|
| 1 | +workflow: |
| 2 | + as: hypershift-kubevirt-baremetalds-conformance-cilium |
| 3 | + documentation: |- |
| 4 | + Executes tests against a new ephemeral HyperShift cluster with Cilium CNI. |
| 5 | + Administrative access to the control plane is provided via the `KUBECONFIG` |
| 6 | + environment variable. |
| 7 | +
|
| 8 | + Learn more about HyperShift here: https://github.com/openshift/hypershift |
| 9 | +
|
| 10 | + Track HyperShift's development here: https://issues.redhat.com/projects/HOSTEDCP |
| 11 | + steps: |
| 12 | + post: |
| 13 | + - chain: hypershift-dump |
| 14 | + - chain: gather-core-dump |
| 15 | + - chain: hypershift-kubevirt-destroy |
| 16 | + - chain: baremetalds-ipi-post |
| 17 | + test: |
| 18 | + - chain: hypershift-conformance |
| 19 | + pre: |
| 20 | + - chain: baremetalds-ipi-pre |
| 21 | + - ref: enable-qe-catalogsource |
| 22 | + - chain: hypershift-kubevirt-baremetalds-lvm |
| 23 | + - chain: hypershift-kubevirt-baremetalds-metallb |
| 24 | + - chain: hypershift-kubevirt-baremetalds-odf |
| 25 | + - ref: hypershift-kubevirt-install |
| 26 | + - ref: hypershift-install |
| 27 | + - ref: hypershift-kubevirt-create |
| 28 | + - ref: hypershift-kubevirt-baremetalds-proxy |
| 29 | + - ref: hypershift-kubevirt-health-check-nodecount |
| 30 | + - ref: cucushift-hypershift-extended-cilium |
| 31 | + - ref: cucushift-hypershift-extended-cilium-health-check |
| 32 | + env: |
| 33 | + HYPERSHIFT_NETWORK_TYPE: "Other" # Required for Cilium. |
| 34 | + METALLB_OPERATOR_SUB_SOURCE: qe-app-registry |
| 35 | + LOCAL_STORAGE_OPERATOR_SUB_SOURCE: qe-app-registry |
| 36 | + LVM_OPERATOR_SUB_CHANNEL: stable-4.19 |
| 37 | + LVM_OPERATOR_SUB_SOURCE: qe-app-registry |
| 38 | + LVM_OPERATOR_SUB_INSTALL_NAMESPACE: openshift-lvm-storage |
| 39 | + ODF_OPERATOR_SUB_SOURCE: redhat-operators-v4-18 |
| 40 | + ETCD_STORAGE_CLASS: lvms-vg1 |
| 41 | + TEST_SKIPS: Netpol NetworkPolicy between server and client should allow egress |
| 42 | + access to server in CIDR block \[Feature:NetworkPolicy\] \[Suite:openshift/conformance/parallel\] |
| 43 | + \[Suite:k8s\]\| Netpol NetworkPolicy between server and client should ensure |
| 44 | + an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed \[Feature:NetworkPolicy\] |
| 45 | + \[Suite:openshift/conformance/parallel\] \[Suite:k8s\]\| Services should serve |
| 46 | + endpoints on same port and different protocols \[Conformance\] \[Suite:openshift/conformance/parallel/minimal\] |
| 47 | + \[Suite:k8s\]\| Netpol NetworkPolicy between server and client should enforce |
| 48 | + except clause while egress access to server in CIDR block \[Feature:NetworkPolicy\] |
| 49 | + \[Suite:openshift/conformance/parallel\] \[Suite:k8s\]\| Unidling \[apigroup:apps.openshift.io\]\[apigroup:route.openshift.io\] |
| 50 | + should work with UDP \[Suite:openshift/conformance/parallel\]\| Unidling with |
| 51 | + Deployments \[apigroup:route.openshift.io\] should work with TCP (when fully |
| 52 | + idled) \[Suite:openshift/conformance/parallel\]\| Unidling \[apigroup:apps.openshift.io\]\[apigroup:route.openshift.io\] |
| 53 | + should work with TCP (when fully idled) \[Suite:openshift/conformance/parallel\]\| |
| 54 | + Unidling with Deployments \[apigroup:route.openshift.io\] should work with |
| 55 | + UDP \[Suite:openshift/conformance/parallel\]\| DNS should answer queries using |
| 56 | + the local DNS endpoint \[Suite:openshift/conformance/parallel\] \| \[Feature:bond\] \| StatefulSet Basic \| StatefulSet Non-retain |
| 57 | + PACKET_OS: rocky_9 |
| 58 | + DEVSCRIPTS_CONFIG: | |
| 59 | + IP_STACK=v4 |
| 60 | + NETWORK_TYPE=OVNKubernetes |
| 61 | + NUM_WORKERS=0 |
| 62 | + NUM_MASTERS=3 |
| 63 | + MASTER_VCPU=16 |
| 64 | + MASTER_MEMORY=81920 |
| 65 | + VM_EXTRADISKS=true |
| 66 | + VM_EXTRADISKS_LIST="vda vdb" |
| 67 | + VM_EXTRADISKS_SIZE=250G |
0 commit comments