-
Notifications
You must be signed in to change notification settings - Fork 138
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(ISV-5130): add Atlas secrets to e2e tests #1451
Conversation
Hi @jedinym. Thanks for your PR. I'm waiting for a konflux-ci member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks sane to me, @jinqi7 does it look okay to you too?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There are some lint issues need to be resolved.
Looks good to me, will let Jing approve if it looks good to her as well |
/ok-to-test |
@johnbieren still waiting on @.shebert's manual action before the tests can work |
The indent issues seems not has fixed. Please leave the conversation to unresolved. And can you please squash the commits in the PR to one commit? |
@jinqi7 I will squash the commits once I'm sure nothing will change. As of now I'm still waiting on the manual creation of secrets, so we cannot test yet. |
/retest |
@jinqi7 I squashed the commits and added the secrets to the Vault. The tests should run now. |
/ok-to-test |
/test images |
@johnbieren Could you please run the tests again? There was a last minute change in the catalog PR. |
/ok-to-test |
/retest |
@jinqi7 I did not realize some secrets have to be base64-encoded in the vault. Could you please rerun the tests? |
Signed-off-by: Martin Jediny <jedinym@proton.me> fix(ISV-5130): add Atlas config to RPA fix(ISV-5130): remove sneaky tab fix(ISV-5130): use tabs everywhere feat(ISV-5130): add atlas secrets to registry push test feat(ISV-5130): move secret creation to releaseLib fix(ISV-5130): remove unused imports fix(ISV-5130): fix undefined error feat(ISV-5130): also test component SBOM processing docs(ISV-5130): adjust function docstring fix(ISV-5130): use tabs to indent fix(ISV-5130): adjust indentation to fit codestyle fix(ISV-5130): remove atlas data from wrong pipeline fix(ISV-5130): remove unused atlas param Signed-off-by: Martin Jediny <jedinym@proton.me> fix(ISV-5130): disable false positive Signed-off-by: Martin Jediny <jedinym@proton.me>
@jinqi7 I disabled the false gosec positive, it should be ready to go now |
/ok-to-test |
Could you please retest? The tests succeeded before I added a comment so I don't think I broke them 🙃 |
The konflux-e2e-tests failed for ""pod status "PodScheduled":"False"; message: "0/11 nodes are available: 3 node(s) had untolerated taint {node-role.kubernetes.io/infra: }, 3 node(s) had untolerated taint {node-role.kubernetes.io/master: }, 5 node(s) didn't match Pod's node affinity/selector. preemption: 0/11 nodes are available: 11 Preemption is not helpful for scheduling.." in staging cluster. So, some test in CI will fail." It's out of resource in staging cluster now. |
/retest |
2 similar comments
/retest |
/retest |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: johnbieren, psturc The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@jedinym: The following test has Failed, say /retest to rerun failed tests.
Inspecting Test ArtifactsTo inspect your test artifacts, follow these steps:
mkdir -p oras-artifacts
cd oras-artifacts
oras pull quay.io/konflux-test-storage/konflux-team/e2e-tests:konflux-e2e-xlnrx |
Included PRs: - konflux-ci/e2e-tests#1469 - konflux-ci/e2e-tests#1451 - konflux-ci/e2e-tests#1460 - konflux-ci/e2e-tests#1470 Signed-off-by: arewm <arewm@users.noreply.github.com>
Included PRs: - konflux-ci/e2e-tests#1469 - konflux-ci/e2e-tests#1451 - konflux-ci/e2e-tests#1460 - konflux-ci/e2e-tests#1470 Signed-off-by: arewm <arewm@users.noreply.github.com>
Included PRs: - konflux-ci/e2e-tests#1469 - konflux-ci/e2e-tests#1451 - konflux-ci/e2e-tests#1460 - konflux-ci/e2e-tests#1470 Signed-off-by: arewm <arewm@users.noreply.github.com>
Description
In ISV-5130, the
rh-advisories
pipeline gained the ability to upload component and product-level SBOMs to the Atlas release instance.The upload of SBOMs requires a new k8s Secret containing the SSO account and token for the stage Atlas release instance. The secrets have been added to the QE vault.
This PR makes the e2e test use the new secrets and refactors secret creation to avoid duplicate code. I left the other tests use the old way of creating the secrets but I can refactor those as well if you wish.
Issue ticket number and link
ISV-5130 - Add new pipeline steps in rh-advisories for sbom upload
ISV-5394 - Update rh-advisories pipeline e2e tests
Type of change
Checklist: