Skip to content

Commit a3db6b0

Browse files
committed
cert tests: mark TLS certificate tests as informing
Add ote.Informing() to both certificate tests so that failures are recorded but don't block CI jobs: - all tls artifacts must be registered - all registered tls artifacts must have no metadata violation regressions This allows the tests to continue gathering data without blocking development while certificates are being properly registered and metadata is being fixed.
1 parent 1e1a521 commit a3db6b0

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

test/extended/operators/certs.go

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ import (
2626

2727
g "github.com/onsi/ginkgo/v2"
2828
o "github.com/onsi/gomega"
29+
ote "github.com/openshift-eng/openshift-tests-extension/pkg/ginkgo"
2930

3031
"github.com/openshift/library-go/pkg/certs/cert-inspection/certgraphanalysis"
3132
"github.com/openshift/library-go/pkg/certs/cert-inspection/certgraphapi"
@@ -166,7 +167,7 @@ var _ = g.Describe(fmt.Sprintf("[sig-arch][Late][Jira:%q]", "kube-apiserver"), g
166167
o.Expect(err).NotTo(o.HaveOccurred())
167168
})
168169

169-
g.It("all tls artifacts must be registered", func() {
170+
g.It("all tls artifacts must be registered", ote.Informing(), func() {
170171

171172
violationsPKIContent, err := certs.GetPKIInfoFromEmbeddedOwnership(ownership.PKIViolations)
172173
o.Expect(err).NotTo(o.HaveOccurred())
@@ -275,7 +276,7 @@ var _ = g.Describe(fmt.Sprintf("[sig-arch][Late][Jira:%q]", "kube-apiserver"), g
275276
}
276277
})
277278

278-
g.It("all registered tls artifacts must have no metadata violation regressions", func() {
279+
g.It("all registered tls artifacts must have no metadata violation regressions", ote.Informing(), func() {
279280
violationRegressionOptions := ensure_no_violation_regression.NewEnsureNoViolationRegressionOptions(ownership.AllViolations, genericclioptions.NewTestIOStreamsDiscard())
280281
messages, _, err := violationRegressionOptions.HaveViolationsRegressed([]*certgraphapi.PKIList{actualPKIContent})
281282
o.Expect(err).NotTo(o.HaveOccurred())

0 commit comments

Comments
 (0)