Skip to content

NO-JIRA: fix CUDN status condition tests for new TransportAccepted condition#30958

Merged
openshift-merge-bot[bot] merged 1 commit intoopenshift:mainfrom
jluhrsen:jluhrsen/fix-cudn-status-tests
Apr 7, 2026
Merged

NO-JIRA: fix CUDN status condition tests for new TransportAccepted condition#30958
openshift-merge-bot[bot] merged 1 commit intoopenshift:mainfrom
jluhrsen:jluhrsen/fix-cudn-status-tests

Conversation

@jluhrsen
Copy link
Copy Markdown
Contributor

@jluhrsen jluhrsen commented Apr 3, 2026

Summary

  • Upstream ovn-kubernetes commit added a new TransportAccepted status condition to all ClusterUserDefinedNetwork resources
  • validateClusterUDNStatusReportsActiveNamespacesFunc assumed conditions[0] was the network condition — now iterates to find NetworkCreated/NetworkReady
  • should report not-ready test used ConsistOf which requires exact match — changed to ContainElement so extra conditions (like TransportAccepted) don't cause failures
  • These tests are duplicates of upstream ovn-kubernetes e2e tests which have already been fixed. The upstream tests will run in openshift CI via the ovn-kubernetes-tests-ext binary once that framework is in production. These tests can be removed at that point, but until then this keeps them working.
  • Alternative to remove CUDN status condition tests broken by upstream changes #30957 which removes the tests instead of fixing them. We should merge one and close the other.

Test plan

  • Verify should delete managed NAD in namespaces that no longer apply to namespace-selector passes with the new TransportAccepted condition present
  • Verify when primary network exist, ClusterUserDefinedNetwork status should report not-ready passes with the new TransportAccepted condition present
  • Verify no regressions in other NetworkSegmentation tests

🤖 Generated with Claude Code

@openshift-ci-robot
Copy link
Copy Markdown

Pipeline controller notification
This repo is configured to use the pipeline controller. Second-stage tests will be triggered either automatically or after lgtm label is added, depending on the repository configuration. The pipeline controller will automatically detect which contexts are required and will utilize /test Prow commands to trigger the second stage.

For optional jobs, comment /test ? to see a list of all defined jobs. To trigger manually all jobs from second stage use /pipeline required command.

This repository is configured in: automatic mode

@coderabbitai
Copy link
Copy Markdown

coderabbitai bot commented Apr 3, 2026

Walkthrough

Test updates: assertions now allow matching an expected condition within a set (use ContainElement), and the validateClusterUDNStatusReportsActiveNamespacesFunc was rewritten to scan all status.conditions, select the first NetworkCreated or NetworkReady condition (fail if none), and validate its Status, Reason, Message, and active namespaces.

Changes

Cohort / File(s) Summary
Network condition validation logic
test/extended/networking/network_segmentation.go
Rewrote validateClusterUDNStatusReportsActiveNamespacesFunc to iterate all status.conditions, select the first condition with Type NetworkCreated or NetworkReady (error if none), and assert Status==True, expected Reason (NetworkAttachmentDefinitionCreated/NetworkAttachmentDefinitionReady), Message contains the namespace-prefix substring and all expected active namespace names. Replaced two ConsistOf(...) assertions with ContainElement(metav1.Condition{...}) for NetworkReady/NetworkCreated Status=False checks.

Estimated code review effort

🎯 3 (Moderate) | ⏱️ ~20 minutes

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests

Comment @coderabbitai help to get the list of available commands and usage tips.

Copy link
Copy Markdown

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In `@test/extended/networking/network_segmentation.go`:
- Around line 1484-1508: The helper currently selects the first condition with
Type "NetworkCreated"/"NetworkReady" (networkCond) which can be incorrect if a
later one is the valid condition; update the logic to scan all entries in
conditions and pick the first condition that satisfies all required checks
(Status == metav1.ConditionTrue, Reason is "NetworkAttachmentDefinitionCreated"
or "NetworkAttachmentDefinitionReady", Message contains
"NetworkAttachmentDefinition has been created in following namespaces:" and
contains every namespace from expectedActiveNsNames); only return success when
such a matching condition is found, otherwise return a clear error listing
conditions examined or that no matching network condition met all criteria.
🪄 Autofix (Beta)

Fix all unresolved CodeRabbit comments on this PR:

  • Push a commit to this branch (recommended)
  • Create a new PR with the fixes

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: d330c1bd-d697-4330-b16b-a064f19bf9c4

📥 Commits

Reviewing files that changed from the base of the PR and between ca2c889 and 620e6e2.

📒 Files selected for processing (1)
  • test/extended/networking/network_segmentation.go

Comment on lines +1484 to +1508
// Find NetworkCreated/NetworkReady condition among all conditions
var networkCond *metav1.Condition
for i := range conditions {
if conditions[i].Type == "NetworkCreated" || conditions[i].Type == "NetworkReady" {
networkCond = &conditions[i]
break
}
}
if c.Status != metav1.ConditionTrue {
return fmt.Errorf("expected True status in %v", c)
if networkCond == nil {
return fmt.Errorf("NetworkCreated/NetworkReady condition not found in conditions: %v", conditions)
}

if networkCond.Status != metav1.ConditionTrue {
return fmt.Errorf("expected True status in %v", networkCond)
}
if c.Reason != "NetworkAttachmentDefinitionCreated" && c.Reason != "NetworkAttachmentDefinitionReady" {
return fmt.Errorf("expected NetworkAttachmentDefinitionCreated/NetworkAttachmentDefinitionReady reason in %v", c)
if networkCond.Reason != "NetworkAttachmentDefinitionCreated" && networkCond.Reason != "NetworkAttachmentDefinitionReady" {
return fmt.Errorf("expected NetworkAttachmentDefinitionCreated/NetworkAttachmentDefinitionReady reason in %v", networkCond)
}
if !strings.Contains(c.Message, "NetworkAttachmentDefinition has been created in following namespaces:") {
return fmt.Errorf("expected \"NetworkAttachmentDefinition has been created in following namespaces:\" in %s", c.Message)
if !strings.Contains(networkCond.Message, "NetworkAttachmentDefinition has been created in following namespaces:") {
return fmt.Errorf("expected \"NetworkAttachmentDefinition has been created in following namespaces:\" in %s", networkCond.Message)
}

for _, ns := range expectedActiveNsNames {
if !strings.Contains(c.Message, ns) {
return fmt.Errorf("expected to find %q namespace in %s", ns, c.Message)
if !strings.Contains(networkCond.Message, ns) {
return fmt.Errorf("expected to find %q namespace in %s", ns, networkCond.Message)
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟠 Major

This still assumes the first network condition is the right one.

It no longer depends on conditions[0], but it still breaks on the first NetworkCreated/NetworkReady entry. If both are present and only a later one matches the expected status/message, the helper still fails even though the CR status is valid.

Suggested fix
-		// Find NetworkCreated/NetworkReady condition among all conditions
-		var networkCond *metav1.Condition
-		for i := range conditions {
-			if conditions[i].Type == "NetworkCreated" || conditions[i].Type == "NetworkReady" {
-				networkCond = &conditions[i]
-				break
-			}
-		}
-		if networkCond == nil {
-			return fmt.Errorf("NetworkCreated/NetworkReady condition not found in conditions: %v", conditions)
-		}
-
-		if networkCond.Status != metav1.ConditionTrue {
-			return fmt.Errorf("expected True status in %v", networkCond)
-		}
-		if networkCond.Reason != "NetworkAttachmentDefinitionCreated" && networkCond.Reason != "NetworkAttachmentDefinitionReady" {
-			return fmt.Errorf("expected NetworkAttachmentDefinitionCreated/NetworkAttachmentDefinitionReady reason in %v", networkCond)
-		}
-		if !strings.Contains(networkCond.Message, "NetworkAttachmentDefinition has been created in following namespaces:") {
-			return fmt.Errorf("expected \"NetworkAttachmentDefinition has been created in following namespaces:\" in %s", networkCond.Message)
-		}
-
-		for _, ns := range expectedActiveNsNames {
-			if !strings.Contains(networkCond.Message, ns) {
-				return fmt.Errorf("expected to find %q namespace in %s", ns, networkCond.Message)
-			}
-		}
-		return nil
+		for i := range conditions {
+			cond := conditions[i]
+			if cond.Type != "NetworkCreated" && cond.Type != "NetworkReady" {
+				continue
+			}
+			if cond.Status != metav1.ConditionTrue {
+				continue
+			}
+			if cond.Reason != "NetworkAttachmentDefinitionCreated" && cond.Reason != "NetworkAttachmentDefinitionReady" {
+				continue
+			}
+			if !strings.Contains(cond.Message, "NetworkAttachmentDefinition has been created in following namespaces:") {
+				continue
+			}
+
+			missingNamespace := false
+			for _, ns := range expectedActiveNsNames {
+				if !strings.Contains(cond.Message, ns) {
+					missingNamespace = true
+					break
+				}
+			}
+			if !missingNamespace {
+				return nil
+			}
+		}
+		return fmt.Errorf("no NetworkCreated/NetworkReady condition matched expected active namespaces: %v", conditions)
As per coding guidelines, "Focus on major issues impacting performance, readability, maintainability and security. Avoid nitpicks and avoid verbosity."
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
// Find NetworkCreated/NetworkReady condition among all conditions
var networkCond *metav1.Condition
for i := range conditions {
if conditions[i].Type == "NetworkCreated" || conditions[i].Type == "NetworkReady" {
networkCond = &conditions[i]
break
}
}
if c.Status != metav1.ConditionTrue {
return fmt.Errorf("expected True status in %v", c)
if networkCond == nil {
return fmt.Errorf("NetworkCreated/NetworkReady condition not found in conditions: %v", conditions)
}
if networkCond.Status != metav1.ConditionTrue {
return fmt.Errorf("expected True status in %v", networkCond)
}
if c.Reason != "NetworkAttachmentDefinitionCreated" && c.Reason != "NetworkAttachmentDefinitionReady" {
return fmt.Errorf("expected NetworkAttachmentDefinitionCreated/NetworkAttachmentDefinitionReady reason in %v", c)
if networkCond.Reason != "NetworkAttachmentDefinitionCreated" && networkCond.Reason != "NetworkAttachmentDefinitionReady" {
return fmt.Errorf("expected NetworkAttachmentDefinitionCreated/NetworkAttachmentDefinitionReady reason in %v", networkCond)
}
if !strings.Contains(c.Message, "NetworkAttachmentDefinition has been created in following namespaces:") {
return fmt.Errorf("expected \"NetworkAttachmentDefinition has been created in following namespaces:\" in %s", c.Message)
if !strings.Contains(networkCond.Message, "NetworkAttachmentDefinition has been created in following namespaces:") {
return fmt.Errorf("expected \"NetworkAttachmentDefinition has been created in following namespaces:\" in %s", networkCond.Message)
}
for _, ns := range expectedActiveNsNames {
if !strings.Contains(c.Message, ns) {
return fmt.Errorf("expected to find %q namespace in %s", ns, c.Message)
if !strings.Contains(networkCond.Message, ns) {
return fmt.Errorf("expected to find %q namespace in %s", ns, networkCond.Message)
for i := range conditions {
cond := conditions[i]
if cond.Type != "NetworkCreated" && cond.Type != "NetworkReady" {
continue
}
if cond.Status != metav1.ConditionTrue {
continue
}
if cond.Reason != "NetworkAttachmentDefinitionCreated" && cond.Reason != "NetworkAttachmentDefinitionReady" {
continue
}
if !strings.Contains(cond.Message, "NetworkAttachmentDefinition has been created in following namespaces:") {
continue
}
missingNamespace := false
for _, ns := range expectedActiveNsNames {
if !strings.Contains(cond.Message, ns) {
missingNamespace = true
break
}
}
if !missingNamespace {
return nil
}
}
return fmt.Errorf("no NetworkCreated/NetworkReady condition matched expected active namespaces: %v", conditions)
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@test/extended/networking/network_segmentation.go` around lines 1484 - 1508,
The helper currently selects the first condition with Type
"NetworkCreated"/"NetworkReady" (networkCond) which can be incorrect if a later
one is the valid condition; update the logic to scan all entries in conditions
and pick the first condition that satisfies all required checks (Status ==
metav1.ConditionTrue, Reason is "NetworkAttachmentDefinitionCreated" or
"NetworkAttachmentDefinitionReady", Message contains
"NetworkAttachmentDefinition has been created in following namespaces:" and
contains every namespace from expectedActiveNsNames); only return success when
such a matching condition is found, otherwise return a clear error listing
conditions examined or that no matching network condition met all criteria.

upstream ovn-kubernetes commit [0] added a new TransportAccepted
status condition to ClusterUserDefinedNetwork resources. two tests
and a helper function assumed the condition list only contained
network conditions and broke when TransportAccepted appeared.

these tests are duplicates of the upstream ovn-kubernetes e2e tests
which have already been fixed in the same commit. the upstream
tests will run in openshift CI via the OTE binary once that
framework is in production. these tests can be removed at that
point, but until then this keeps them working.

fixes:
- validateClusterUDNStatusReportsActiveNamespacesFunc: iterate
  conditions to find NetworkCreated/NetworkReady instead of
  assuming conditions
- "should report not-ready" test: use ContainElement instead of
  ConsistOf so extra conditions don't cause failures

[0] ovn-kubernetes/ovn-kubernetes@b855462

Signed-off-by: Jamo Luhrsen <jluhrsen@gmail.com>
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@jluhrsen jluhrsen force-pushed the jluhrsen/fix-cudn-status-tests branch from 620e6e2 to 6dcc541 Compare April 3, 2026 22:47
@jluhrsen
Copy link
Copy Markdown
Contributor Author

jluhrsen commented Apr 3, 2026

/payload-job-with-prs periodic-ci-openshift-release-main-ci-4.22-e2e-aws-ovn openshift/ovn-kubernetes#3114

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci bot commented Apr 3, 2026

@jluhrsen: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-release-main-ci-4.22-e2e-aws-ovn

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/d6c9aec0-2faf-11f1-9119-eb5d42984525-0

Copy link
Copy Markdown

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

♻️ Duplicate comments (1)
test/extended/networking/network_segmentation.go (1)

1484-1508: ⚠️ Potential issue | 🟠 Major

Still order-dependent across NetworkCreated/NetworkReady.

This no longer relies on conditions[0], but it still validates only the first network condition it sees. If a later NetworkCreated/NetworkReady entry is the one that actually matches, the helper returns a false failure.

Suggested fix
-		// Find NetworkCreated/NetworkReady condition among all conditions
-		var networkCond *metav1.Condition
-		for i := range conditions {
-			if conditions[i].Type == "NetworkCreated" || conditions[i].Type == "NetworkReady" {
-				networkCond = &conditions[i]
-				break
-			}
-		}
-		if networkCond == nil {
-			return fmt.Errorf("NetworkCreated/NetworkReady condition not found in conditions: %v", conditions)
-		}
-
-		if networkCond.Status != metav1.ConditionTrue {
-			return fmt.Errorf("expected True status in %v", networkCond)
-		}
-		if networkCond.Reason != "NetworkAttachmentDefinitionCreated" && networkCond.Reason != "NetworkAttachmentDefinitionReady" {
-			return fmt.Errorf("expected NetworkAttachmentDefinitionCreated/NetworkAttachmentDefinitionReady reason in %v", networkCond)
-		}
-		if !strings.Contains(networkCond.Message, "NetworkAttachmentDefinition has been created in following namespaces:") {
-			return fmt.Errorf("expected \"NetworkAttachmentDefinition has been created in following namespaces:\" in %s", networkCond.Message)
-		}
-
-		for _, ns := range expectedActiveNsNames {
-			if !strings.Contains(networkCond.Message, ns) {
-				return fmt.Errorf("expected to find %q namespace in %s", ns, networkCond.Message)
-			}
-		}
-		return nil
+		for i := range conditions {
+			cond := conditions[i]
+			if cond.Type != "NetworkCreated" && cond.Type != "NetworkReady" {
+				continue
+			}
+			if cond.Status != metav1.ConditionTrue {
+				continue
+			}
+			if cond.Reason != "NetworkAttachmentDefinitionCreated" && cond.Reason != "NetworkAttachmentDefinitionReady" {
+				continue
+			}
+			if !strings.Contains(cond.Message, "NetworkAttachmentDefinition has been created in following namespaces:") {
+				continue
+			}
+
+			missingNamespace := false
+			for _, ns := range expectedActiveNsNames {
+				if !strings.Contains(cond.Message, ns) {
+					missingNamespace = true
+					break
+				}
+			}
+			if !missingNamespace {
+				return nil
+			}
+		}
+		return fmt.Errorf("no NetworkCreated/NetworkReady condition matched expected active namespaces: %v", conditions)
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@test/extended/networking/network_segmentation.go` around lines 1484 - 1508,
The current check picks the first condition matching Type "NetworkCreated" or
"NetworkReady" and fails if that one doesn't match expected
status/reason/message; instead, update the logic that iterates the conditions
(the loop that sets networkCond from the conditions slice) to evaluate every
condition whose Type is "NetworkCreated" or "NetworkReady" and return success as
soon as one such condition satisfies Status==metav1.ConditionTrue, Reason in
{"NetworkAttachmentDefinitionCreated","NetworkAttachmentDefinitionReady"},
contains the expected message prefix, and includes all namespaces from
expectedActiveNsNames; only return an error after all matching conditions are
checked and none satisfy all checks. Ensure you continue to reference the
existing variables/identifiers (conditions, networkCond, expectedActiveNsNames)
so the change is localized.
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Duplicate comments:
In `@test/extended/networking/network_segmentation.go`:
- Around line 1484-1508: The current check picks the first condition matching
Type "NetworkCreated" or "NetworkReady" and fails if that one doesn't match
expected status/reason/message; instead, update the logic that iterates the
conditions (the loop that sets networkCond from the conditions slice) to
evaluate every condition whose Type is "NetworkCreated" or "NetworkReady" and
return success as soon as one such condition satisfies
Status==metav1.ConditionTrue, Reason in
{"NetworkAttachmentDefinitionCreated","NetworkAttachmentDefinitionReady"},
contains the expected message prefix, and includes all namespaces from
expectedActiveNsNames; only return an error after all matching conditions are
checked and none satisfy all checks. Ensure you continue to reference the
existing variables/identifiers (conditions, networkCond, expectedActiveNsNames)
so the change is localized.

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: 6a673bbd-4d9c-4e3f-85fd-f927b00a2cee

📥 Commits

Reviewing files that changed from the base of the PR and between 620e6e2 and 6dcc541.

📒 Files selected for processing (1)
  • test/extended/networking/network_segmentation.go

@openshift-ci-robot
Copy link
Copy Markdown

Scheduling required tests:
/test e2e-aws-csi
/test e2e-aws-ovn-fips
/test e2e-aws-ovn-microshift
/test e2e-aws-ovn-microshift-serial
/test e2e-aws-ovn-serial-1of2
/test e2e-aws-ovn-serial-2of2
/test e2e-gcp-csi
/test e2e-gcp-ovn
/test e2e-gcp-ovn-upgrade
/test e2e-metal-ipi-ovn-ipv6
/test e2e-vsphere-ovn
/test e2e-vsphere-ovn-upi

@kyrtapz
Copy link
Copy Markdown
Contributor

kyrtapz commented Apr 7, 2026

/lgtm
/retitle NO-JIRA: fix CUDN status condition tests for new TransportAccepted condition
/verified by https://prow.ci.openshift.org/view/gs/test-platform-results/logs/openshift-ovn-kubernetes-3114-openshift-origin-30958-ci-4.22-e2e-aws-ovn/2040200894242361344

@openshift-ci openshift-ci bot changed the title fix CUDN status condition tests for new TransportAccepted condition NO-JIRA: fix CUDN status condition tests for new TransportAccepted condition Apr 7, 2026
@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Apr 7, 2026
@openshift-ci-robot
Copy link
Copy Markdown

@jluhrsen: This pull request explicitly references no jira issue.

Details

In response to this:

Summary

  • Upstream ovn-kubernetes commit added a new TransportAccepted status condition to all ClusterUserDefinedNetwork resources
  • validateClusterUDNStatusReportsActiveNamespacesFunc assumed conditions[0] was the network condition — now iterates to find NetworkCreated/NetworkReady
  • should report not-ready test used ConsistOf which requires exact match — changed to ContainElement so extra conditions (like TransportAccepted) don't cause failures
  • These tests are duplicates of upstream ovn-kubernetes e2e tests which have already been fixed. The upstream tests will run in openshift CI via the ovn-kubernetes-tests-ext binary once that framework is in production. These tests can be removed at that point, but until then this keeps them working.
  • Alternative to remove CUDN status condition tests broken by upstream changes #30957 which removes the tests instead of fixing them. We should merge one and close the other.

Test plan

  • Verify should delete managed NAD in namespaces that no longer apply to namespace-selector passes with the new TransportAccepted condition present
  • Verify when primary network exist, ClusterUserDefinedNetwork status should report not-ready passes with the new TransportAccepted condition present
  • Verify no regressions in other NetworkSegmentation tests

🤖 Generated with Claude Code

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot openshift-ci-robot added the verified Signifies that the PR passed pre-merge verification criteria label Apr 7, 2026
@openshift-ci-robot
Copy link
Copy Markdown

@kyrtapz: This PR has been marked as verified by https://prow.ci.openshift.org/view/gs/test-platform-results/logs/openshift-ovn-kubernetes-3114-openshift-origin-30958-ci-4.22-e2e-aws-ovn/2040200894242361344.

Details

In response to this:

/lgtm
/retitle NO-JIRA: fix CUDN status condition tests for new TransportAccepted condition
/verified by https://prow.ci.openshift.org/view/gs/test-platform-results/logs/openshift-ovn-kubernetes-3114-openshift-origin-30958-ci-4.22-e2e-aws-ovn/2040200894242361344

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Apr 7, 2026
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci bot commented Apr 7, 2026

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: jluhrsen, kyrtapz

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Apr 7, 2026
@kyrtapz
Copy link
Copy Markdown
Contributor

kyrtapz commented Apr 7, 2026

/retest-required

@kyrtapz
Copy link
Copy Markdown
Contributor

kyrtapz commented Apr 7, 2026

The tests succeeded and the lane failed during must-gather
https://prow.ci.openshift.org/view/gs/test-platform-results/pr-logs/pull/30958/pull-ci-openshift-origin-main-e2e-gcp-csi/2041431659676438528
/override ci/prow/e2e-gcp-csi

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci bot commented Apr 7, 2026

@kyrtapz: kyrtapz unauthorized: /override is restricted to Repo administrators, approvers in top level OWNERS file, and the following github teams:openshift: openshift-release-oversight openshift-staff-engineers openshift-sustaining-engineers.

Details

In response to this:

The tests succeeded and the lane failed during must-gather
https://prow.ci.openshift.org/view/gs/test-platform-results/pr-logs/pull/30958/pull-ci-openshift-origin-main-e2e-gcp-csi/2041431659676438528
/override ci/prow/e2e-gcp-csi

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@kyrtapz
Copy link
Copy Markdown
Contributor

kyrtapz commented Apr 7, 2026

/retest-required

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci bot commented Apr 7, 2026

@jluhrsen: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@openshift-merge-bot openshift-merge-bot bot merged commit f183253 into openshift:main Apr 7, 2026
21 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged. verified Signifies that the PR passed pre-merge verification criteria

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants