-
Notifications
You must be signed in to change notification settings - Fork 71
Expand file tree
/
Copy pathe2e-template.yml
More file actions
107 lines (106 loc) · 3.22 KB
/
e2e-template.yml
File metadata and controls
107 lines (106 loc) · 3.22 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
# THIS FILE IS GENERATED BY BOILERPLATE. DO NOT EDIT.
apiVersion: template.openshift.io/v1
kind: Template
metadata:
name: osde2e-focused-tests
parameters:
- name: OSDE2E_CONFIGS
required: true
- name: TEST_IMAGE
required: true
- name: OCM_CLIENT_ID
required: false
- name: OCM_CLIENT_SECRET
required: false
- name: OCM_CCS
required: false
- name: AWS_ACCESS_KEY_ID
required: false
- name: AWS_SECRET_ACCESS_KEY
required: false
- name: CLOUD_PROVIDER_REGION
required: false
- name: GCP_CREDS_JSON
required: false
- name: JOBID
generate: expression
from: "[0-9a-z]{7}"
- name: IMAGE_TAG
value: ''
required: true
- name: LOG_BUCKET
value: 'osde2e-logs'
- name: USE_EXISTING_CLUSTER
value: 'TRUE'
- name: CAD_PAGERDUTY_ROUTING_KEY
required: false
objects:
- apiVersion: batch/v1
kind: Job
metadata:
name: osde2e-route-monitor-operator-${IMAGE_TAG}-${JOBID}
spec:
backoffLimit: 0
template:
spec:
restartPolicy: Never
volumes:
- name: route-monitor-operator-sc
secret:
secretName: route-monitor-operator-sc
optional: true
containers:
- name: osde2e
image: quay.io/redhat-services-prod/osde2e-cicada-tenant/osde2e:latest
command:
- /osde2e
args:
- test
- --only-health-check-nodes
- --skip-destroy-cluster
- --skip-must-gather
- --configs
- ${OSDE2E_CONFIGS}
- --secret-locations
- "/etc/external-secrets"
volumeMounts:
- name: route-monitor-operator-sc
readOnly: true
mountPath: "/etc/external-secrets"
resources:
requests:
cpu: "300m"
memory: "600Mi"
limits:
cpu: "1"
memory: "1200Mi"
securityContext:
runAsNonRoot: true
allowPrivilegeEscalation: false
capabilities:
drop: ["ALL"]
seccompProfile:
type: RuntimeDefault
env:
- name: AD_HOC_TEST_IMAGES
value: ${TEST_IMAGE}:${IMAGE_TAG}
- name: OCM_CLIENT_ID
value: ${OCM_CLIENT_ID}
- name: OCM_CLIENT_SECRET
value: ${OCM_CLIENT_SECRET}
- name: OCM_CCS
value: ${OCM_CCS}
- name: AWS_ACCESS_KEY_ID
value: ${AWS_ACCESS_KEY_ID}
- name: AWS_SECRET_ACCESS_KEY
value: ${AWS_SECRET_ACCESS_KEY}
- name: CLOUD_PROVIDER_REGION
value: ${CLOUD_PROVIDER_REGION}
- name: GCP_CREDS_JSON
value: ${GCP_CREDS_JSON}
- name: LOG_BUCKET
value: ${LOG_BUCKET}
- name: USE_EXISTING_CLUSTER
value: ${USE_EXISTING_CLUSTER}
- name: CAD_PAGERDUTY_ROUTING_KEY
value: ${CAD_PAGERDUTY_ROUTING_KEY}