Skip to content

Commit 10ff6f4

Browse files
committed
UPSTREAM: <carry>: Remove no-longer-matched annotation rules
1 parent a3f31a4 commit 10ff6f4

File tree

1 file changed

+3
-100
lines changed

1 file changed

+3
-100
lines changed

openshift-hack/e2e/annotate/rules.go

+3-100
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,6 @@ var (
1515
`\[Feature:WatchList\]`,
1616
`\[Feature:ServiceCIDRs\]`,
1717
`\[Feature:ClusterTrustBundle\]`,
18-
`\[Feature:SELinuxMount\]`,
1918
`\[FeatureGate:SELinuxMount\]`,
2019
`\[Feature:RelaxedEnvironmentVariableValidation\]`,
2120
`\[Feature:UserNamespacesPodSecurityStandards\]`,
@@ -25,14 +24,7 @@ var (
2524
},
2625
// tests for features that are not implemented in openshift
2726
"[Disabled:Unimplemented]": {
28-
`Monitoring`, // Not installed, should be
29-
`Cluster level logging`, // Not installed yet
30-
`Kibana`, // Not installed
31-
`Ubernetes`, // Can't set zone labels today
32-
`kube-ui`, // Not installed by default
33-
`Kubernetes Dashboard`, // Not installed by default (also probably slow image pull)
34-
`should proxy to cadvisor`, // we don't expose cAdvisor port directly for security reasons
35-
`\[Feature:BootstrapTokens\]`, // we don't serve cluster-info configmap
27+
`\[Feature:BootstrapTokens\]`, // we don't serve cluster-info configmap
3628
`\[Feature:KubeProxyDaemonSetMigration\]`, // upgrades are run separately
3729
`\[Feature:BoundServiceAccountTokenVolume\]`, // upgrades are run separately
3830
`\[Feature:StatefulUpgrade\]`, // upgrades are run separately
@@ -41,19 +33,14 @@ var (
4133
"[Disabled:SpecialConfig]": {
4234
// GPU node needs to be available
4335
`\[Feature:GPUDevicePlugin\]`,
44-
`\[sig-scheduling\] GPUDevicePluginAcrossRecreate \[Feature:Recreate\]`,
4536

4637
`\[Feature:LocalStorageCapacityIsolation\]`, // relies on a separate daemonset?
4738
`\[sig-cloud-provider-gcp\]`, // these test require a different configuration - note that GCE tests from the sig-cluster-lifecycle were moved to the sig-cloud-provider-gcpcluster lifecycle see https://github.com/kubernetes/kubernetes/commit/0b3d50b6dccdc4bbd0b3e411c648b092477d79ac#diff-3b1910d08fb8fd8b32956b5e264f87cb
4839

4940
`kube-dns-autoscaler`, // Don't run kube-dns
50-
`should check if Kubernetes master services is included in cluster-info`, // Don't run kube-dns
51-
`DNS configMap`, // this tests dns federation configuration via configmap, which we don't support yet
41+
`DNS configMap`, // this tests dns federation configuration via configmap, which we don't support yet
5242

53-
`NodeProblemDetector`, // requires a non-master node to run on
54-
`Advanced Audit should audit API calls`, // expects to be able to call /logs
55-
56-
`Firewall rule should have correct firewall rules for e2e cluster`, // Upstream-install specific
43+
`NodeProblemDetector`, // requires a non-master node to run on
5744

5845
// https://bugzilla.redhat.com/show_bug.cgi?id=2079958
5946
`\[sig-network\] \[Feature:Topology Hints\] should distribute endpoints evenly`,
@@ -67,14 +54,12 @@ var (
6754
// always add an issue here
6855
"[Disabled:Broken]": {
6956
`mount an API token into pods`, // We add 6 secrets, not 1
70-
`ServiceAccounts should ensure a single API token exists`, // We create lots of secrets
7157
`unchanging, static URL paths for kubernetes api services`, // the test needs to exclude URLs that are not part of conformance (/logs)
7258
`Services should be able to up and down services`, // we don't have wget installed on nodes
7359
`KubeProxy should set TCP CLOSE_WAIT timeout`, // the test require communication to port 11302 in the cluster nodes
7460
`should check kube-proxy urls`, // previously this test was skipped b/c we reported -1 as the number of nodes, now we report proper number and test fails
7561
`SSH`, // TRIAGE
7662
`should implement service.kubernetes.io/service-proxy-name`, // this is an optional test that requires SSH. sig-network
77-
`recreate nodes and ensure they function upon restart`, // https://bugzilla.redhat.com/show_bug.cgi?id=1756428
7863
`\[Driver: iscsi\]`, // https://bugzilla.redhat.com/show_bug.cgi?id=1711627
7964

8065
"RuntimeClass should reject",
@@ -85,7 +70,6 @@ var (
8570

8671
// TODO(node): configure the cri handler for the runtime class to make this work
8772
"should run a Pod requesting a RuntimeClass with a configured handler",
88-
"should reject a Pod requesting a RuntimeClass with conflicting node selector",
8973
"should run a Pod requesting a RuntimeClass with scheduling",
9074

9175
// A fix is in progress: https://github.com/openshift/origin/pull/24709
@@ -98,9 +82,6 @@ var (
9882
"MetricsGrabber should grab all metrics from a ControllerManager",
9983
"MetricsGrabber should grab all metrics from a Scheduler",
10084

101-
// https://bugzilla.redhat.com/show_bug.cgi?id=1906808
102-
`ServiceAccounts should support OIDC discovery of service account issuer`,
103-
10485
// NFS umount is broken in kernels 5.7+
10586
// https://bugzilla.redhat.com/show_bug.cgi?id=1854379
10687
`\[sig-storage\].*\[Driver: nfs\] \[Testpattern: Dynamic PV \(default fs\)\].*subPath should be able to unmount after the subpath directory is deleted`,
@@ -123,14 +104,8 @@ var (
123104
`Netpol \[LinuxOnly\] NetworkPolicy between server and client using UDP should enforce policy based on Ports`,
124105
`Netpol \[LinuxOnly\] NetworkPolicy between server and client using UDP should enforce policy to allow traffic only from a pod in a different namespace based on PodSelector and NamespaceSelector`,
125106

126-
`Topology Hints should distribute endpoints evenly`,
127-
128107
// https://bugzilla.redhat.com/show_bug.cgi?id=1908645
129108
`\[sig-network\] Networking Granular Checks: Services should function for service endpoints using hostNetwork`,
130-
`\[sig-network\] Networking Granular Checks: Services should function for pod-Service\(hostNetwork\)`,
131-
132-
// https://bugzilla.redhat.com/show_bug.cgi?id=1952460
133-
`\[sig-network\] Firewall rule control plane should not expose well-known ports`,
134109

135110
// https://bugzilla.redhat.com/show_bug.cgi?id=1988272
136111
`\[sig-network\] Networking should provide Internet connection for containers \[Feature:Networking-IPv6\]`,
@@ -145,9 +120,6 @@ var (
145120
// https://bugzilla.redhat.com/show_bug.cgi?id=1953478
146121
`\[sig-storage\] Dynamic Provisioning Invalid AWS KMS key should report an error and create no PV`,
147122

148-
// https://issues.redhat.com/browse/OCPBUGS-34577
149-
`\[sig-storage\] Multi-AZ Cluster Volumes should schedule pods in the same zones as statically provisioned PVs`,
150-
151123
// https://issues.redhat.com/browse/OCPBUGS-34594
152124
`\[sig-node\] \[Feature:PodLifecycleSleepAction\] when create a pod with lifecycle hook using sleep action valid prestop hook using sleep action`,
153125

@@ -166,16 +138,6 @@ var (
166138
},
167139
// tests that may work, but we don't support them
168140
"[Disabled:Unsupported]": {
169-
`\[Driver: rbd\]`, // OpenShift 4.x does not support Ceph RBD (use CSI instead)
170-
`\[Driver: ceph\]`, // OpenShift 4.x does not support CephFS (use CSI instead)
171-
`\[Driver: gluster\]`, // OpenShift 4.x does not support Gluster
172-
`Volumes GlusterFS`, // OpenShift 4.x does not support Gluster
173-
`GlusterDynamicProvisioner`, // OpenShift 4.x does not support Gluster
174-
175-
// Skip vSphere-specific storage tests. The standard in-tree storage tests for vSphere
176-
// (prefixed with `In-tree Volumes [Driver: vsphere]`) are enough for testing this plugin.
177-
// https://bugzilla.redhat.com/show_bug.cgi?id=2019115
178-
`\[sig-storage\].*\[Feature:vsphere\]`,
179141
// Also, our CI doesn't support topology, so disable those tests
180142
`\[sig-storage\] In-tree Volumes \[Driver: vsphere\] \[Testpattern: Dynamic PV \(delayed binding\)\] topology should fail to schedule a pod which has topologies that conflict with AllowedTopologies`,
181143
`\[sig-storage\] In-tree Volumes \[Driver: vsphere\] \[Testpattern: Dynamic PV \(delayed binding\)\] topology should provision a volume and schedule a pod with AllowedTopologies`,
@@ -184,7 +146,6 @@ var (
184146
},
185147
// tests too slow to be part of conformance
186148
"[Slow]": {
187-
`\[sig-scalability\]`, // disable from the default set for now
188149
`should create and stop a working application`, // Inordinately slow tests
189150

190151
`\[Feature:PerformanceDNS\]`, // very slow
@@ -194,25 +155,13 @@ var (
194155
// tests that are known flaky
195156
"[Flaky]": {
196157
`Job should run a job to completion when tasks sometimes fail and are not locally restarted`, // seems flaky, also may require too many resources
197-
// TODO(node): test works when run alone, but not in the suite in CI
198-
`\[Feature:HPA\] Horizontal pod autoscaling \(scale resource: CPU\) \[sig-autoscaling\] ReplicationController light Should scale from 1 pod to 2 pods`,
199158
},
200159
// tests that must be run without competition
201160
"[Serial]": {
202161
`\[Disruptive\]`,
203-
`\[Feature:Performance\]`, // requires isolation
204162

205163
`Service endpoints latency`, // requires low latency
206164
`Clean up pods on node`, // schedules up to max pods per node
207-
`DynamicProvisioner should test that deleting a claim before the volume is provisioned deletes the volume`, // test is very disruptive to other tests
208-
209-
`Should be able to support the 1\.7 Sample API Server using the current Aggregator`, // down apiservices break other clients today https://bugzilla.redhat.com/show_bug.cgi?id=1623195
210-
211-
`\[Feature:HPA\] Horizontal pod autoscaling \(scale resource: CPU\) \[sig-autoscaling\] ReplicationController light Should scale from 1 pod to 2 pods`,
212-
213-
`should prevent Ingress creation if more than 1 IngressClass marked as default`, // https://bugzilla.redhat.com/show_bug.cgi?id=1822286
214-
215-
`\[sig-network\] IngressClass \[Feature:Ingress\] should set default value on new IngressClass`, //https://bugzilla.redhat.com/show_bug.cgi?id=1833583
216165
},
217166
// Tests that don't pass on disconnected, either due to requiring
218167
// internet access for GitHub (e.g. many of the s2i builds), or
@@ -245,33 +194,14 @@ var (
245194
`\[Feature:LoadBalancer\]`,
246195
},
247196
"[Skipped:gce]": {
248-
// Requires creation of a different compute instance in a different zone and is not compatible with volumeBindingMode of WaitForFirstConsumer which we use in 4.x
249-
`\[sig-storage\] Multi-AZ Cluster Volumes should only be allowed to provision PDs in zones where nodes exist`,
250-
251197
// The following tests try to ssh directly to a node. None of our nodes have external IPs
252-
`\[k8s.io\] \[sig-node\] crictl should be able to run crictl on the node`,
253198
`\[sig-storage\] Flexvolumes should be mountable`,
254-
`\[sig-storage\] Detaching volumes should not work when mount is in progress`,
255-
256-
// We are using ovn-kubernetes to conceal metadata
257-
`\[sig-auth\] Metadata Concealment should run a check-metadata-concealment job to completion`,
258-
259-
// https://bugzilla.redhat.com/show_bug.cgi?id=1740959
260-
`\[sig-api-machinery\] AdmissionWebhook should be able to deny pod and configmap creation`,
261199

262200
// https://bugzilla.redhat.com/show_bug.cgi?id=1745720
263201
`\[sig-storage\] CSI Volumes \[Driver: pd.csi.storage.gke.io\]`,
264202

265-
// https://bugzilla.redhat.com/show_bug.cgi?id=1749882
266-
`\[sig-storage\] CSI Volumes CSI Topology test using GCE PD driver \[Serial\]`,
267-
268203
// https://bugzilla.redhat.com/show_bug.cgi?id=1751367
269204
`gce-localssd-scsi-fs`,
270-
271-
// https://bugzilla.redhat.com/show_bug.cgi?id=1750851
272-
// should be serial if/when it's re-enabled
273-
`\[HPA\] Horizontal pod autoscaling \(scale resource: Custom Metrics from Stackdriver\)`,
274-
`\[Feature:CustomMetricsAutoscaling\]`,
275205
},
276206
"[Skipped:ibmcloud]": {
277207
// LoadBalancer tests in 1.31 require explicit platform-specific skips
@@ -304,30 +234,6 @@ var (
304234
`\[Feature:LoadBalancer\]`,
305235
},
306236

307-
"[sig-node]": {
308-
`\[NodeConformance\]`,
309-
`NodeLease`,
310-
`lease API`,
311-
`\[NodeFeature`,
312-
`\[NodeAlphaFeature`,
313-
`Probing container`,
314-
`Security Context When creating a`,
315-
`Downward API should create a pod that prints his name and namespace`,
316-
`Liveness liveness pods should be automatically restarted`,
317-
`Secret should create a pod that reads a secret`,
318-
`Pods should delete a collection of pods`,
319-
`Pods should run through the lifecycle of Pods and PodStatus`,
320-
},
321-
"[sig-cluster-lifecycle]": {
322-
`Feature:ClusterAutoscalerScalability`,
323-
`recreate nodes and ensure they function`,
324-
},
325-
"[sig-arch]": {
326-
// not run, assigned to arch as catch-all
327-
`\[Feature:GKELocalSSD\]`,
328-
`\[Feature:GKENodePool\]`,
329-
},
330-
331237
// These tests are skipped when openshift-tests needs to use a proxy to reach the
332238
// cluster -- either because the test won't work while proxied, or because the test
333239
// itself is testing a functionality using it's own proxy.
@@ -362,8 +268,6 @@ var (
362268
`\[sig-node\] NoExecuteTaintManager Multiple Pods \[Serial\] evicts pods with minTolerationSeconds \[Disruptive\] \[Conformance\]`,
363269
`\[sig-node\] NoExecuteTaintManager Multiple Pods \[Serial\] only evicts pods without tolerations from tainted nodes`,
364270
`\[sig-cli\] Kubectl client Kubectl taint \[Serial\] should remove all the taints with the same key off a node`,
365-
`\[sig-network\] LoadBalancers should be able to preserve UDP traffic when server pod cycles for a LoadBalancer service on different nodes`,
366-
`\[sig-network\] LoadBalancers should be able to preserve UDP traffic when server pod cycles for a LoadBalancer service on the same nodes`,
367271
`\[sig-architecture\] Conformance Tests should have at least two untainted nodes`,
368272
},
369273

@@ -372,7 +276,6 @@ var (
372276
// Requires CSISnapshot capability
373277
`\[Feature:VolumeSnapshotDataSource\]`,
374278
// Requires Storage capability
375-
`\[Driver: aws\]`,
376279
`\[Feature:StorageProvider\]`,
377280
},
378281

0 commit comments

Comments
 (0)