Skip to content

Conversation

@jianzhangbjz
Copy link
Member

As the title shows, I specify the openshift-community-operators ClusterCatalog for case 83026 to avoid the conflict issue:

            {
                "lastTransitionTime": "2025-12-11T09:03:09Z",
                "message": "error walking catalogs: error getting package \"argocd-operator\" from catalog \"clustercatalog-75501\": catalog \"clustercatalog-75501\" is not being served",
                "observedGeneration": 1,
                "reason": "Retrying",
                "status": "True",
                "type": "Progressing"
            },

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Dec 15, 2025
@openshift-ci-robot
Copy link

openshift-ci-robot commented Dec 15, 2025

@jianzhangbjz: This pull request references OCPQE-31263 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the sub-task to target the "4.22.0" version, but no target version was set.

Details

In response to this:

As the title shows, I specify the openshift-community-operators ClusterCatalog for case 83026 to avoid the conflict issue:

           {
               "lastTransitionTime": "2025-12-11T09:03:09Z",
               "message": "error walking catalogs: error getting package \"argocd-operator\" from catalog \"clustercatalog-75501\": catalog \"clustercatalog-75501\" is not being served",
               "observedGeneration": 1,
               "reason": "Retrying",
               "status": "True",
               "type": "Progressing"
           },

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@jianzhangbjz
Copy link
Member Author

Test passed.

jiazha-mac:tests-extension jiazha$ ./bin/olmv1-tests-ext run-test "[sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[OTP][Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource unknown change and refusing to determine that change is safe"
  [INFO] [env] Using kubeconfig: /Users/jiazha/21-kubeconfig
  [INFO] [env] Cluster environment initialized (OpenShift: true)
  I1215 14:39:44.773505 64689 test_context.go:567] The --provider flag is not set. Continuing as if --provider=skeleton had been used.
  Running Suite:  - /Users/jiazha/goproject/operator-framework-operator-controller/openshift/tests-extension
  ==========================================================================================================
  Random Seed: 1765780782 - will randomize all specs

  Will run 1 of 1 specs
  ------------------------------
  [sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[OTP][Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource unknown change and refusing to determine that change is safe [NonHyperShiftHOST, original-name:[sig-olmv1][Jira:OLM] clusterextension PolarionID:83026-[Skipped:Disconnected]clusterextension updates sometimes failed with the following error from the CRDUpgradeCheck resource unknown change and refusing to determine that change is safe]
  /Users/jiazha/goproject/operator-framework-operator-controller/openshift/tests-extension/test/qe/specs/olmv1_ce.go:1458
    STEP: Creating a kubernetes client @ 12/15/25 14:39:44.778
  I1215 14:39:49.784874 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig explain template.apiVersion'
    STEP: 1)install Argocd operator v0.4.0 in a random namespace @ 12/15/25 14:39:51.796
  I1215 14:39:51.796193 64689 client.go:349] do not know if it is external oidc cluster or not, and try to check it again
  I1215 14:39:51.796292 64689 client.go:753] showInfo is true
  I1215 14:39:51.796303 64689 client.go:755] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get authentication/cluster -o=jsonpath={.spec.type}'
  I1215 14:39:52.803352 64689 clusters.go:568] Found authentication type used: 
  I1215 14:39:55.403118 64689 client.go:200] configPath is now "/var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/configfile1574779820"
  I1215 14:39:55.403160 64689 client.go:363] The user is now "e2e-test-default-jc7ck-user"
  I1215 14:39:55.403173 64689 client.go:366] Creating project "e2e-test-default-jc7ck"
  I1215 14:39:55.829265 64689 client.go:375] Waiting on permissions in project "e2e-test-default-jc7ck" ...
  I1215 14:39:56.735426 64689 client.go:436] Waiting for ServiceAccount "default" to be provisioned...
  I1215 14:39:57.133511 64689 client.go:436] Waiting for ServiceAccount "builder" to be provisioned...
  I1215 14:39:57.528485 64689 client.go:436] Waiting for ServiceAccount "deployer" to be provisioned...
  I1215 14:39:57.921523 64689 client.go:446] Waiting for RoleBinding "system:image-builders" to be provisioned...
  I1215 14:39:58.215683 64689 client.go:446] Waiting for RoleBinding "system:deployers" to be provisioned...
  I1215 14:39:58.508100 64689 client.go:446] Waiting for RoleBinding "system:image-pullers" to be provisioned...
  I1215 14:39:59.104805 64689 client.go:477] Project "e2e-test-default-jc7ck" has been fully provisioned.
  I1215 14:39:59.105023 64689 sa-clusterrolebinding.go:34] =========Create sacrb argocd-83026=========
  I1215 14:39:59.105045 64689 sa-clusterrolebinding.go:58] =========CreateWithoutCheck sacrb argocd-83026=========
  I1215 14:40:02.106974 64689 client.go:753] showInfo is true
  I1215 14:40:02.107310 64689 client.go:755] Running 'oc --namespace=e2e-test-default-jc7ck --kubeconfig=/Users/jiazha/21-kubeconfig process -n default --ignore-unknown-parameters=true -f /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/fixture-testdata-dir2023700796/test/qe/testdata/olm/sa-admin.yaml -p NAME=argocd-83026 NAMESPACE=e2e-test-default-jc7ck'
  I1215 14:40:02.959586 64689 template.go:128] generated resource configuration file: /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/e2e-test-default-jc7ck-2ccecb96config.json.stdout
  I1215 14:40:02.959894 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig apply -f /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/e2e-test-default-jc7ck-2ccecb96config.json.stdout'
  clusterrole.rbac.authorization.k8s.io/argocd-83026-installer-admin-clusterrole created
  serviceaccount/argocd-83026 created
  clusterrolebinding.rbac.authorization.k8s.io/argocd-83026-installer-admin-clusterrole-binding created
  I1215 14:40:09.519999 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get ServiceAccount argocd-83026 -n e2e-test-default-jc7ck'
  I1215 14:40:10.353021 64689 tools.go:379] output: NAME           SECRETS   AGE
  argocd-83026   1         6s
  I1215 14:40:14.355524 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get ClusterRole argocd-83026-installer-admin-clusterrole'
  I1215 14:40:15.182627 64689 tools.go:379] output: NAME                                       CREATED AT
  argocd-83026-installer-admin-clusterrole   2025-12-15T06:40:04Z
  I1215 14:40:19.185700 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get ClusterRoleBinding argocd-83026-installer-admin-clusterrole-binding'
  I1215 14:40:19.988159 64689 tools.go:379] output: NAME                                               ROLE                                                   AGE
  argocd-83026-installer-admin-clusterrole-binding   ClusterRole/argocd-83026-installer-admin-clusterrole   14s
  I1215 14:40:19.988590 64689 clusterextension.go:43] =========Create clusterextension extension-argocd-83026=========
  I1215 14:40:19.988642 64689 clusterextension.go:64] =========CreateWithoutCheck clusterextension extension-argocd-83026=========
  I1215 14:40:22.991373 64689 client.go:753] showInfo is true
  I1215 14:40:22.991628 64689 client.go:755] Running 'oc --namespace=e2e-test-default-jc7ck --kubeconfig=/Users/jiazha/21-kubeconfig process -n default --ignore-unknown-parameters=true -f /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/fixture-testdata-dir2023700796/test/qe/testdata/olm/clusterextension-withselectorlabel.yaml -p NAME=extension-argocd-83026 PACKAGE=argocd-operator CHANNEL=alpha VERSION=v0.4.0 INSTALLNAMESPACE=e2e-test-default-jc7ck SANAME=argocd-83026 LABELKEY=olm.operatorframework.io/metadata.name LABELVALUE=openshift-community-operators'
  I1215 14:40:23.833518 64689 template.go:128] generated resource configuration file: /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/e2e-test-default-jc7ck-17678642config.json.stdout
  I1215 14:40:23.834338 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig apply -f /var/folders/5n/w9ysf4w93jnfy7k19xxct31c0000gn/T/e2e-test-default-jc7ck-17678642config.json.stdout'
  clusterextension.olm.operatorframework.io/extension-argocd-83026 created
  I1215 14:40:24.937095 64689 clusterextension.go:169] ========= check clusterextension extension-argocd-83026 Progressing reason expect is Succeeded =========
  I1215 14:40:27.939321 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}'
  I1215 14:40:28.748244 64689 tools.go:343] output is , error is <nil>, and try next
  I1215 14:40:30.940655 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}'
  I1215 14:40:31.803342 64689 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].reason}], the returned resource:Succeeded
  I1215 14:40:31.803524 64689 clusterextension.go:126] ========= wait clusterextension extension-argocd-83026 Installed status is True =========
  I1215 14:40:34.805754 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Installed")].status}'
  I1215 14:40:35.657759 64689 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Installed")].status}], the returned resource:True
  I1215 14:40:35.658019 64689 clusterextension.go:347] =========Get clusterextension extension-argocd-83026 BundleResource =========
  I1215 14:40:35.659288 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.install.bundle.name}'
  I1215 14:40:36.674741 64689 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.install.bundle.name}], the returned resource:argocd-operator.v0.4.0
    STEP: 2)upgrade it to v0.5.0 @ 12/15/25 14:40:36.675
  I1215 14:40:36.675747 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig patch clusterextension extension-argocd-83026 -p {"spec": {"source": {"catalog": {"version": "v0.5.0"}}}} --type=merge'
  clusterextension.olm.operatorframework.io/extension-argocd-83026 patched
  I1215 14:40:37.927884 64689 clusterextension.go:284] ========= wait clusterextension extension-argocd-83026 Progressing message includes Desired state reached =========
  I1215 14:40:43.930111 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].message}'
  I1215 14:40:44.769432 64689 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].message}], the returned resource:Desired state reached
    STEP: 3)upgrade it to v0.7.0 @ 12/15/25 14:40:44.77
  I1215 14:40:44.771055 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig patch clusterextension extension-argocd-83026 -p {"spec": {"source": {"catalog": {"version": "v0.7.0"}}}} --type=merge'
  clusterextension.olm.operatorframework.io/extension-argocd-83026 patched
  I1215 14:40:45.900056 64689 clusterextension.go:284] ========= wait clusterextension extension-argocd-83026 Progressing message includes Desired state reached =========
  I1215 14:40:51.901726 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].message}'
  I1215 14:40:52.894757 64689 tools.go:348] $oc get [clusterextension extension-argocd-83026 -o jsonpath={.status.conditions[?(@.type=="Progressing")].message}], the returned resource:Desired state reached
  I1215 14:40:52.895143 64689 clusterextension.go:385] =========Delete clusterextension extension-argocd-83026=========
  I1215 14:40:52.895242 64689 clusterextension.go:376] =========DeleteWithoutCheck clusterextension extension-argocd-83026=========
  I1215 14:40:52.896337 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig delete clusterextension extension-argocd-83026'
  I1215 14:41:00.205914 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026'
  I1215 14:41:01.186397 64689 client.go:739] Error running /usr/local/bin/oc --kubeconfig=/Users/jiazha/21-kubeconfig get clusterextension extension-argocd-83026:
  Error from server (NotFound): clusterextensions.olm.operatorframework.io "extension-argocd-83026" not found
  I1215 14:41:01.186622 64689 tools.go:410] the resource is delete successfully
  I1215 14:41:01.186884 64689 sa-clusterrolebinding.go:78] =========Delete sacrb argocd-83026=========
  I1215 14:41:01.187492 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig delete ClusterRoleBinding argocd-83026-installer-admin-clusterrole-binding'
  I1215 14:41:06.290375 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get ClusterRoleBinding argocd-83026-installer-admin-clusterrole-binding'
  I1215 14:41:07.144269 64689 client.go:739] Error running /usr/local/bin/oc --kubeconfig=/Users/jiazha/21-kubeconfig get ClusterRoleBinding argocd-83026-installer-admin-clusterrole-binding:
  Error from server (NotFound): clusterrolebindings.rbac.authorization.k8s.io "argocd-83026-installer-admin-clusterrole-binding" not found
  I1215 14:41:07.144439 64689 tools.go:410] the resource is delete successfully
  I1215 14:41:07.144763 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig delete ClusterRole argocd-83026-installer-admin-clusterrole'
  I1215 14:41:12.751460 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get ClusterRole argocd-83026-installer-admin-clusterrole'
  I1215 14:41:13.562427 64689 client.go:739] Error running /usr/local/bin/oc --kubeconfig=/Users/jiazha/21-kubeconfig get ClusterRole argocd-83026-installer-admin-clusterrole:
  Error from server (NotFound): clusterroles.rbac.authorization.k8s.io "argocd-83026-installer-admin-clusterrole" not found
  I1215 14:41:13.562687 64689 tools.go:410] the resource is delete successfully
  I1215 14:41:13.563204 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig delete ServiceAccount argocd-83026 -n e2e-test-default-jc7ck'
  I1215 14:41:18.671755 64689 client.go:729] Running 'oc --kubeconfig=/Users/jiazha/21-kubeconfig get ServiceAccount argocd-83026 -n e2e-test-default-jc7ck'
  I1215 14:41:19.756199 64689 client.go:739] Error running /usr/local/bin/oc --kubeconfig=/Users/jiazha/21-kubeconfig get ServiceAccount argocd-83026 -n e2e-test-default-jc7ck:
  Error from server (NotFound): serviceaccounts "argocd-83026" not found
  I1215 14:41:19.756321 64689 tools.go:410] the resource is delete successfully
  I1215 14:41:20.057559 64689 client.go:522] Deleted {user.openshift.io/v1, Resource=users  e2e-test-default-jc7ck-user}, err: <nil>
  I1215 14:41:20.355482 64689 client.go:522] Deleted {oauth.openshift.io/v1, Resource=oauthclients  e2e-client-e2e-test-default-jc7ck}, err: <nil>
  I1215 14:41:20.661083 64689 client.go:522] Deleted {oauth.openshift.io/v1, Resource=oauthaccesstokens  sha256~puiWMPeULY88u6Kll6JYfgbJj_nVPy-SokE6y5Jihxs}, err: <nil>
    STEP: Destroying namespace "e2e-test-default-jc7ck" for this suite. @ 12/15/25 14:41:20.661
  • [96.182 seconds]
  ------------------------------

  Ran 1 of 1 Specs in 96.183 seconds
  SUCCESS! -- 1 Passed | 0 Failed | 0 Pending | 0 Skipped

@openshift-ci openshift-ci bot requested review from dtfranz and perdasilva December 15, 2025 06:47
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Dec 15, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: jianzhangbjz

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Dec 15, 2025
@jianzhangbjz
Copy link
Member Author

/retest-required

@jianzhangbjz
Copy link
Member Author

/verified by @jianzhangbjz

@openshift-ci-robot openshift-ci-robot added the verified Signifies that the PR passed pre-merge verification criteria label Dec 18, 2025
@openshift-ci-robot
Copy link

@jianzhangbjz: This PR has been marked as verified by @jianzhangbjz.

Details

In response to this:

/verified by @jianzhangbjz

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@jianzhangbjz
Copy link
Member Author

Hi @kuiwang02 @Xia-Zhao-rh , could you help approve it? Thanks!

@Xia-Zhao-rh
Copy link
Contributor

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Dec 18, 2025
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Dec 18, 2025

@jianzhangbjz: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@openshift-merge-bot openshift-merge-bot bot merged commit 3efcc40 into openshift:main Dec 18, 2025
13 checks passed
@jianzhangbjz
Copy link
Member Author

/cherry-pick release-4.21

@openshift-cherrypick-robot

@jianzhangbjz: new pull request created: #591

Details

In response to this:

/cherry-pick release-4.21

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged. verified Signifies that the PR passed pre-merge verification criteria

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants