Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
14 changes: 7 additions & 7 deletions test/extended/oauth/requestheaders.go
Original file line number Diff line number Diff line change
Expand Up @@ -62,20 +62,20 @@ var _ = g.Describe("[Serial] [sig-auth][Feature:OAuthServer] [RequestHeaders] [I
var oc = exutil.NewCLI("request-headers")

g.It("test RequestHeaders IdP [apigroup:config.openshift.io][apigroup:user.openshift.io]", func() {

// In some rare cases, CAO might be damaged when entering this test. If it is - the results
// of this test might flaky. This check ensures that we capture such situation early and
// investigate why it wasn't ready before this test.
e2e.Logf("Ensuring CAO is available==True, progressing==False, degraded==False")
waitForAuthenticationProgressing(oc, configv1.ConditionFalse)

controlPlaneTopology, err := exutil.GetControlPlaneTopology(oc)
o.Expect(err).NotTo(o.HaveOccurred())

// Skip the test if the controle plane topology is External
if *controlPlaneTopology == configv1.ExternalTopologyMode {
e2eskipper.Skipf("External clusters do not allow customization of the Identity Providers for the cluster.")
}

// In some rare cases, CAO might be damaged when entering this test. If it is - the results
// of this test might flaky. This check ensures that we capture such situation early and
// investigate why it wasn't ready before this test.
e2e.Logf("Ensuring CAO is available==True, progressing==False, degraded==False")
waitForAuthenticationProgressing(oc, configv1.ConditionFalse)

caCert, caKey := createClientCA(oc.AdminKubeClient().CoreV1())
defer oc.AdminKubeClient().CoreV1().ConfigMaps("openshift-config").Delete(context.Background(), clientCAName, metav1.DeleteOptions{})

Expand Down