Skip to content

NE-2561: Add Gateway API OLM to NO-OLM migration upgrade test#30897

Open
gcs278 wants to merge 2 commits intoopenshift:mainfrom
gcs278:gwapi-olm-upgrade-test
Open

NE-2561: Add Gateway API OLM to NO-OLM migration upgrade test#30897
gcs278 wants to merge 2 commits intoopenshift:mainfrom
gcs278:gwapi-olm-upgrade-test

Conversation

@gcs278
Copy link
Contributor

@gcs278 gcs278 commented Mar 18, 2026

Add upgrade test validating Gateway API migration from OLM-based Istio to CIO-managed Sail Library during 4.21 to 4.22 upgrades.

Setup creates Gateway/HTTPRoute with OLM provisioning and tests connectivity. Test validates migration: Gateway remains programmed, Istiod running, Istio CRDs stay OLM-managed, GatewayClass has CIO finalizer, Istio CR deleted, subscription persists. Teardown cleans up all resources.

CC: @rhamini3

@openshift-ci-robot
Copy link

Pipeline controller notification
This repo is configured to use the pipeline controller. Second-stage tests will be triggered either automatically or after lgtm label is added, depending on the repository configuration. The pipeline controller will automatically detect which contexts are required and will utilize /test Prow commands to trigger the second stage.

For optional jobs, comment /test ? to see a list of all defined jobs. To trigger manually all jobs from second stage use /pipeline required command.

This repository is configured in: automatic mode

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Mar 18, 2026
@openshift-ci-robot
Copy link

openshift-ci-robot commented Mar 18, 2026

@gcs278: This pull request references NE-2292 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Add upgrade test validating Gateway API migration from OLM-based Istio to CIO-managed Sail Library during 4.21 to 4.22 upgrades.

Setup creates Gateway/HTTPRoute with OLM provisioning and tests connectivity. Test validates migration: Gateway remains programmed, Istiod running, Istio CRDs stay OLM-managed, GatewayClass has CIO finalizer, Istio CR deleted, subscription persists. Teardown cleans up all resources.

CC: @rhamini3

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci openshift-ci bot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Mar 18, 2026
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 18, 2026

Skipping CI for Draft Pull Request.
If you want CI signal for your change, please convert it to an actual PR.
You can still manually trigger a test run with /test all

@coderabbitai
Copy link

coderabbitai bot commented Mar 18, 2026

Walkthrough

This change introduces Gateway API upgrade testing capabilities by adding a new GatewayAPIUpgradeTest that validates Gateway and HTTPRoute behavior across Kubernetes upgrades while tracking Operator Lifecycle Manager (OLM) mode transitions. Supporting refactors modernize existing Gateway API controller tests.

Changes

Cohort / File(s) Summary
Gateway API Upgrade Test Infrastructure
test/e2e/upgrade/upgrade.go, test/extended/router/gatewayapi_upgrade.go
Added new upgrade test registration and comprehensive GatewayAPIUpgradeTest implementation that validates Gateway API provisioning, HTTPRoute connectivity, and OLM-to-no-OLM migration during cluster upgrades. Includes setup validation, in-upgrade monitoring, and cleanup of Istio/Sail Operator resources.
Gateway API Controller Test Refactoring
test/extended/router/gatewayapicontroller.go
Modernized test helpers and backend creation: replaced Pod-based backends with Deployments, refactored istiod verification logic, extracted generic CRD ownership assertion function, and created reusable provisioning validation helpers for both CIO and OLM-based provisioning modes.

Estimated code review effort

🎯 4 (Complex) | ⏱️ ~60 minutes

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests

Warning

There were issues while running some tools. Please review the errors and either fix the tool's configuration or disable the tool if it's a critical failure.

🔧 golangci-lint (2.11.3)

Error: can't load config: unsupported version of the configuration: "" See https://golangci-lint.run/docs/product/migration-guide for migration instructions
The command is terminated due to an error: can't load config: unsupported version of the configuration: "" See https://golangci-lint.run/docs/product/migration-guide for migration instructions


Comment @coderabbitai help to get the list of available commands and usage tips.

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Mar 18, 2026
@gcs278
Copy link
Contributor Author

gcs278 commented Mar 18, 2026

/test e2e-gcp-ovn-upgrade

@gcs278
Copy link
Contributor Author

gcs278 commented Mar 18, 2026

/test ?

@gcs278 gcs278 force-pushed the gwapi-olm-upgrade-test branch from 90dbe8d to ac9d301 Compare March 18, 2026 02:02
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 18, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: gcs278
Once this PR has been reviewed and has the lgtm label, please assign deads2k for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot removed the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Mar 18, 2026
@gcs278
Copy link
Contributor Author

gcs278 commented Mar 18, 2026

/test e2e-gcp-ovn-upgrade

@gcs278 gcs278 force-pushed the gwapi-olm-upgrade-test branch 2 times, most recently from b08e876 to 4df0775 Compare March 18, 2026 04:04
@gcs278
Copy link
Contributor Author

gcs278 commented Mar 18, 2026

/test e2e-gcp-ovn-upgrade

@openshift-trt
Copy link

openshift-trt bot commented Mar 18, 2026

Risk analysis has seen new tests most likely introduced by this PR.
Please ensure that new tests meet guidelines for naming and stability.

New Test Risks for sha: 4df0775

Job Name New Test Risk
pull-ci-openshift-origin-main-e2e-gcp-ovn-upgrade High - "[sig-network-edge][Feature:Router][apigroup:gateway.networking.k8s.io] Verify Gateway API migration from OLM to NO-OLM during upgrade" is a new test that failed 1 time(s) against the current commit

New tests seen in this PR at sha: 4df0775

  • "[sig-network-edge][Feature:Router][apigroup:gateway.networking.k8s.io] Verify Gateway API migration from OLM to NO-OLM during upgrade" [Total: 1, Pass: 0, Fail: 1, Flake: 0]

@gcs278
Copy link
Contributor Author

gcs278 commented Mar 18, 2026

/test ?

@gcs278
Copy link
Contributor Author

gcs278 commented Mar 18, 2026

/payload list

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 18, 2026

@gcs278: it appears that you have attempted to use some version of the payload command, but your comment was incorrectly formatted and cannot be acted upon. See the docs for usage info.

@gcs278
Copy link
Contributor Author

gcs278 commented Mar 18, 2026

/payload-job periodic-ci-openshift-release-main-ci-4.22-upgrade-from-stable-4.21-e2e-gcp-ovn-upgrade

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 18, 2026

@gcs278: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-release-main-ci-4.22-upgrade-from-stable-4.21-e2e-gcp-ovn-upgrade

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/60c65dd0-22f9-11f1-91b0-a3e2ef55f2e7-0

@gcs278
Copy link
Contributor Author

gcs278 commented Mar 18, 2026

Ah darn this isn't going to work because periodic-ci-openshift-release-main-ci-4.22-upgrade-from-stable-4.21-e2e-gcp-ovn-upgrade is not test tech preview: it still will try to upgrade GA'ed clustered, and the test will fail. We need a upgrade-from-stable job for tech preview, or we have to wait until we GA.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 18, 2026

@gcs278: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-release-main-ci-4.22-upgrade-from-stable-4.21-e2e-gcp-ovn-upgrade

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/c6220410-2306-11f1-9c3a-90af7c7cc380-0

@gcs278
Copy link
Contributor Author

gcs278 commented Mar 18, 2026

[trying again]

Okay, this is a bit crazy, but I created a draft promotion PR (openshift/api#2772) so that we can test with NoOLM as default since we don't have upgrade-from-stable techpreview jobs anywhere.

/payload-job-with-prs periodic-ci-openshift-release-main-ci-4.22-upgrade-from-stable-4.21-e2e-gcp-ovn-upgrade openshift/api#2772 openshift/cluster-ingress-operator#1354

Additionally, this should still run for OLM to OLM, or noOLM to noOLM (it's a generic z stream upgrade test):
This would be OLM to OLM:
/test e2e-gcp-ovn-upgrade

This would be noOLM to noOLM:
/testwith openshift/origin/main/e2e-gcp-ovn-upgrade openshift/cluster-ingress-operator#1354 openshift/api#2772

So there's our 3 cases:

  1. OLM to OLM
  2. OLM to noOLM (migration)
  3. noOLM to noOLM

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 18, 2026

@gcs278: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-release-main-ci-4.22-upgrade-from-stable-4.21-e2e-gcp-ovn-upgrade

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/23e6af60-2307-11f1-992d-12ede9d2e079-0

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 18, 2026

@gcs278: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-release-main-ci-4.22-upgrade-from-stable-4.21-e2e-gcp-ovn-upgrade

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/26a088fc-2307-11f1-9da4-6bca82f01e76-0

@gcs278
Copy link
Contributor Author

gcs278 commented Mar 21, 2026

Last payload nearly worked, but i make a mistake assuming CSV, Subscription shouldn't be there after the install. Also, i needed to clean up CSV for tests that run after. This should be it:

/payload-job-with-prs periodic-ci-openshift-release-main-ci-4.22-upgrade-from-stable-4.21-e2e-gcp-ovn-upgrade openshift/api#2772 openshift/cluster-ingress-operator#1393

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 21, 2026

@gcs278: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-release-main-ci-4.22-upgrade-from-stable-4.21-e2e-gcp-ovn-upgrade

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/69a77f80-24c8-11f1-9403-ad1a7c99fb97-0

@gcs278 gcs278 force-pushed the gwapi-olm-upgrade-test branch from 2c98e57 to 3b1447c Compare March 21, 2026 01:51
@gcs278
Copy link
Contributor Author

gcs278 commented Mar 21, 2026

/payload-abort

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 21, 2026

@gcs278: aborted 1 active payload job(s) for pull request #30897

@gcs278
Copy link
Contributor Author

gcs278 commented Mar 21, 2026

/payload-job-with-prs periodic-ci-openshift-release-main-ci-4.22-upgrade-from-stable-4.21-e2e-gcp-ovn-upgrade openshift/api#2772 openshift/cluster-ingress-operator#1393

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 21, 2026

@gcs278: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-release-main-ci-4.22-upgrade-from-stable-4.21-e2e-gcp-ovn-upgrade

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/8a761690-24c8-11f1-9c74-da2cb51d6692-0

@gcs278
Copy link
Contributor Author

gcs278 commented Mar 21, 2026

/test e2e-gcp-ovn-upgrade

@gcs278
Copy link
Contributor Author

gcs278 commented Mar 21, 2026

/testwith openshift/origin/main/e2e-gcp-ovn-upgrade openshift/api#2772 openshift/cluster-ingress-operator#1393

@openshift-trt
Copy link

openshift-trt bot commented Mar 21, 2026

Risk analysis has seen new tests most likely introduced by this PR.
Please ensure that new tests meet guidelines for naming and stability.

New Test Risks for sha: 3b1447c

Job Name New Test Risk
pull-ci-openshift-origin-main-e2e-gcp-ovn-upgrade High - "[sig-network-edge][Feature:Router][apigroup:gateway.networking.k8s.io] Verify Gateway API functionality during upgrade" is a new test, was only seen in one job, and failed 1 time(s) against the current commit.

New tests seen in this PR at sha: 3b1447c

  • "[sig-network-edge][Feature:Router][apigroup:gateway.networking.k8s.io] Verify Gateway API functionality during upgrade" [Total: 1, Pass: 0, Fail: 1, Flake: 0]

@gcs278 gcs278 force-pushed the gwapi-olm-upgrade-test branch from 3b1447c to 9232301 Compare March 23, 2026 17:56
@gcs278
Copy link
Contributor Author

gcs278 commented Mar 23, 2026

Migration test success! noOLM to noOLM success! and OLM to OLM failure on waiting for istiod pods to be deleted.

I might of stumbled upon a latent bug for cleaning up (if you delete subscription and CSV then delete gateway class), so let me change the ordering.

/test e2e-gcp-ovn-upgrade

@gcs278 gcs278 changed the title NE-2292: Add Gateway API OLM to NO-OLM migration upgrade test NE-2561: Add Gateway API OLM to NO-OLM migration upgrade test Mar 23, 2026
@openshift-ci-robot
Copy link

openshift-ci-robot commented Mar 23, 2026

@gcs278: This pull request references NE-2561 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Add upgrade test validating Gateway API migration from OLM-based Istio to CIO-managed Sail Library during 4.21 to 4.22 upgrades.

Setup creates Gateway/HTTPRoute with OLM provisioning and tests connectivity. Test validates migration: Gateway remains programmed, Istiod running, Istio CRDs stay OLM-managed, GatewayClass has CIO finalizer, Istio CR deleted, subscription persists. Teardown cleans up all resources.

CC: @rhamini3

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@gcs278 gcs278 marked this pull request as ready for review March 23, 2026 23:29
@openshift-ci openshift-ci bot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Mar 23, 2026
@openshift-ci openshift-ci bot requested review from frobware and sjenning March 23, 2026 23:30
gcs278 added 2 commits March 23, 2026 19:30
Add upgrade test validating Gateway API migration from OLM-based Istio
to CIO-managed Sail Library during 4.21 to 4.22 upgrades.

Setup creates Gateway/HTTPRoute with OLM provisioning and tests
connectivity. Test validates migration: Gateway remains programmed,
Istiod running, Istio CRDs stay OLM-managed, GatewayClass has CIO
finalizer, Istio CR deleted, subscription persists. Teardown cleans
up all resources.
Previously, HttpRoute test used a pod, but a pod won't survive a reboot
during the upgrade process.
@gcs278 gcs278 force-pushed the gwapi-olm-upgrade-test branch from 9232301 to 72acd6d Compare March 23, 2026 23:30
@gcs278
Copy link
Contributor Author

gcs278 commented Mar 23, 2026

/testwith openshift/origin/main/e2e-gcp-ovn-upgrade openshift/api#2772 openshift/cluster-ingress-operator#1393

@gcs278
Copy link
Contributor Author

gcs278 commented Mar 23, 2026

/payload-job-with-prs periodic-ci-openshift-release-main-ci-4.22-upgrade-from-stable-4.21-e2e-gcp-ovn-upgrade openshift/api#2772 openshift/cluster-ingress-operator#1393

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 23, 2026

@gcs278: trigger 1 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-release-main-ci-4.22-upgrade-from-stable-4.21-e2e-gcp-ovn-upgrade

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/6d5568f0-2710-11f1-9d03-561b26d4f2f7-0

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🧹 Nitpick comments (2)
test/extended/router/gatewayapicontroller.go (1)

1330-1365: Consider checking pod readiness conditions instead of just phase.

The current check only verifies pod.Status.Phase == corev1.PodRunning, but a pod can be in Running phase without all containers being ready. For more robust validation, consider checking container readiness conditions.

Suggested enhancement
 for _, pod := range pods.Items {
-	if pod.Status.Phase == corev1.PodRunning {
-		return true, nil
+	if pod.Status.Phase == corev1.PodRunning {
+		for _, cond := range pod.Status.Conditions {
+			if cond.Type == corev1.PodReady && cond.Status == corev1.ConditionTrue {
+				return true, nil
+			}
+		}
 	}
 }
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@test/extended/router/gatewayapicontroller.go` around lines 1330 - 1365, The
check in checkIstiodRunning currently treats a pod as ready if pod.Status.Phase
== corev1.PodRunning; update the Pod loop to instead verify container readiness
(e.g., inspect pod.Status.ContainerStatuses and ensure at least one pod has all
its containerStatuses[*].Ready == true or use the PodCondition Ready == True)
before returning true, leaving the existing wait.PollUntilContextTimeout flow
intact and keeping the same logging paths (e.g., the e2e.Logf messages) when no
ready pod is found; ensure error handling for the List call remains unchanged.
test/extended/router/gatewayapi_upgrade.go (1)

231-294: Cleanup order: Consider deleting Gateway before GatewayClass.

The current teardown deletes GatewayClass first (line 235), then Gateway later (line 263). Typically, dependent resources (Gateway) should be deleted before the parent (GatewayClass) to allow proper finalizer processing. While this may work due to --ignore-not-found and polling, reversing the order would be cleaner.

Suggested reordering
 func (t *GatewayAPIUpgradeTest) Teardown(ctx context.Context, f *framework.Framework) {
+	g.By("Deleting the Gateway")
+	err := t.oc.AdminGatewayApiClient().GatewayV1().Gateways(ingressNamespace).Delete(ctx, t.gatewayName, metav1.DeleteOptions{})
+	if err != nil && !apierrors.IsNotFound(err) {
+		framework.Logf("Failed to delete Gateway %q: %v", t.gatewayName, err)
+	}
+
 	g.By("Deleting the GatewayClass")
 	err := t.oc.AdminGatewayApiClient().GatewayV1().GatewayClasses().Delete(ctx, gatewayClassName, metav1.DeleteOptions{})
 	// ... rest of cleanup ...
-
-	g.By("Deleting the Gateway")
-	err = t.oc.AdminGatewayApiClient().GatewayV1().Gateways(ingressNamespace).Delete(ctx, t.gatewayName, metav1.DeleteOptions{})
-	if err != nil && !apierrors.IsNotFound(err) {
-		framework.Logf("Failed to delete Gateway %q: %v", t.gatewayName, err)
-	}
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@test/extended/router/gatewayapi_upgrade.go` around lines 231 - 294, In
Teardown, delete the Gateway resource before deleting the GatewayClass: move the
block that calls
t.oc.AdminGatewayApiClient().GatewayV1().Gateways(ingressNamespace).Delete(ctx,
t.gatewayName, metav1.DeleteOptions{}) (and its error handling) to run prior to
the block that deletes GatewayClasses (the call deleting gatewayClassName), and
optionally add a short wait/poll (similar to the istiod pods wait) to ensure the
Gateway is fully removed before calling GatewayClasses().Delete; keep existing
error handling and ignore-not-found checks for both gateway and gatewayClass.
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Nitpick comments:
In `@test/extended/router/gatewayapi_upgrade.go`:
- Around line 231-294: In Teardown, delete the Gateway resource before deleting
the GatewayClass: move the block that calls
t.oc.AdminGatewayApiClient().GatewayV1().Gateways(ingressNamespace).Delete(ctx,
t.gatewayName, metav1.DeleteOptions{}) (and its error handling) to run prior to
the block that deletes GatewayClasses (the call deleting gatewayClassName), and
optionally add a short wait/poll (similar to the istiod pods wait) to ensure the
Gateway is fully removed before calling GatewayClasses().Delete; keep existing
error handling and ignore-not-found checks for both gateway and gatewayClass.

In `@test/extended/router/gatewayapicontroller.go`:
- Around line 1330-1365: The check in checkIstiodRunning currently treats a pod
as ready if pod.Status.Phase == corev1.PodRunning; update the Pod loop to
instead verify container readiness (e.g., inspect pod.Status.ContainerStatuses
and ensure at least one pod has all its containerStatuses[*].Ready == true or
use the PodCondition Ready == True) before returning true, leaving the existing
wait.PollUntilContextTimeout flow intact and keeping the same logging paths
(e.g., the e2e.Logf messages) when no ready pod is found; ensure error handling
for the List call remains unchanged.

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: 1f8825ca-bbd1-47dd-bc76-38e9fec0eaa6

📥 Commits

Reviewing files that changed from the base of the PR and between 2ca6ee1 and 72acd6d.

📒 Files selected for processing (3)
  • test/e2e/upgrade/upgrade.go
  • test/extended/router/gatewayapi_upgrade.go
  • test/extended/router/gatewayapicontroller.go

@openshift-ci-robot
Copy link

Scheduling required tests:
/test e2e-aws-csi
/test e2e-aws-ovn-fips
/test e2e-aws-ovn-microshift
/test e2e-aws-ovn-microshift-serial
/test e2e-aws-ovn-serial-1of2
/test e2e-aws-ovn-serial-2of2
/test e2e-gcp-csi
/test e2e-gcp-ovn
/test e2e-gcp-ovn-upgrade
/test e2e-metal-ipi-ovn-ipv6
/test e2e-vsphere-ovn
/test e2e-vsphere-ovn-upi

Scheduling tests matching the pipeline_run_if_changed or not excluded by pipeline_skip_if_only_changed parameters:
/test e2e-aws-ovn-upgrade-rollback

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 24, 2026

@gcs278: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-aws-ovn-fips 72acd6d link true /test e2e-aws-ovn-fips

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@openshift-trt
Copy link

openshift-trt bot commented Mar 24, 2026

Risk analysis has seen new tests most likely introduced by this PR.
Please ensure that new tests meet guidelines for naming and stability.

New tests seen in this PR at sha: 72acd6d

  • "[sig-network-edge][Feature:Router][apigroup:gateway.networking.k8s.io] Verify Gateway API functionality during upgrade" [Total: 2, Pass: 2, Fail: 0, Flake: 0]

1 similar comment
@openshift-trt
Copy link

openshift-trt bot commented Mar 24, 2026

Risk analysis has seen new tests most likely introduced by this PR.
Please ensure that new tests meet guidelines for naming and stability.

New tests seen in this PR at sha: 72acd6d

  • "[sig-network-edge][Feature:Router][apigroup:gateway.networking.k8s.io] Verify Gateway API functionality during upgrade" [Total: 2, Pass: 2, Fail: 0, Flake: 0]

@gcs278
Copy link
Contributor Author

gcs278 commented Mar 24, 2026

All variations of the upgrade test passed!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

jira/valid-reference Indicates that this PR references a valid Jira ticket of any type.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants