diff --git a/test/extended/oauth/requestheaders.go b/test/extended/oauth/requestheaders.go index 9147b51c311e..4e6311c5adc5 100644 --- a/test/extended/oauth/requestheaders.go +++ b/test/extended/oauth/requestheaders.go @@ -62,20 +62,20 @@ var _ = g.Describe("[Serial] [sig-auth][Feature:OAuthServer] [RequestHeaders] [I var oc = exutil.NewCLI("request-headers") g.It("test RequestHeaders IdP [apigroup:config.openshift.io][apigroup:user.openshift.io]", func() { - - // In some rare cases, CAO might be damaged when entering this test. If it is - the results - // of this test might flaky. This check ensures that we capture such situation early and - // investigate why it wasn't ready before this test. - e2e.Logf("Ensuring CAO is available==True, progressing==False, degraded==False") - waitForAuthenticationProgressing(oc, configv1.ConditionFalse) - controlPlaneTopology, err := exutil.GetControlPlaneTopology(oc) o.Expect(err).NotTo(o.HaveOccurred()) + // Skip the test if the controle plane topology is External if *controlPlaneTopology == configv1.ExternalTopologyMode { e2eskipper.Skipf("External clusters do not allow customization of the Identity Providers for the cluster.") } + // In some rare cases, CAO might be damaged when entering this test. If it is - the results + // of this test might flaky. This check ensures that we capture such situation early and + // investigate why it wasn't ready before this test. + e2e.Logf("Ensuring CAO is available==True, progressing==False, degraded==False") + waitForAuthenticationProgressing(oc, configv1.ConditionFalse) + caCert, caKey := createClientCA(oc.AdminKubeClient().CoreV1()) defer oc.AdminKubeClient().CoreV1().ConfigMaps("openshift-config").Delete(context.Background(), clientCAName, metav1.DeleteOptions{})