Skip to content
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
Show all changes
29 commits
Select commit Hold shift + click to select a range
4e349e6
:seedling: Use Patch instead of Update for finalizer operations (#2328)
tmshort Dec 2, 2025
3aa6b80
Merge branch 'main' into synchronize
Dec 3, 2025
ff3a602
UPSTREAM: <carry>: Add OpenShift specific files
dtfranz Oct 26, 2023
1ae80a9
UPSTREAM: <carry>: Add new tests for single/own namespaces install modes
camilamacedo86 Oct 6, 2025
557c855
UPSTREAM: <carry>: Upgrade OCP image from 4.20 to 4.21
camilamacedo86 Oct 13, 2025
4f47e85
UPSTREAM: <carry>: [Default Catalog Tests] - Change logic to get ocp …
camilamacedo86 Oct 13, 2025
b6c47fe
UPSTREAM: <carry>: Update OCP catalogs to v4.21
tmshort Oct 13, 2025
77ec46b
UPSTREAM: <carry>: support singleown cases in disconnected
kuiwang02 Oct 16, 2025
2795af4
UPSTREAM: <carry>: fix cases 81696 and 74618 for product code changes
kuiwang02 Oct 17, 2025
e1e7467
UPSTREAM: <carry>: Define Default timeouts and apply their usage accr…
camilamacedo86 Oct 22, 2025
8a6a17f
UPSTREAM: <carry>: Update to new feature-gate options in helm
tmshort Oct 22, 2025
6c63a09
UPSTREAM: <carry>: Fix flake for single/own ns tests by ensuring uniq…
camilamacedo86 Oct 22, 2025
3c5986d
UPSTREAM: <carry>: [OTE]: Enhance single/own ns based on review comme…
camilamacedo86 Oct 24, 2025
4abcc5a
UPSTREAM: <carry>: Update OwnSingle template to use spec.config.inlin…
kuiwang02 Nov 3, 2025
cf247ca
UPSTREAM: <carry>: [OTE]: Add webhook cleanup validation on extension…
camilamacedo86 Nov 4, 2025
f1e6311
UPSTREAM: <carry>: Add [OTP] to migrated cases
kuiwang02 Nov 7, 2025
511e116
UPSTREAM: <carry>: [OTE]: Upgrade dependencies used
camilamacedo86 Nov 5, 2025
429524c
UPSTREAM: <carry>: fix(OTE): fix OpenShift Kubernetes replace version…
camilamacedo86 Nov 10, 2025
f1ac82a
UPSTREAM: <carry>: [Default Catalog Tests] Upgrade go 1.24.6 and depe…
camilamacedo86 Nov 11, 2025
c591a3f
UPSTREAM: <carry>: add disconnected environment support with custom p…
kuiwang02 Nov 12, 2025
3fdfa64
UPSTREAM: <carry>: migrate jiazha test cases to OTE
jianzhangbjz Nov 14, 2025
24361f7
UPSTREAM: <carry>: migrate clustercatalog case to ote
Xia-Zhao-rh Oct 17, 2025
058414c
UPSTREAM: <carry>: migrate olmv1 QE stress cases
kuiwang02 Nov 20, 2025
8c4b315
UPSTREAM: <carry>: Use busybox/httpd to simulate probes
tmshort Nov 25, 2025
07681af
UPSTREAM: <carry>: migrate olmv1 QE cases
Xia-Zhao-rh Nov 25, 2025
26a023c
UPSTREAM: <carry>: add agent for olmv1 qe cases
kuiwang02 Oct 21, 2025
e8795a4
UPSTREAM: <drop>: go mod vendor
Dec 3, 2025
3b6bcf9
UPSTREAM: <drop>: remove upstream GitHub configuration
Dec 3, 2025
ca1c967
UPSTREAM: <drop>: configure the commit-checker
Dec 3, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
UPSTREAM: <carry>: Define Default timeouts and apply their usage accr…
…oss to avoid flakes
  • Loading branch information
camilamacedo86 authored and ci-robot committed Dec 3, 2025
commit e1e7467f3f5c8f43bf95aeeefc928a71484406aa
3 changes: 1 addition & 2 deletions openshift/tests-extension/pkg/helpers/catalogs.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,6 @@ package helpers
import (
"context"
"fmt"
"time"

//nolint:staticcheck // ST1001: dot-imports for readability
. "github.com/onsi/gomega"
Expand Down Expand Up @@ -48,5 +47,5 @@ func ExpectCatalogToBeServing(ctx context.Context, name string) {

g.Expect(meta.IsStatusConditionPresentAndEqual(conditions, olmv1.TypeServing, metav1.ConditionTrue)).
To(BeTrue(), fmt.Sprintf("catalog %q is not serving", name))
}).WithTimeout(5 * time.Minute).WithPolling(5 * time.Second).Should(Succeed())
}).WithTimeout(DefaultTimeout).WithPolling(DefaultPolling).Should(Succeed())
}
3 changes: 1 addition & 2 deletions openshift/tests-extension/pkg/helpers/cluster_catalog.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,6 @@ package helpers
import (
"context"
"fmt"
"time"

//nolint:staticcheck // ST1001: dot-imports for readability
. "github.com/onsi/ginkgo/v2"
Expand Down Expand Up @@ -72,6 +71,6 @@ func EnsureCleanupClusterCatalog(ctx context.Context, name string) {
Eventually(func() bool {
err := k8s.Get(ctx, key, &olmv1.ClusterCatalog{})
return errors.IsNotFound(err)
}).WithTimeout(3*time.Minute).WithPolling(2*time.Second).
}).WithTimeout(DefaultTimeout).WithPolling(DefaultPolling).
Should(BeTrue(), "ClusterCatalog %q failed to delete", name)
}
10 changes: 5 additions & 5 deletions openshift/tests-extension/pkg/helpers/cluster_extension.go
Original file line number Diff line number Diff line change
Expand Up @@ -159,7 +159,7 @@ func ExpectClusterExtensionToBeInstalled(ctx context.Context, name string) {
installed := meta.FindStatusCondition(conditions, string(olmv1.TypeInstalled))
g.Expect(installed).ToNot(BeNil(), "Installed condition not found")
g.Expect(installed.Status).To(Equal(metav1.ConditionTrue), "Installed should be True")
}).WithTimeout(5 * time.Minute).WithPolling(1 * time.Second).Should(Succeed())
}).WithTimeout(DefaultTimeout).WithPolling(DefaultPolling).Should(Succeed())
}

// EnsureCleanupClusterExtension attempts to delete any ClusterExtension and a specified CRD
Expand All @@ -182,7 +182,7 @@ func EnsureCleanupClusterExtension(ctx context.Context, packageName, crdName str
Eventually(func() bool {
err := k8sClient.Get(ctx, client.ObjectKey{Name: ce.Name}, &olmv1.ClusterExtension{})
return errors.IsNotFound(err)
}).WithTimeout(1*time.Minute).WithPolling(2*time.Second).Should(BeTrue(), "Cleanup ClusterExtension %s failed to delete", ce.Name)
}).WithTimeout(DefaultTimeout).WithPolling(DefaultPolling).Should(BeTrue(), "Cleanup ClusterExtension %s failed to delete", ce.Name)
}
}
} else if !errors.IsNotFound(err) {
Expand All @@ -200,7 +200,7 @@ func EnsureCleanupClusterExtension(ctx context.Context, packageName, crdName str
Eventually(func() bool {
err := k8sClient.Get(ctx, client.ObjectKey{Name: crdName}, &apiextensionsv1.CustomResourceDefinition{})
return errors.IsNotFound(err)
}).WithTimeout(1*time.Minute).WithPolling(2*time.Second).Should(BeTrue(), "Lingering CRD %s failed to delete", crdName)
}).WithTimeout(DefaultTimeout).WithPolling(DefaultPolling).Should(BeTrue(), "Lingering CRD %s failed to delete", crdName)
} else if !errors.IsNotFound(err) {
fmt.Fprintf(GinkgoWriter, "Warning: Failed to get CRD %s during cleanup: %v\n", crdName, err)
}
Expand All @@ -214,7 +214,7 @@ func ExpectServiceAccountExists(ctx context.Context, name, namespace string) {
Eventually(func(g Gomega) {
err := k8sClient.Get(ctx, client.ObjectKey{Name: name, Namespace: namespace}, sa)
g.Expect(err).ToNot(HaveOccurred(), fmt.Sprintf("failed to get ServiceAccount %q/%q: %v", namespace, name, err))
}).WithTimeout(5*time.Minute).WithPolling(3*time.Second).Should(Succeed(), "ServiceAccount %q/%q did not become visible within timeout", namespace, name)
}).WithTimeout(DefaultTimeout).WithPolling(DefaultPolling).Should(Succeed(), "ServiceAccount %q/%q did not become visible within timeout", namespace, name)
}

// ExpectClusterRoleBindingExists waits for a ClusterRoleBinding to be available and visible to the client.
Expand All @@ -224,5 +224,5 @@ func ExpectClusterRoleBindingExists(ctx context.Context, name string) {
Eventually(func(g Gomega) {
err := k8sClient.Get(ctx, client.ObjectKey{Name: name}, crb)
g.Expect(err).ToNot(HaveOccurred(), fmt.Sprintf("failed to get ClusterRoleBinding %q: %v", name, err))
}).WithTimeout(10*time.Second).WithPolling(1*time.Second).Should(Succeed(), "ClusterRoleBinding %q did not become visible within timeout", name)
}).WithTimeout(2*time.Minute).WithPolling(DefaultPolling).Should(Succeed(), "ClusterRoleBinding %q did not become visible within timeout", name)
}
19 changes: 19 additions & 0 deletions openshift/tests-extension/pkg/helpers/defaults.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
package helpers

import "time"

// Default settings for tests that use Eventually.
//
// The timeout is long enough so slow CI systems don’t cause false failures.
// This helps prevent sending wrong signals to Sippy and stops blocking
// pull requests from merging in the whole OCP org.
//
// The polling interval controls how often we check again.
// It’s set to a reasonable value to avoid too many API calls.
const (
// DefaultTimeout is how long we wait before giving up on an Eventually check.
DefaultTimeout = 5 * time.Minute

// DefaultPolling is how often we check again during an Eventually test.
DefaultPolling = 3 * time.Second
)
5 changes: 2 additions & 3 deletions openshift/tests-extension/pkg/helpers/in_cluster_bundles.go
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,6 @@ import (
"fmt"
"os"
"os/exec"
"time"

//nolint:staticcheck // ST1001: dot-imports for readability
. "github.com/onsi/ginkgo/v2"
Expand Down Expand Up @@ -316,7 +315,7 @@ func waitForBuildToFinish(ctx SpecContext, name, namespace string) {
}
g.Expect(cond).ToNot(BeNil())
g.Expect(cond.Status).To(Equal(corev1.ConditionTrue))
}).WithTimeout(5 * time.Minute).WithPolling(1 * time.Second).Should(Succeed())
}).WithTimeout(DefaultTimeout).WithPolling(DefaultPolling).Should(Succeed())

DeferCleanup(func() {
if CurrentSpecReport().Failed() {
Expand All @@ -338,7 +337,7 @@ func waitForClusterCatalogServing(ctx context.Context, name string) {
serving := meta.FindStatusCondition(cc.Status.Conditions, olmv1.TypeServing)
g.Expect(serving).ToNot(BeNil())
g.Expect(serving.Status).To(Equal(metav1.ConditionTrue))
}).WithTimeout(5 * time.Minute).WithPolling(1 * time.Second).Should(Succeed())
}).WithTimeout(DefaultTimeout).WithPolling(DefaultPolling).Should(Succeed())
}

func startBuild(args ...string) *buildv1.Build {
Expand Down
5 changes: 2 additions & 3 deletions openshift/tests-extension/test/olmv1-catalog.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,6 @@ package test
import (
"fmt"
"strings"
"time"

//nolint:staticcheck // ST1001: dot-imports for readability
. "github.com/onsi/ginkgo/v2"
Expand Down Expand Up @@ -99,7 +98,7 @@ func verifyCatalogEndpoint(ctx SpecContext, catalog, endpoint, query string) {
Fail(fmt.Sprintf("Job failed: %s", c.Message))
}
}
}).WithTimeout(2 * time.Minute).WithPolling(5 * time.Second).Should(Succeed())
}).WithTimeout(helpers.DefaultTimeout).WithPolling(helpers.DefaultPolling).Should(Succeed())
}

var _ = Describe("[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1 openshift-community-operators Catalog", func() {
Expand Down Expand Up @@ -225,7 +224,7 @@ var _ = Describe("[sig-olmv1][OCPFeatureGate:NewOLM][Skipped:Disconnected] OLMv1
g.Expect(c.Status).To(Equal(metav1.ConditionTrue), "expected Progressing=True")
g.Expect(c.Reason).To(Equal("Retrying"), "expected reason to be 'Retrying'")
g.Expect(c.Message).To(ContainSubstring("error creating image source"), "expected image source error")
}).WithTimeout(5 * time.Minute).WithPolling(1 * time.Second).Should(Succeed())
}).WithTimeout(helpers.DefaultTimeout).WithPolling(helpers.DefaultPolling).Should(Succeed())
})
})

Expand Down
5 changes: 2 additions & 3 deletions openshift/tests-extension/test/olmv1-incompatible.go
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,6 @@ package test

import (
"context"
"time"

//nolint:staticcheck // ST1001: dot-imports for readability
. "github.com/onsi/ginkgo/v2"
Expand Down Expand Up @@ -92,7 +91,7 @@ func waitForOlmUpgradeStatus(ctx SpecContext, status operatorv1.ConditionStatus,
g.Expect(cond.Reason).To(Equal(reasonIncompatibleOperatorsInstalled))
g.Expect(cond.Message).To(ContainSubstring(name))
}
}).WithTimeout(5 * time.Minute).WithPolling(1 * time.Second).Should(Succeed())
}).WithTimeout(helpers.DefaultTimeout).WithPolling(helpers.DefaultPolling).Should(Succeed())
}

func waitForClusterOperatorUpgradable(ctx SpecContext, name string) {
Expand All @@ -116,5 +115,5 @@ func waitForClusterOperatorUpgradable(ctx SpecContext, name string) {
g.Expect(cond.Status).To(Equal(configv1.ConditionFalse))
g.Expect(cond.Reason).To(Equal(reasonIncompatibleOperatorsInstalled))
g.Expect(cond.Message).To(ContainSubstring(name))
}).WithTimeout(5 * time.Minute).WithPolling(1 * time.Second).Should(Succeed())
}).WithTimeout(helpers.DefaultTimeout).WithPolling(helpers.DefaultPolling).Should(Succeed())
}
3 changes: 1 addition & 2 deletions openshift/tests-extension/test/olmv1-preflight.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,6 @@ package test
import (
"context"
"fmt"
"time"

//nolint:staticcheck // ST1001: dot-imports for readability
. "github.com/onsi/ginkgo/v2"
Expand Down Expand Up @@ -125,7 +124,7 @@ func runNegativePreflightTest(ctx context.Context, scenario int, namespace strin
c = meta.FindStatusCondition(latest.Status.Conditions, "Installed")
g.Expect(c).NotTo(BeNil())
g.Expect(c.Status).To(Equal(metav1.ConditionFalse))
}).WithTimeout(5 * time.Minute).WithPolling(5 * time.Second).Should(Succeed())
}).WithTimeout(helpers.DefaultTimeout).WithPolling(helpers.DefaultPolling).Should(Succeed())
}

// createDeficientClusterRole returns a modified ClusterRole according to the test scenario.
Expand Down
7 changes: 3 additions & 4 deletions openshift/tests-extension/test/olmv1-singleownnamespace.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,6 @@ package test
import (
"context"
"fmt"
"time"

//nolint:staticcheck // ST1001: dot-imports for readability
. "github.com/onsi/ginkgo/v2"
Expand Down Expand Up @@ -458,7 +457,7 @@ var _ = Describe("[sig-olmv1][OCPFeatureGate:NewOLMOwnSingleNamespace] OLMv1 ope
}
}
g.Expect(found).To(BeTrue(), "failed to find deployment with olm.targetNamespaces annotation")
}).WithTimeout(5 * time.Minute).WithPolling(3 * time.Second).Should(Succeed())
}).WithTimeout(helpers.DefaultTimeout).WithPolling(helpers.DefaultPolling).Should(Succeed())

By(fmt.Sprintf("cleaning up resources created for %s scenario to allow next scenario", sc.label))
deletePolicy := metav1.DeletePropagationForeground
Expand Down Expand Up @@ -602,7 +601,7 @@ var _ = Describe("[sig-olmv1][OCPFeatureGate:NewOLMOwnSingleNamespace][Serial] O
g.Expect(installed).ToNot(BeNil(), "Installed condition not found")
g.Expect(installed.Status).To(Equal(metav1.ConditionFalse), "Installed should be False")
g.Expect(installed.Reason).To(Equal("Failed"))
}).WithTimeout(5 * time.Minute).WithPolling(1 * time.Second).Should(Succeed())
}).WithTimeout(helpers.DefaultTimeout).WithPolling(helpers.DefaultPolling).Should(Succeed())
})
})

Expand Down Expand Up @@ -742,6 +741,6 @@ var _ = Describe("[sig-olmv1][OCPFeatureGate:NewOLMOwnSingleNamespace] OLMv1 ope
g.Expect(installed.Status).To(Equal(metav1.ConditionFalse), "Installed should be False")
g.Expect(installed.Reason).To(Equal(olmv1.ReasonFailed))
g.Expect(installed.Message).ToNot(BeEmpty())
}).WithTimeout(5 * time.Minute).WithPolling(3 * time.Second).Should(Succeed())
}).WithTimeout(helpers.DefaultTimeout).WithPolling(helpers.DefaultPolling).Should(Succeed())
})
})
5 changes: 2 additions & 3 deletions openshift/tests-extension/test/olmv1.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,6 @@ package test
import (
"context"
"fmt"
"time"

//nolint:staticcheck // ST1001: dot-imports for readability
. "github.com/onsi/ginkgo/v2"
Expand Down Expand Up @@ -185,7 +184,7 @@ var _ = Describe("[sig-olmv1][OCPFeatureGate:NewOLM] OLMv1 operator installation
ce := &olmv1.ClusterExtension{}
Eventually(func() error {
return env.Get().K8sClient.Get(ctx, client.ObjectKey{Name: name}, ce)
}).WithTimeout(5 * time.Minute).WithPolling(5 * time.Second).Should(Succeed())
}).WithTimeout(helpers.DefaultTimeout).WithPolling(helpers.DefaultPolling).Should(Succeed())

By("waiting up to 2 minutes for ClusterExtension to report failure")
Eventually(func(g Gomega) {
Expand All @@ -204,6 +203,6 @@ var _ = Describe("[sig-olmv1][OCPFeatureGate:NewOLM] OLMv1 operator installation
g.Expect(installed.Status).To(Equal(metav1.ConditionFalse))
g.Expect(installed.Reason).To(Equal("Failed"))
g.Expect(installed.Message).To(Equal("No bundle installed"))
}).WithTimeout(5 * time.Minute).WithPolling(5 * time.Second).Should(Succeed())
}).WithTimeout(helpers.DefaultTimeout).WithPolling(helpers.DefaultPolling).Should(Succeed())
})
})
20 changes: 10 additions & 10 deletions openshift/tests-extension/test/webhooks.go
Original file line number Diff line number Diff line change
Expand Up @@ -126,7 +126,7 @@ var _ = Describe("[sig-olmv1][OCPFeatureGate:NewOLMWebhookProviderOpenshiftServi
default:
return fmt.Errorf("unexpected error: %v", err)
}
}).WithTimeout(2 * time.Minute).WithPolling(5 * time.Second).Should(Succeed())
}).WithTimeout(helpers.DefaultTimeout).WithPolling(helpers.DefaultPolling).Should(Succeed())
})

It("should have a working mutating webhook [Serial]", Label("original-name:[sig-olmv1][OCPFeatureGate:NewOLMWebhookProviderOpenshiftServiceCA][Skipped:Disconnected][Serial] OLMv1 operator with webhooks should have a working mutating webhook"), func(ctx SpecContext) {
Expand All @@ -136,7 +136,7 @@ var _ = Describe("[sig-olmv1][OCPFeatureGate:NewOLMWebhookProviderOpenshiftServi
Eventually(func(g Gomega) {
_, err := dynamicClient.Resource(webhookTestV1).Namespace(webhookOperatorInstallNamespace).Create(ctx, resource, metav1.CreateOptions{})
g.Expect(err).ToNot(HaveOccurred())
}).WithTimeout(1 * time.Minute).WithPolling(5 * time.Second).Should(Succeed())
}).WithTimeout(helpers.DefaultTimeout).WithPolling(helpers.DefaultPolling).Should(Succeed())

By("getting the created resource in v1 schema")
obj, err := dynamicClient.Resource(webhookTestV1).Namespace(webhookOperatorInstallNamespace).Get(ctx, mutatingWebhookResourceName, metav1.GetOptions{})
Expand All @@ -158,7 +158,7 @@ var _ = Describe("[sig-olmv1][OCPFeatureGate:NewOLMWebhookProviderOpenshiftServi
Eventually(func(g Gomega) {
_, err := dynamicClient.Resource(webhookTestV1).Namespace(webhookOperatorInstallNamespace).Create(ctx, resourceV1, metav1.CreateOptions{})
g.Expect(err).ToNot(HaveOccurred())
}).WithTimeout(1 * time.Minute).WithPolling(5 * time.Second).Should(Succeed())
}).WithTimeout(helpers.DefaultTimeout).WithPolling(helpers.DefaultPolling).Should(Succeed())

By("getting the created resource in v2 schema")
obj, err := dynamicClient.Resource(webhookTestV2).Namespace(webhookOperatorInstallNamespace).Get(ctx, conversionWebhookResourceName, metav1.GetOptions{})
Expand All @@ -182,7 +182,7 @@ var _ = Describe("[sig-olmv1][OCPFeatureGate:NewOLMWebhookProviderOpenshiftServi
secret := &corev1.Secret{}
err := k8sClient.Get(ctx, client.ObjectKey{Name: certificateSecretName, Namespace: webhookOperatorInstallNamespace}, secret)
g.Expect(err).ToNot(HaveOccurred(), fmt.Sprintf("failed to get secret %s/%s", webhookOperatorInstallNamespace, certificateSecretName))
}).WithTimeout(1 * time.Minute).WithPolling(5 * time.Second).Should(Succeed())
}).WithTimeout(helpers.DefaultTimeout).WithPolling(helpers.DefaultPolling).Should(Succeed())

By("checking webhook is responsive through secret recreation after manual deletion")
tlsSecret := &corev1.Secret{
Expand Down Expand Up @@ -224,7 +224,7 @@ var _ = Describe("[sig-olmv1][OCPFeatureGate:NewOLMWebhookProviderOpenshiftServi
}
g.Expect(err).ToNot(HaveOccurred(), fmt.Sprintf("failed to get webhook service certificate secret %s/%s: %v", webhookOperatorInstallNamespace, certificateSecretName, err))
g.Expect(secret.Data).ToNot(BeEmpty(), "expected webhook service certificate secret data to not be empty after recreation")
}).WithTimeout(5*time.Minute).WithPolling(10*time.Second).Should(Succeed(), "webhook service certificate secret did not get recreated and populated within timeout")
}).WithTimeout(helpers.DefaultTimeout).WithPolling(helpers.DefaultPolling).Should(Succeed(), "webhook service certificate secret did not get recreated and populated within timeout")

Eventually(func(g Gomega) {
resourceName := fmt.Sprintf("tls-deletion-test-%s", rand.String(5))
Expand All @@ -235,7 +235,7 @@ var _ = Describe("[sig-olmv1][OCPFeatureGate:NewOLMWebhookProviderOpenshiftServi

err = dynamicClient.Resource(webhookTestV1).Namespace(webhookOperatorInstallNamespace).Delete(ctx, resource.GetName(), metav1.DeleteOptions{})
g.Expect(client.IgnoreNotFound(err)).ToNot(HaveOccurred(), fmt.Sprintf("failed to delete test resource %s: %v", resourceName, err))
}).WithTimeout(5 * time.Minute).WithPolling(10 * time.Second).Should(Succeed())
}).WithTimeout(helpers.DefaultTimeout).WithPolling(helpers.DefaultPolling).Should(Succeed())
})
})

Expand Down Expand Up @@ -290,7 +290,7 @@ func setupWebhookOperator(ctx SpecContext, k8sClient client.Client, webhookOpera
err := k8sClient.Get(ctx, client.ObjectKey{Name: webhookOperatorInstallNamespace}, tempNs)
g.Expect(client.IgnoreNotFound(err)).To(Succeed())
g.Expect(apierrors.IsNotFound(err)).To(BeTrue(), "namespace still exists")
}).WithTimeout(5 * time.Minute).WithPolling(5 * time.Second).Should(Succeed())
}).WithTimeout(helpers.DefaultTimeout).WithPolling(helpers.DefaultPolling).Should(Succeed())
})

saName := fmt.Sprintf("%s-installer", webhookOperatorInstallNamespace)
Expand Down Expand Up @@ -335,7 +335,7 @@ func setupWebhookOperator(ctx SpecContext, k8sClient client.Client, webhookOpera
err := k8sClient.Get(ctx, client.ObjectKey{Name: ce.Name}, tempCE)
g.Expect(client.IgnoreNotFound(err)).To(Succeed())
g.Expect(apierrors.IsNotFound(err)).To(BeTrue(), "ClusterExtension still exists")
}).WithTimeout(5 * time.Minute).WithPolling(5 * time.Second).Should(Succeed())
}).WithTimeout(helpers.DefaultTimeout).WithPolling(helpers.DefaultPolling).Should(Succeed())
})

By("waiting for the webhook operator to be installed")
Expand All @@ -349,7 +349,7 @@ func setupWebhookOperator(ctx SpecContext, k8sClient client.Client, webhookOpera
g.Expect(err).ToNot(HaveOccurred(), fmt.Sprintf("failed to get webhook service %s/%s: %v", webhookOperatorInstallNamespace, serviceName, err))
g.Expect(svc.Spec.ClusterIP).ToNot(BeEmpty(), "expected webhook service to have a ClusterIP assigned")
g.Expect(svc.Spec.Ports).ToNot(BeEmpty(), "expected webhook service to have ports defined")
}).WithTimeout(1*time.Minute).WithPolling(5*time.Second).Should(Succeed(), "webhook service did not become ready within timeout")
}).WithTimeout(helpers.DefaultTimeout).WithPolling(helpers.DefaultPolling).Should(Succeed(), "webhook service did not become ready within timeout")

By("waiting for the webhook operator's service certificate secret to exist and be populated")
Eventually(func(g Gomega) {
Expand All @@ -365,7 +365,7 @@ func setupWebhookOperator(ctx SpecContext, k8sClient client.Client, webhookOpera
g.Expect(err).ToNot(HaveOccurred(), fmt.Sprintf("failed to get webhook service certificate secret %s/%s: %v",
webhookOperatorInstallNamespace, webhookServiceCert, err))
g.Expect(secret.Data).ToNot(BeEmpty(), "expected webhook service certificate secret data to not be empty")
}).WithTimeout(5*time.Minute).WithPolling(5*time.Second).Should(Succeed(), "webhook service certificate secret did not become available within timeout")
}).WithTimeout(helpers.DefaultTimeout).WithPolling(helpers.DefaultPolling).Should(Succeed(), "webhook service certificate secret did not become available within timeout")

By("setupWebhookOperator completed - ClusterExtension is ready for test to use")
}
Expand Down