Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -282,6 +282,54 @@
"exclude": "topology==\"External\""
}
},
{
"name": "[sig-operator][Jira:OLM] OLMv0 should PolarionID:24916-[OTP][Skipped:Disconnected]Operators in AllNamespaces should be granted namespace list",
"labels": {
"Extended": {}
},
"resources": {
"isolation": {}
},
"source": "openshift:payload:olmv0",
"lifecycle": "blocking",
"environmentSelector": {}
},
{
"name": "[sig-operator][Jira:OLM] OLMv0 should PolarionID:24771-[OTP]OLM should support for user defined ServiceAccount for OperatorGroup",
"labels": {
"Extended": {}
},
"resources": {
"isolation": {}
},
"source": "openshift:payload:olmv0",
"lifecycle": "blocking",
"environmentSelector": {}
},
{
"name": "[sig-operator][Jira:OLM] OLMv0 should PolarionID:24772-[OTP]OLM should support for user defined ServiceAccount for OperatorGroup with fine grained permission",
"labels": {
"Extended": {}
},
"resources": {
"isolation": {}
},
"source": "openshift:payload:olmv0",
"lifecycle": "blocking",
"environmentSelector": {}
},
{
"name": "[sig-operator][Jira:OLM] OLMv0 should PolarionID:24886-[OTP]OLM should support for user defined ServiceAccount permission changes",
"labels": {
"Extended": {}
},
"resources": {
"isolation": {}
},
"source": "openshift:payload:olmv0",
"lifecycle": "blocking",
"environmentSelector": {}
},
{
"name": "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:68679-[OTP][Skipped:Disconnected]catalogsource with invalid name is created",
"originalName": "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:68679-[Skipped:Disconnected]catalogsource with invalid name is created",
Expand Down Expand Up @@ -350,6 +398,150 @@
"exclude": "topology==\"External\""
}
},
{
"name": "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:31693-[OTP][Skipped:Disconnected]Check CSV information on the PackageManifest",
"labels": {
"Extended": {}
},
"resources": {
"isolation": {}
},
"source": "openshift:payload:olmv0",
"lifecycle": "blocking",
"environmentSelector": {}
},
{
"name": "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:54038-[OTP][Skipped:Disconnected]Comply with Operator Anti-Affinity definition",
"labels": {
"Extended": {}
},
"resources": {
"isolation": {}
},
"source": "openshift:payload:olmv0",
"lifecycle": "blocking",
"environmentSelector": {}
},
{
"name": "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:54036-[OTP][Skipped:Disconnected]Comply with Operator NodeAffinity definition",
"labels": {
"Extended": {}
},
"resources": {
"isolation": {}
},
"source": "openshift:payload:olmv0",
"lifecycle": "blocking",
"environmentSelector": {}
},
{
"name": "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:24850-[OTP]Allow users to edit the deployment of an active CSV",
"labels": {
"Extended": {}
},
"resources": {
"isolation": {}
},
"source": "openshift:payload:olmv0",
"lifecycle": "blocking",
"environmentSelector": {}
},
{
"name": "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:24387-[OTP][Skipped:Disconnected]Any CRD upgrade is allowed if there is only one owner in a cluster [Serial][Disruptive]",
"labels": {
"Extended": {}
},
"resources": {
"isolation": {}
},
"source": "openshift:payload:olmv0",
"lifecycle": "blocking",
"environmentSelector": {}
},
{
"name": "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:42970-[OTP]OperatorGroup status indicates cardinality conflicts - SingleNamespace",
"labels": {
"Extended": {}
},
"resources": {
"isolation": {}
},
"source": "openshift:payload:olmv0",
"lifecycle": "blocking",
"environmentSelector": {}
},
{
"name": "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:42972-[OTP]OperatorGroup status should indicate if the SA named in spec not found",
"labels": {
"Extended": {}
},
"resources": {
"isolation": {}
},
"source": "openshift:payload:olmv0",
"lifecycle": "blocking",
"environmentSelector": {}
},
{
"name": "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:21130-[OTP]Fetching non-existent `PackageManifest` should return 404",
"labels": {
"Extended": {}
},
"resources": {
"isolation": {}
},
"source": "openshift:payload:olmv0",
"lifecycle": "blocking",
"environmentSelector": {}
},
{
"name": "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:24057-[OTP]Have terminationMessagePolicy defined as FallbackToLogsOnError",
"labels": {
"Extended": {}
},
"resources": {
"isolation": {}
},
"source": "openshift:payload:olmv0",
"lifecycle": "blocking",
"environmentSelector": {}
},
{
"name": "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:49130-[OTP][Skipped:Disconnected]Default CatalogSources deployed by marketplace do not have toleration for tainted nodes",
"labels": {
"Extended": {}
},
"resources": {
"isolation": {}
},
"source": "openshift:payload:olmv0",
"lifecycle": "blocking",
"environmentSelector": {}
},
{
"name": "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:32613-[OTP][Skipped:Disconnected]Operators won't install if the CSV dependency is already installed",
"labels": {
"Extended": {}
},
"resources": {
"isolation": {}
},
"source": "openshift:payload:olmv0",
"lifecycle": "blocking",
"environmentSelector": {}
},
{
"name": "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:24055-[OTP][Skipped:Disconnected]Check for defaultChannel mandatory field when having multiple channels",
"labels": {
"Extended": {}
},
"resources": {
"isolation": {}
},
"source": "openshift:payload:olmv0",
"lifecycle": "blocking",
"environmentSelector": {}
},
{
"name": "[sig-operator][Jira:OLM] OLMv0 optional should PolarionID:72017-[OTP]-pod panics when EnsureSecretOwnershipAnnotations runs",
"labels": {
Expand Down
88 changes: 88 additions & 0 deletions tests-extension/test/qe/specs/olmv0_common.go
Original file line number Diff line number Diff line change
Expand Up @@ -876,4 +876,92 @@ var _ = g.Describe("[sig-operator][Jira:OLM] OLMv0 should", func() {
}
})

g.It("PolarionID:24916-[OTP][Skipped:Disconnected]Operators in AllNamespaces should be granted namespace list", func() {
buildDir := exutil.FixturePath("testdata", "olm")
ogTemplate := filepath.Join(buildDir, "operatorgroup.yaml")

og := olmv0util.OperatorGroupDescription{
Name: "og-24916",
Namespace: oc.Namespace(),
Template: ogTemplate,
}
og.Create(oc, g.CurrentSpecReport().FullText(), dr)

g.By("og should contain name of all namespaces")
output, err := oc.AsAdmin().WithoutNamespace().Run("get").Args("og", og.Name, "-n", oc.Namespace(), "-o=jsonpath={.status.namespaces}").Output()
o.Expect(err).NotTo(o.HaveOccurred())
if !strings.Contains(output, "openshift-") || !strings.Contains(output, oc.Namespace()) {
e2e.Failf("The namespaces of the OperatorGroup status is incorrect. It should contain all namespaces, but got: %s", output)
}
})

g.It("PolarionID:24771-[OTP]OLM should support for user defined ServiceAccount for OperatorGroup", func() {
buildDir := exutil.FixturePath("testdata", "olm")
ogTemplate := filepath.Join(buildDir, "operatorgroup-serviceaccount.yaml")

og := olmv0util.OperatorGroupDescription{
Name: "og-24771",
Namespace: oc.Namespace(),
Template: ogTemplate,
ServiceAccountName: "scoped-24771",
}

g.By("Create OperatorGroup")
og.Create(oc, g.CurrentSpecReport().FullText(), dr)

g.By("Check OperatorGroup Status")
olmv0util.NewCheck("expect", exutil.AsAdmin, exutil.WithoutNamespace, exutil.Compare, "ServiceAccountNotFound", exutil.Ok, []string{"og", og.Name, "-n", og.Namespace, "-o=jsonpath={.status.conditions..reason}"}).Check(oc)
})

g.It("PolarionID:24772-[OTP]OLM should support for user defined ServiceAccount for OperatorGroup with fine grained permission", func() {
buildDir := exutil.FixturePath("testdata", "olm")
ogTemplate := filepath.Join(buildDir, "operatorgroup-serviceaccount.yaml")
og := olmv0util.OperatorGroupDescription{
Name: "og-24772",
Namespace: oc.Namespace(),
Template: ogTemplate,
ServiceAccountName: "scoped-24772",
}

g.By("Create OperatorGroup")
og.Create(oc, g.CurrentSpecReport().FullText(), dr)

g.By("Check OperatorGroup Status")
olmv0util.NewCheck("expect", exutil.AsAdmin, exutil.WithoutNamespace, exutil.Compare, "ServiceAccountNotFound", exutil.Ok, []string{"og", og.Name, "-n", og.Namespace, "-o=jsonpath={.status.conditions..reason}"}).Check(oc)
})

g.It("PolarionID:24886-[OTP]OLM should support for user defined ServiceAccount permission changes", func() {
buildDir := exutil.FixturePath("testdata", "olm")
ogTemplate := filepath.Join(buildDir, "operatorgroup-serviceaccount.yaml")
sa := "scoped-24886"

og := olmv0util.OperatorGroupDescription{
Name: "og-24886",
Namespace: oc.Namespace(),
Template: ogTemplate,
ServiceAccountName: sa,
}

g.By("Create OperatorGroup")
og.Create(oc, g.CurrentSpecReport().FullText(), dr)

g.By("Verify ServiceAccountNotFound")
olmv0util.NewCheck("expect", exutil.AsAdmin, exutil.WithoutNamespace, exutil.Compare, "ServiceAccountNotFound", exutil.Ok, []string{"og", og.Name, "-n", og.Namespace, "-o=jsonpath={.status.conditions..reason}"}).Check(oc)

g.By("Create ServiceAccount")
_, err := oc.WithoutNamespace().AsAdmin().Run("create").Args("sa", sa, "-n", og.Namespace).Output()
o.Expect(err).NotTo(o.HaveOccurred())

g.By("Verify status clears")
err = wait.PollUntilContextTimeout(context.TODO(), 10*time.Second, 360*time.Second, false, func(ctx context.Context) (bool, error) {
output, err := oc.AsAdmin().WithoutNamespace().Run("get").Args("og", og.Name, "-n", og.Namespace, "-o=jsonpath={.status.conditions..reason}").Output()
if err != nil {
e2e.Logf("Fail to get og: %s, error: %s and try again", og.Name, err)
return false, nil
}
return strings.TrimSpace(output) == "", nil
})
exutil.AssertWaitPollNoErr(err, "The error ServiceAccountNotFound still be reported in status")
})

})
Loading