k8s-conformance/v1.26/openshift
Maciej Szulik 1e9a26fab3 Conformance results for v1.26/openshift (#2613)
Signed-off-by: Maciej Szulik <maszulik@redhat.com>
2023-05-24 10:09:55 -07:00
..
PRODUCT.yaml Conformance results for v1.26/openshift (#2613) 2023-05-24 10:09:55 -07:00
README.md Conformance results for v1.26/openshift (#2613) 2023-05-24 10:09:55 -07:00
e2e.log Conformance results for v1.26/openshift (#2613) 2023-05-24 10:09:55 -07:00
junit_01.xml Conformance results for v1.26/openshift (#2613) 2023-05-24 10:09:55 -07:00

README.md

OpenShift Container Platform by Red Hat

Create a cluster

  1. Download openshift-install and oc binaries from https://console.redhat.com/openshift/downloads.
  2. Download installation pull secret from https://console.redhat.com/openshift/install/pull-secret.
  3. Run openshift-install and follow the instructions. When the cluster deployment completes, directions for accessing your cluster display in your terminal.
openshift-install create cluster --dir <installation_directory> --log-level=info
  1. Set the environment variable KUBECONFIG pointing to your .kubeconfig from the previous step.
export KUBECONFIG=PATH_TO_KUBECONFIG

NOTE: Detailed instructions how to install OpenShift cluster can be found under https://docs.openshift.com/container-platform/.

Run conformance tests

  1. By default OpenShift security rules do not allow running with privileged access. Below commands allow unprivileged users to run root level containers. Once conformance testing is completed, you should restore the default security rules.
oc adm policy add-scc-to-group privileged system:authenticated system:serviceaccounts
oc adm policy add-scc-to-group anyuid system:authenticated system:serviceaccounts
  1. Follow the test instructions to run the conformance tests. You will need to add the --dns-namespace=openshift-dns and --dns-pod-labels=dns.operator.openshift.io/daemonset-dns=default options so sonobuoy can find the cluster DNS pods:
sonobuoy run --mode=certified-conformance --dns-namespace=openshift-dns --dns-pod-labels=dns.operator.openshift.io/daemonset-dns=default
  1. Once conformance testing is completed, restore the default security rules:
oc adm policy remove-scc-from-group anyuid system:authenticated system:serviceaccounts
oc adm policy remove-scc-from-group privileged system:authenticated system:serviceaccounts