Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

prow testing #184

Merged
merged 16 commits into from
Apr 5, 2019
Merged

prow testing #184

merged 16 commits into from
Apr 5, 2019

Conversation

pohly
Copy link
Contributor

@pohly pohly commented Mar 27, 2019

No description provided.

pohly and others added 4 commits March 6, 2019 17:23
If for whatever reasons a repo already had a `release-tools` directory
before doing a clean import of it with `git subtree`, the check used
to fail because it found those old commits.

This can be fixed by telling `git log` to stop when the directory
disappears from the repo. There has to be a commit with removes the
old content, because otherwise `git subtree add` doesn't work.

Fixes: kubernetes-csi/external-resizer#21
verify-subtree.sh: relax check and ignore old content
In repos that have a test/e2e, that test suite should be run
separately because it depends on a running cluster.
This is an unmodified copy of kubernetes/hack/verify-shellcheck.sh
revision d5a3db003916b1d33b503ccd2e4897e094d8af77.
@k8s-ci-robot k8s-ci-robot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Mar 27, 2019
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: pohly

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. labels Mar 27, 2019
@pohly
Copy link
Contributor Author

pohly commented Mar 28, 2019

/test pull-sig-storage-csi-test-kubernetes-master

@pohly
Copy link
Contributor Author

pohly commented Mar 28, 2019

/test pull-sig-storage-csi-test-kubernetes-master

@pohly
Copy link
Contributor Author

pohly commented Mar 28, 2019

/test pull-sig-storage-csi-test-kubernetes-master

@pohly pohly force-pushed the prow branch 2 times, most recently from 0516917 to 3e9b289 Compare March 28, 2019 13:23
@pohly
Copy link
Contributor Author

pohly commented Mar 28, 2019

/test pull-sig-storage-csi-test-kubernetes-master

@pohly
Copy link
Contributor Author

pohly commented Mar 28, 2019

/test pull-sig-storage-csi-test-kubernetes-master

@pohly
Copy link
Contributor Author

pohly commented Mar 28, 2019

/test pull-sig-storage-csi-test-kubernetes-master

@pohly
Copy link
Contributor Author

pohly commented Mar 28, 2019

/test pull-sig-storage-csi-test-kubernetes-master

@pohly
Copy link
Contributor Author

pohly commented Mar 28, 2019

/test pull-sig-storage-csi-test-kubernetes-master

@pohly
Copy link
Contributor Author

pohly commented Mar 29, 2019

/test pull-sig-storage-csi-test-kubernetes-master

These are the modifications that were necessary to call this outside
of Kubernetes. The support for excluding files from checking gets
removed to simplify the script. It shouldn't be needed, because
linting can be enabled after fixing whatever scripts might fail the
check.
By default this only tests the scripts inside the "release-tools"
directory, which is useful when making experimental changes to them in
a component that uses csi-release-tools. But a component can also
enable checking for other directories.
This enables testing of other repos and of this repo itself inside
Prow. Currently supported is unit testing ("make test") and E2E
testing (either via a local test suite or the Kubernetes E2E test
suite applied to the hostpath driver example deployment).

The script passes shellcheck and uses Prow to verify that for future
PRs.
The travis.yml is now the only place where the Go version for the
component itself needs to be configured.
Using the same (recent) Go version for all Kubernetes versions can
break for older versions when there are incompatible changes in Go. To
avoid that, we use exactly the minimum version of Go required for each
Kubernetes version. This is based on the assumption that this
combination was tested successfully.

When building the E2E suite from Kubernetes (the default) we do the
same, but still allow building it from elsewhere.

We allow the Go version to be empty when it doesn't matter.
While switching back and forth between release-1.13 and release-1.14
locally, there was the problem that the local kind image kept using
the wrong kubelet binary despite rebuilding from source. The problem
went away after cleaning the Bazel cache. Exact root cause unknown,
but perhaps using unique tags and properly cleaning the repo helps.

If not, then the unique tags at least will show what the problem is.
Instead of always using the latest E2E tests for all Kubernetes
versions, the plan now is to use the tests that match the Kubernetes
version. However, for 1.13 we have to make an exception because the
suite for that version did not support the necessary
--storage.testdriver parameter.
@pohly
Copy link
Contributor Author

pohly commented Apr 3, 2019

/test pull-sig-storage-csi-test-kubernetes-master

The temporary fork was merged, we can use the upstream repo again.
@pohly
Copy link
Contributor Author

pohly commented Apr 3, 2019

/test pull-sig-storage-csi-test-kubernetes-master

@pohly
Copy link
Contributor Author

pohly commented Apr 3, 2019

/test pull-sig-storage-csi-test-kubernetes-master

@pohly
Copy link
Contributor Author

pohly commented Apr 4, 2019

/test pull-sig-storage-csi-test

@pohly pohly changed the title WIP: prow testing prow testing Apr 4, 2019
@k8s-ci-robot k8s-ci-robot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Apr 4, 2019
@pohly
Copy link
Contributor Author

pohly commented Apr 4, 2019

@msau42 if the test succeeds, then please merge. This is up-to-date with kubernetes-csi/csi-release-tools#9 (= d87eccb).

For csi-test, we need to lock down testing onto a driver that is known
to pass. Testing different versions of the driver with csi-sanity is
done in the csi-driver-host-path repo.
@pohly
Copy link
Contributor Author

pohly commented Apr 5, 2019

pull-sig-storage-csi-test was failing because it was still using the v1.0.1 driver, which (in contrast to the current one) doesn't pass csi-sanity. Should be fixed by bd1c839 .

/test pull-sig-storage-csi-test

@pohly
Copy link
Contributor Author

pohly commented Apr 5, 2019

@msau42 yep, ready for merging.

@msau42
Copy link
Collaborator

msau42 commented Apr 5, 2019

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Apr 5, 2019
@k8s-ci-robot k8s-ci-robot merged commit 851c1ff into kubernetes-csi:master Apr 5, 2019
suneeth51 pushed a commit to suneeth51/csi-test that referenced this pull request Sep 11, 2019
stmcginnis pushed a commit to stmcginnis/csi-test that referenced this pull request Oct 9, 2024
…ubleshooting

SIDECAR_RELEASE_PROCESS.md: add troubleshooting for image publishing
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants