanvu Sep 2, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm simply testing out the CPO check to see if it works. From the initial look, this test may not even be compatible with HyperShift and may need to be skipped in HCP case. There is already a check in the code to skip on ExternalTopologyMode which is the case for HCP given CAO component doesn't run on management cluster. The topology check is placed after CAO availability check and that's why the test fails. That check should have been placed before CAO check.

Copy link
Contributor

openshift-ci bot commented Sep 2, 2025

@dinhxuanvu: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-aws-ovn-edge-zones ef4a4dd link false /test e2e-aws-ovn-edge-zones
ci/prow/e2e-metal-ipi-ovn-dualstack-local-gateway ef4a4dd link false /test e2e-metal-ipi-ovn-dualstack-local-gateway
ci/prow/e2e-azure ef4a4dd link false /test e2e-azure
ci/prow/e2e-gcp-ovn-techpreview-serial-2of2 ef4a4dd link false /test e2e-gcp-ovn-techpreview-serial-2of2
ci/prow/e2e-aws-disruptive ef4a4dd link false /test e2e-aws-disruptive
ci/prow/e2e-metal-ipi-ovn-ipv6 ef4a4dd link true /test e2e-metal-ipi-ovn-ipv6
ci/prow/e2e-aws-ovn-single-node ef4a4dd link false /test e2e-aws-ovn-single-node
ci/prow/e2e-metal-ipi-ovn ef4a4dd link false /test e2e-metal-ipi-ovn
ci/prow/e2e-aws-ovn-single-node-upgrade ef4a4dd link false /test e2e-aws-ovn-single-node-upgrade
ci/prow/e2e-metal-ipi-ovn-dualstack ef4a4dd link false /test e2e-metal-ipi-ovn-dualstack
ci/prow/e2e-metal-ipi-virtualmedia ef4a4dd link false /test e2e-metal-ipi-virtualmedia
ci/prow/e2e-metal-ipi-ovn-kube-apiserver-rollout ef4a4dd link false /test e2e-metal-ipi-ovn-kube-apiserver-rollout
ci/prow/e2e-openstack-ovn ef4a4dd link false /test e2e-openstack-ovn

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants