Skip to content

[OCPERT-264][hold]Add OTE (OpenShift Tests Extension) migration testing for single mode with dockerfile integrated#732

Open
ming1013 wants to merge 2 commits intoopenshift:masterfrom
ming1013:minl_ote_test_v3
Open

[OCPERT-264][hold]Add OTE (OpenShift Tests Extension) migration testing for single mode with dockerfile integrated#732
ming1013 wants to merge 2 commits intoopenshift:masterfrom
ming1013:minl_ote_test_v3

Conversation

@ming1013
Copy link

========================================
🎉 OTE Migration Complete!

Summary

Successfully migrated router to OTE framework using single-module strategy.

Created Structure

/home/minl/ote-migration-test/router/
├── tests-extension/
│ ├── cmd/
│ │ └── main.go # OTE entry point
│ ├── bin/
│ │ └── router-tests-ext (351M) # Extension binary
│ ├── test/
│ │ └── e2e/
│ │ ├── *.go (23 files) # Migrated test files
│ │ ├── testdata/
│ │ │ ├── router/ # 46 fixture files
│ │ │ ├── bindata.go
│ │ │ └── fixtures.go
│ │ └── bindata.mk
│ ├── vendor/ # Vendored dependencies
│ ├── go.mod
│ ├── go.sum
│ └── Makefile
└── images/router/haproxy/
└── Dockerfile.ocp # Updated with OTE integration

Key Features

  1. Single-Module Structure: Self-contained tests-extension/ directory
  2. No Sig Filtering: All tests included without filtering
  3. Annotations:
    • [OTP] added to all Describe blocks at beginning
    • [Level0] added to test names with -LEVEL0- suffix
  4. Testdata: 46 fixture files copied and embedded into bindata.go
  5. Dockerfile Integration: Automated Docker image integration with backup

Next Steps

1. Verify Build

cd tests-extension
make build

# Verify binary exists
ls -lh bin/router-tests-ext

2. List Tests

# List all migrated tests
./bin/router-tests-ext list

# Count total tests
./bin/router-tests-ext list | wc -l

# Count Level0 tests
./bin/router-tests-ext list | grep -c "\[Level0\]"

3. Run Tests

# Run all tests
./bin/router-tests-ext run

# Run specific test
./bin/router-tests-ext run --grep "test-name-pattern"

# Run Level0 tests only
./bin/router-tests-ext run --grep "\[Level0\]"

4. Build Docker Image

# Return to repository root
cd ..

# Build image with test extension
docker build -t router:test -f images/router/haproxy/Dockerfile.ocp .

# Verify test extension in image
docker run --rm router:test ls -lh /usr/bin/router-test-extension.tar.gz

5. Verify Test Annotations

cd tests-extension

# Check [OTP] annotations
grep -r "\[OTP\]" test/e2e/*.go

# Check [Level0] annotations  
grep -r "\[Level0\]" test/e2e/*.go

# Verify no -LEVEL0- suffixes remain
grep -r "\-LEVEL0\-" test/e2e/*.go || echo "✅ All -LEVEL0- removed"

Files Created/Modified

- ✅ tests-extension/cmd/main.go - Created
- ✅ tests-extension/go.mod - Created
- ✅ tests-extension/test/e2e/testdata/fixtures.go - Created
- ✅ tests-extension/test/e2e/testdata/bindata.go - Created
- ✅ tests-extension/test/e2e/bindata.mk - Created
- ✅ tests-extension/test/e2e/*.go (20 files) - Modified (annotations, imports)
- ✅ tests-extension/vendor/ - Created
- ✅ tests-extension/Makefile - Created
- ✅ images/router/haproxy/Dockerfile.ocp - Updated
  - Backup at: images/router/haproxy/Dockerfile.ocp.pre-ote-migration

Statistics

- Test files: 23 Go files
- Testdata fixtures: 46 files
- Binary size: 351M
- Annotations: [OTP] in all Describe blocks, [Level0] in Level0 tests
- No -LEVEL0- suffixes: All removed ✅

Troubleshooting

Build Failures

cd tests-extension

# Check go.mod
go mod verify

# Rebuild vendor
rm -rf vendor/
go mod vendor

# Clean and rebuild
make clean
make build

Import Errors

# Check testdata imports
grep -r "testdata.FixturePath" test/e2e/

# Verify import paths
grep -r "import" test/e2e/*.go | grep testdata

Annotation Issues

# Check for missing [OTP]
grep -L "\[OTP\]" test/e2e/*_test.go

# Check for remaining -LEVEL0-
grep -r "\-LEVEL0\-" test/e2e/

# Re-run annotation script if needed
python3 /tmp/annotate_tests.py test/e2e/

Docker Build Failures

# Check Dockerfile stages
docker build --target test-extension-builder -f images/router/haproxy/Dockerfile.ocp .

# Verify binary exists before compression
docker run --rm <image> ls -la tests-extension/bin/

# Check Makefile target
cd tests-extension && make build

Important Notes

- Dockerfile backup: Original Dockerfile saved with .pre-ote-migration extension
- Ginkgo version: Updated to latest OpenShift fork (696928a6a0d7) for compatibility
- Go version: Requires Go 1.24.6+ (auto-upgraded to 1.25.7 during build)
- Testdata: All 46 fixture files embedded into bindata.go for runtime access

========================================
Migration completed successfully! 🎉


The OTE migration has been completed successfully! All 8 phases are done:

1. ✅ Configuration collected
2. ✅ Repositories set up
3. ✅ Directory structure created
4. ✅ Code generated (go.mod, main.go, Makefile, bindata.mk, fixtures.go)
5. ✅ Tests migrated (with [OTP] and [Level0] annotations)
6. ✅ Dependencies resolved and binary built (351M)
7. ✅ Docker integration complete (Dockerfile.ocp updated)
8. ✅ Final summary provided

…ng for single mode with dockerfile integrated
@ming1013
Copy link
Author

/hold

@openshift-ci openshift-ci bot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Feb 12, 2026
@openshift-ci openshift-ci bot requested review from bentito and jcmoraisjr February 12, 2026 14:56
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 12, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign ironcladlou for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@ming1013
Copy link
Author

===========================================================================
New logic of adding annotations without sig tag auto detecting and filtering test pass:

$ ./tests-extension/bin/router-tests-ext list | grep sig- | wc -l
293
./tests-extension/bin/router-tests-ext list | grep sig-
"name": "[OTP][sig-network-edge] Network_Edge Component_ALBO [Level0] Author:hongli-ROSA-OSD_CCS-ConnectedOnly-High-51189-Install aws-load-balancer-operator and controller [Serial]",
"name": "[OTP][sig-network-edge] Network_Edge Component_ALBO Author:hongli-ROSA-OSD_CCS-ConnectedOnly-Medium-51191-Provision ALB by creating an ingress [Serial]"

===========================================================================
run test met following failure, but I don't think this is a plugin issue but a oc process issue:

[FAILED] Unexpected error:
<*errors.errorString | 0xc001b18ae0>:
case: [OTP][sig-network-edge] Network_Edge Component_Router [Level0] Author:shudili-Critical-41110-The threadCount ingresscontroller parameter controls the nbthread option for the haproxy router
error: fail to process [--ignore-unknown-parameters=true -f /tmp/testdata-fixtures-4253400565/router/ingresscontroller-np.yaml -p NAME=ocp41110 NAMESPACE=openshift-ingress-operator DOMAIN=ocp41110.minl0212.qe.devcluster.openshift.com SHARD=]
{
s: "case: [OTP][sig-network-edge] Network_Edge Component_Router [Level0] Author:shudili-Critical-41110-The threadCount ingresscontroller parameter controls the nbthread option for the haproxy router\nerror: fail to process [--ignore-unknown-parameters=true -f /tmp/testdata-fixtures-4253400565/router/ingresscontroller-np.yaml -p NAME=ocp41110 NAMESPACE=openshift-ingress-operator DOMAIN=ocp41110.minl0212.qe.devcluster.openshift.com SHARD=]",
}
occurred
In [It] at: /home/minl/ote-migration-test/router/tests-extension/vendor/github.com/openshift/origin/test/extended/util/compat_otp/assert.go:30 @ 02/12/26 22:41:28.857

===========================================================================
Set lifecycle to Informing in generated main.go

// Set lifecycle to Informing
specs.Walk(func(spec *et.ExtensionTestSpec) {
spec.Lifecycle = et.LifecycleInforming
})

===========================================================================
dockerfile integrated test fail, but I don't think this a plugin issue but authenticate issue

$ docker build --target test-extension-builder -t test-builder -f Dockerfile.ocp .
WARNING: Error loading config file: /home/minl/.docker/config.json: : invalid character 'a' looking for beginning of object key string
WARNING: Error parsing config file (/home/minl/.docker/config.json): invalid character 'a' looking for beginning of object key string
[+] Building 3.1s (2/2) FINISHED docker:default
=> [internal] load build definition from Dockerfile.ocp 0.0s
=> => transferring dockerfile: 2.24kB 0.0s
=> ERROR [internal] load metadata for registry.ci.openshift.org/ocp/builder:rhel-9-golang-1.24 3.0s

[internal] load metadata for registry.ci.openshift.org/ocp/builder:rhel-9-golang-1.24:


Dockerfile.ocp:9

7 |
8 | # Test extension builder stage (added by ote-stbenjammigration)
9 | >>> FROM registry.ci.openshift.org/ocp/builder:rhel-9-golang-1.24 AS test-extension-builder
10 | RUN mkdir -p /go/src/github.com/openshift/router
11 | WORKDIR /go/src/github.com/openshift/router

ERROR: failed to solve: registry.ci.openshift.org/ocp/builder:rhel-9-golang-1.24: failed to resolve source metadata for registry.ci.openshift.org/ocp/builder:rhel-9-golang-1.24: unexpected status from HEAD request to https://registry.ci.openshift.org/v2/ocp/builder/manifests/rhel-9-golang-1.24: 401

@rioliu-rh @stbenjam @LuboTerifaj Above is a simple test report of single mode for present plugin with updatings according to our discussion, please help to have a look. I'll continue the test and after we finish the review against single mode, I'll continue to test monorepo mode, thank you very much!

@ming1013 ming1013 changed the title [OCPERT-210][hold]Add OTE (OpenShift Tests Extension) migration testing for single mode with dockerfile integrated [OCPERT-264][hold]Add OTE (OpenShift Tests Extension) migration testing for single mode with dockerfile integrated Feb 13, 2026
@ming1013
Copy link
Author

Thanks. @rioliu-rh The authenticate issue of docker file integration testing resolved now.

$ docker build --target test-extension-builder -t test-builder -f images/router/haproxy/Dockerfile.ocp .
[+] Building 597.7s (10/12) docker:default
=> [internal] load build definition from Dockerfile.ocp 0.0s
=> => transferring dockerfile: 2.34kB 0.0s
=> [internal] load metadata for registry.ci.openshift.org/ocp/builder:rhel-9-golang-1.24-openshift-4.23 0.5s
=> [internal] load .dockerignore 0.0s
=> => transferring context: 2B 0.0s
=> [test-extension-builder 1/5] FROM registry.ci.openshift.org/ocp/builder:rhel-9-golang-1.24-openshift-4.23@sha256:7a78bca3483038749ef510dde4bdde9 0.0s
=> [internal] load build context 14.9s
=> => transferring context: 919.05MB 14.7s
=> CACHED [test-extension-builder 2/5] RUN mkdir -p /go/src/github.com/openshift/router 0.0s
=> CACHED [test-extension-builder 3/5] WORKDIR /go/src/github.com/openshift/router 0.0s
=> CACHED [test-extension-builder 4/5] COPY . . 0.0s
=> [test-extension-builder 5/5] RUN cd tests-extension && make build && cd bin && tar -czvf router-test-extension.tar.gz router-tests 554.8s
=> exporting to image 44.5s
=> => exporting layers 44.5s
=> => writing image sha256:fd76a48de1740faee5b401496ef427574391685cb15919e458fc36890149bf31 0.0s
=> => naming to docker.io/library/test-builder

@ming1013
Copy link
Author

cc @tomasdavidorg @jhuttana

@ming1013
Copy link
Author

$ docker build -t router:test -f images/router/haproxy/Dockerfile.ocp .
[+] Building 2672.4s (18/18) FINISHED docker:default
=> [internal] load build definition from Dockerfile.ocp 0.0s
=> => transferring dockerfile: 2.34kB 0.0s
=> [internal] load metadata for registry.ci.openshift.org/ocp/4.22:haproxy-router-base 2.9s
=> [internal] load metadata for registry.ci.openshift.org/ocp/builder:rhel-9-golang-1.24-openshift-4.23 2.9s
=> [auth] ocp/builder:pull token for registry.ci.openshift.org 0.0s
=> [auth] ocp/4.22:pull token for registry.ci.openshift.org 0.0s
=> [internal] load .dockerignore 0.0s
=> => transferring context: 2B 0.0s
=> [test-extension-builder 1/5] FROM registry.ci.openshift.org/ocp/builder:rhel-9-golang-1.24-openshift-4.23@sha256:7a78bca3483038749ef510dde4bdde9c16fac6f1469cd649ca858f44ab331681 0.0s
=> CACHED [stage-2 1/5] FROM registry.ci.openshift.org/ocp/4.22:haproxy-router-base@sha256:ea1507f86f64b55114840c302e83f2d2cc52657877510e03105238fd69a265c7 0.0s
=> [internal] load build context 2.0s
=> => transferring context: 7.83MB 1.9s
=> [stage-2 2/5] RUN INSTALL_PKGS="socat haproxy28 rsyslog procps-ng util-linux" && yum install -y $INSTALL_PKGS && rpm -V $INSTALL_PKGS && yum clean all && mkdir 2668.6s
=> CACHED [test-extension-builder 2/5] RUN mkdir -p /go/src/github.com/openshift/router 0.0s
=> CACHED [test-extension-builder 3/5] WORKDIR /go/src/github.com/openshift/router 0.0s
=> CACHED [test-extension-builder 4/5] COPY . . 0.0s
=> CACHED [test-extension-builder 5/5] RUN cd tests-extension && make build && cd bin && tar -czvf router-test-extension.tar.gz router-tests-ext && rm -f router-tests 0.0s
=> [stage-2 3/5] COPY images/router/haproxy/ /var/lib/haproxy/ 0.1s
=> [stage-2 4/5] COPY --from=test-extension-builder /go/src/github.com/openshift/router/tests-extension/bin/router-test-extension.tar.gz /usr/bin/ 0.1s
=> [stage-2 5/5] WORKDIR /var/lib/haproxy/conf 0.0s
=> exporting to image 0.6s
=> => exporting layers 0.6s
=> => writing image sha256:572b7263514ee9dd9c764f7b84cdf1b0b87316302f6831d8ecdd120ea071cb1e 0.0s
=> => naming to docker.io/library/router:test

docker run --rm test-builder ls -lh /go/src/github.com/openshift/router/tests-extension/bin/
total 121M
-rw-r--r--. 1 root root 121M Feb 13 07:28 router-test-extension.tar.gz

@ming1013
Copy link
Author

ming1013 commented Feb 13, 2026

@rioliu-rh Thanks for your suggestion to test by podman, the test pass like:

$ podman build -t router:test -f images/router/haproxy/Dockerfile.ocp .
[2/3] STEP 1/5: FROM registry.ci.openshift.org/ocp/builder:rhel-9-golang-1.24-openshift-4.23 AS test-extension-builder
Trying to pull registry.ci.openshift.org/ocp/builder:rhel-9-golang-1.24-openshift-4.23...
Getting image source signatures
Copying blob aa93729c69e7 done |
Copying blob 5e09f8650bc2 done |
Copying blob 672b418cb9bf done |
Copying config 52a7e8517d done |
Writing manifest to image destination
[2/3] STEP 2/5: RUN mkdir -p /go/src/github.com/openshift/router
--> 2e208fa8aa69
[2/3] STEP 3/5: WORKDIR /go/src/github.com/openshift/router
--> 84bd1bc72c70
[2/3] STEP 4/5: COPY . .
--> 5e586672df45
[2/3] STEP 5/5: RUN cd tests-extension && make build && cd bin && tar -czvf router-test-extension.tar.gz router-tests-ext && rm -f router-tests-ext
Building extension binary...
make[1]: Entering directory '/go/src/github.com/openshift/router/tests-extension/test/e2e'
Installing go-bindata...
go: downloading github.com/go-bindata/go-bindata/v3 v3.1.3
go: downloading github.com/go-bindata/go-bindata v3.1.2+incompatible
Generating bindata...
/go/bin/go-bindata -nocompress -nometadata
-pkg testdata -o testdata/bindata.go -prefix "testdata" testdata/...
make[1]: Leaving directory '/go/src/github.com/openshift/router/tests-extension/test/e2e'
go build -o bin/router-tests-ext ./cmd
✅ Binary built: bin/router-tests-ext
router-tests-ext
--> ad201127140c
[3/3] STEP 1/10: FROM registry.ci.openshift.org/ocp/4.22:haproxy-router-base
Trying to pull registry.ci.openshift.org/ocp/4.22:haproxy-router-base...
Getting image source signatures
Copying blob bfdb751b60c7 done |
Copying blob cb8cee91bb10 done |
Copying blob 003825e55220 done |
Copying blob d69c464dd2ca done |
Copying blob 5fdad9e8ebab done |
Copying config 7296bff8a0 done |
Writing manifest to image destination
[3/3] STEP 2/10: RUN INSTALL_PKGS="socat haproxy28 rsyslog procps-ng util-linux" && yum install -y $INSTALL_PKGS && rpm -V $INSTALL_PKGS && yum clean all && mkdir -p /var/lib/haproxy/router/{certs,cacerts,allowlists} && mkdir -p /var/lib/haproxy/{conf/.tmp,run,bin,log,mtls} && touch /var/lib/haproxy/conf/{{os_http_be,os_edge_reencrypt_be,os_tcp_be,os_sni_passthrough,os_route_http_redirect,cert_config,os_wildcard_domain}.map,haproxy.config} && setcap 'cap_net_bind_service=ep' /usr/sbin/haproxy && chown -R :0 /var/lib/haproxy && chmod -R g+w /var/lib/haproxy && sed -i 's/SECLEVEL=2/SECLEVEL=1/g' /etc/crypto-policies/back-ends/opensslcnf.config
ART yum/dnf wrapper [2]: Checking for CI build pod repo definitions...
ART yum/dnf wrapper [2]: Did not detect that this script is running in a CI build pod. Will not install CI repositories.
ART yum/dnf wrapper [2]: Installed repos that can be used when connected to the VPN.
ART yum/dnf wrapper [2]: DNF will search for repo files in: /etc/yum.repos.art/localdev
rhel-9-appstream-rpms-x86_64 1.0 MB/s | 79 MB 01:18
rhel-9-appstream-rpms-aarch64 934 kB/s | 86 MB 01:34
rhel-9-appstream-rpms-s390x 956 kB/s | 75 MB 01:20
rhel-9-appstream-rpms-ppc64le 644 kB/s | 69 MB 01:49
rhel-9-baseos-rpms-x86_64 1.2 MB/s | 99 MB 01:22
rhel-9-baseos-rpms-aarch64 1.0 MB/s | 122 MB 02:02
rhel-9-baseos-rpms-s390x 1.1 MB/s | 42 MB 00:39
rhel-9-baseos-rpms-ppc64le 469 kB/s | 59 MB 02:09
rhel-9-codeready-builder-rpms-x86_64 324 kB/s | 15 MB 00:48
rhel-9-codeready-builder-rpms-aarch64 259 kB/s | 11 MB 00:45
rhel-9-codeready-builder-rpms-s390x 841 kB/s | 10 MB 00:12
rhel-9-codeready-builder-rpms-ppc64le 1.0 MB/s | 13 MB 00:12
rhel-9-fast-datapath-rpms-x86_64 155 kB/s | 601 kB 00:03
rhel-9-fast-datapath-rpms-aarch64 145 kB/s | 588 kB 00:04
rhel-9-fast-datapath-rpms-s390x 131 kB/s | 592 kB 00:04
rhel-9-fast-datapath-rpms-ppc64le 139 kB/s | 593 kB 00:04
rhel-9-server-ironic-rpms-x86_64 123 kB/s | 431 kB 00:03
rhel-9-server-ironic-rpms-aarch64 133 kB/s | 431 kB 00:03
rhel-9-server-ironic-rpms-s390x 129 kB/s | 429 kB 00:03
rhel-9-server-ironic-rpms-ppc64le 129 kB/s | 431 kB 00:03
rhel-9-server-ose-rpms-x86_64 454 kB/s | 9.4 MB 00:21
rhel-9-server-ose-rpms-aarch64 784 kB/s | 10 MB 00:13
rhel-9-server-ose-rpms-s390x 471 kB/s | 2.5 MB 00:05
rhel-9-server-ose-rpms-ppc64le 652 kB/s | 3.1 MB 00:04
Last metadata expiration check: 0:00:01 ago on Fri Feb 13 10:38:25 2026.
Package socat-1.7.4.1-6.el9_6.1.x86_64 is already installed.
Package procps-ng-3.3.17-14.el9.x86_64 is already installed.
Package util-linux-2.37.4-21.el9.x86_64 is already installed.
Dependencies resolved.

Package Arch Version Repository Size

Installing:
haproxy28 x86_64 2.8.18-1.rhaos4.22.el9 rhel-9-server-ose-rpms-x86_64 2.4 M
rsyslog x86_64 8.2412.0-1.el9 rhel-9-appstream-rpms-x86_64 821 k
Installing dependencies:
libestr x86_64 0.1.11-4.el9 rhel-9-appstream-rpms-x86_64 29 k
libfastjson x86_64 0.99.9-5.el9 rhel-9-appstream-rpms-x86_64 41 k
logrotate x86_64 3.18.0-9.el9 rhel-9-baseos-rpms-x86_64 79 k
Installing weak dependencies:
rsyslog-logrotate x86_64 8.2412.0-1.el9 rhel-9-appstream-rpms-x86_64 11 k

Transaction Summary

Install 6 Packages

Total download size: 3.3 M
Installed size: 10 M
Downloading Packages:
(1/6): rsyslog-logrotate-8.2412.0-1.el9.x86_64. 8.4 kB/s | 11 kB 00:01
(2/6): libestr-0.1.11-4.el9.x86_64.rpm 21 kB/s | 29 kB 00:01
(3/6): libfastjson-0.99.9-5.el9.x86_64.rpm 26 kB/s | 41 kB 00:01
(4/6): logrotate-3.18.0-9.el9.x86_64.rpm 142 kB/s | 79 kB 00:00
(5/6): rsyslog-8.2412.0-1.el9.x86_64.rpm 419 kB/s | 821 kB 00:01
(6/6): haproxy28-2.8.18-1.rhaos4.22.el9.x86_64. 601 kB/s | 2.4 MB 00:04

Total 604 kB/s | 3.3 MB 00:05
Running transaction check
Transaction check succeeded.
Running transaction test
Transaction test succeeded.
Running transaction
Preparing : 1/1
Running scriptlet: logrotate-3.18.0-9.el9.x86_64 1/6
Installing : logrotate-3.18.0-9.el9.x86_64 1/6
Running scriptlet: logrotate-3.18.0-9.el9.x86_64 1/6
Created symlink /etc/systemd/system/timers.target.wants/logrotate.timer → /usr/lib/systemd/system/logrotate.timer.

Installing : libestr-0.1.11-4.el9.x86_64 2/6
Installing : libfastjson-0.99.9-5.el9.x86_64 3/6
Installing : rsyslog-logrotate-8.2412.0-1.el9.x86_64 4/6
Installing : rsyslog-8.2412.0-1.el9.x86_64 5/6
Running scriptlet: rsyslog-8.2412.0-1.el9.x86_64 5/6
Created symlink /etc/systemd/system/multi-user.target.wants/rsyslog.service → /usr/lib/systemd/system/rsyslog.service.

Running scriptlet: haproxy28-2.8.18-1.rhaos4.22.el9.x86_64 6/6
Installing : haproxy28-2.8.18-1.rhaos4.22.el9.x86_64 6/6
Running scriptlet: haproxy28-2.8.18-1.rhaos4.22.el9.x86_64 6/6
Verifying : libfastjson-0.99.9-5.el9.x86_64 1/6
Verifying : libestr-0.1.11-4.el9.x86_64 2/6
Verifying : rsyslog-logrotate-8.2412.0-1.el9.x86_64 3/6
Verifying : rsyslog-8.2412.0-1.el9.x86_64 4/6
Verifying : logrotate-3.18.0-9.el9.x86_64 5/6
Verifying : haproxy28-2.8.18-1.rhaos4.22.el9.x86_64 6/6
Installed products updated.

Installed:
haproxy28-2.8.18-1.rhaos4.22.el9.x86_64
libestr-0.1.11-4.el9.x86_64
libfastjson-0.99.9-5.el9.x86_64
logrotate-3.18.0-9.el9.x86_64
rsyslog-8.2412.0-1.el9.x86_64
rsyslog-logrotate-8.2412.0-1.el9.x86_64

Complete!
ART yum/dnf wrapper [166]: DNF will search for repo files in: /etc/yum.repos.art/localdev
176 files removed
--> 6e4b6b119c82
[3/3] STEP 3/10: COPY images/router/haproxy/ /var/lib/haproxy/
--> b67a7efe03c6
[3/3] STEP 4/10: COPY --from=test-extension-builder /go/src/github.com/openshift/router/tests-extension/bin/router-test-extension.tar.gz /usr/bin/
--> 5b211698d46d
[3/3] STEP 5/10: LABEL io.k8s.display-name="OpenShift HAProxy Router" io.k8s.description="This component offers ingress to an OpenShift cluster via Ingress and Route rules." io.openshift.tags="openshift,router,haproxy"
--> 71232327237a
[3/3] STEP 6/10: USER 1001
--> 6497ae01e29e
[3/3] STEP 7/10: EXPOSE 80 443
--> c3d158e962b2
[3/3] STEP 8/10: WORKDIR /var/lib/haproxy/conf
--> 74f1f15405d5
[3/3] STEP 9/10: ENV TEMPLATE_FILE=/var/lib/haproxy/conf/haproxy-config.template RELOAD_SCRIPT=/var/lib/haproxy/reload-haproxy
--> 6dae8a82f0fa
[3/3] STEP 10/10: ENTRYPOINT ["/usr/bin/openshift-router", "--v=2"]
[3/3] COMMIT router:test
--> 3b200556b4be
Successfully tagged localhost/router:test
3b200556b4bee8ba3fc14a7292f54dfa930b06bc862613782ffa2e28b78a63c2

[minl@minl-thinkpadt14sgen1 router]$ podman run --rm --entrypoint ls router:test -lh /usr/bin/router-test-extension.tar.gz
-rw-r--r--. 1 root root 121M Feb 13 10:16 /usr/bin/router-test-extension.tar.gz
[minl@minl-thinkpadt14sgen1 router]$ podman run --rm --entrypoint cat router:test /usr/bin/router-test-extension.tar.gz > /tmp/router-test-extension.tar.gz

[minl@minl-thinkpadt14sgen1 router]$ tar -xzf /tmp/router-test-extension.tar.gz

[minl@minl-thinkpadt14sgen1 router]$ ./router-tests-ext list | grep sig- | wc -l
293

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 13, 2026

@ming1013: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-agnostic 6627f50 link true /test e2e-agnostic

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant