Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: canary step analysis run wasn't terminated as keep running after promote action being called. Fixes #3220 #3221

Merged

Conversation

oleksandr-codefresh
Copy link
Contributor

fixes #3220

Checklist:

  • Either (a) I've created an enhancement proposal and discussed it with the community, (b) this is a bug fix, or (c) this is a chore.
  • The title of the PR is (a) conventional with a list of types and scopes found here, (b) states what changed, and (c) suffixes the related issues number. E.g. "fix(controller): Updates such and such. Fixes #1234".
  • I've signed my commits with DCO
  • I have written unit and/or e2e tests for my change. PRs without these are unlikely to be merged.
  • My builds are green. Try syncing with master if they are not.
  • My organization is added to USERS.md.

… promote action being called

Signed-off-by: oleksandr-codefresh <oleksandr.saulyak@codefresh.io>
@oleksandr-codefresh oleksandr-codefresh force-pushed the fix/analysis-run-not-terminated branch from 758b6de to 3d93386 Compare December 6, 2023 16:50
@oleksandr-codefresh oleksandr-codefresh changed the title fix: canary step analysis run wasn't terminated as keep running after promote action being called fix: canary step analysis run wasn't terminated as keep running after promote action being called. Fixes #3220 Dec 6, 2023
Copy link
Contributor

github-actions bot commented Dec 6, 2023

Go Published Test Results

2 090 tests   2 090 ✔️  2m 49s ⏱️
   118 suites         0 💤
       1 files           0

Results for commit 1d0c273.

♻️ This comment has been updated with latest results.

Copy link
Contributor

github-actions bot commented Dec 6, 2023

E2E Tests Published Test Results

    4 files      4 suites   3h 31m 16s ⏱️
106 tests   94 ✔️   6 💤 6
432 runs  400 ✔️ 24 💤 8

For more details on these failures, see this check.

Results for commit 1d0c273.

♻️ This comment has been updated with latest results.

Copy link

codecov bot commented Dec 7, 2023

Codecov Report

All modified and coverable lines are covered by tests ✅

Comparison is base (1305129) 81.81% compared to head (1d0c273) 81.83%.

Additional details and impacted files
@@            Coverage Diff             @@
##           master    #3221      +/-   ##
==========================================
+ Coverage   81.81%   81.83%   +0.01%     
==========================================
  Files         135      135              
  Lines       20627    20629       +2     
==========================================
+ Hits        16876    16881       +5     
+ Misses       2880     2877       -3     
  Partials      871      871              

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@zachaller
Copy link
Collaborator

Can we get a unit and/or e2e test for this?

@oleksandr-codefresh
Copy link
Contributor Author

oleksandr-codefresh commented Dec 7, 2023

@zachaller was thinking about that, but you don't have any unit tests for this method (reconcileStepBasedAnalysisRun) ATM

@zachaller
Copy link
Collaborator

We do this function get's called via this https://github.com/argoproj/argo-rollouts/blob/master/rollout/analysis_test.go#L167 we spin up a controller there with a fake k8s client which will reconcile which ends up calling that function eventually.

@oleksandr-codefresh
Copy link
Contributor Author

ok, will try to add

…rminated as keep running after promote action being called

Signed-off-by: oleksandr-codefresh <oleksandr.saulyak@codefresh.io>
@oleksandr-codefresh
Copy link
Contributor Author

@zachaller added

Copy link

sonarqubecloud bot commented Dec 8, 2023

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

No Coverage information No Coverage information
6.9% 6.9% Duplication

@oleksandr-codefresh
Copy link
Contributor Author

@zachaller Hi, could you pls take a look?

@zachaller zachaller merged commit 0300af1 into argoproj:master Dec 11, 2023
24 checks passed
oleksandr-codefresh added a commit to codefresh-io/argo-rollouts that referenced this pull request Jan 18, 2024
… promote action being called. Fixes argoproj#3220 (argoproj#3221)

* fix: canary step analysis run wasn't terminated as keep running after promote action being called

Signed-off-by: oleksandr-codefresh <oleksandr.saulyak@codefresh.io>

* fix unit test: added test case for canary step analysis run wasn't terminated as keep running after promote action being called

Signed-off-by: oleksandr-codefresh <oleksandr.saulyak@codefresh.io>

---------

Signed-off-by: oleksandr-codefresh <oleksandr.saulyak@codefresh.io>
Co-authored-by: pasha-codefresh <pavel@codefresh.io>
(cherry picked from commit 0300af1)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Canary rollout: analysis run from previous step remains running after promotion
3 participants