-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ci-build-and-push-k8s-at-golang-tip should test tip of k/k and k/release #34246
ci-build-and-push-k8s-at-golang-tip should test tip of k/k and k/release #34246
Conversation
Signed-off-by: Davanum Srinivas <[email protected]>
/assign @liggitt @BenTheElder |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/approve
Also: We should verify that this is still actually testing with go tip, k/k will control the go version unless you override that and I don't see an override here |
/hold |
@BenTheElder i want to see what happens and then will start tweaking it again |
@@ -25,7 +24,6 @@ periodics: | |||
path_alias: k8s.io/perf-tests |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
does this repo's makefile handle clobbering GOTOOLCHAIN? if not we should add that somewhere
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't think so, but let's patch it there https://github.com/kubernetes/perf-tests/blob/master/golang/
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/hold The intention of this test, together with This is the reason why we use fixed commits for the k/k repo in this job - to make sure that we are able to narrow down such regressions before they are even released in Golang itself and not get noise from the changes to the K8s code in case of a test failure. The k/release repo is also fixed because changes in the scripts from that repo that are used in this CI job had negative impact on that test's stability. Before we had those CI jobs, it took us weeks to narrow down the performance regressions in K8s coming from Golang. These CI jobs allow us to catch them much more quickly, even before they reach Go releases. Rather than using
|
The problem with that approach is that it's not staying up to date, we should use the latest stable tagged release or something and stop hardcoding specific versions
Yes... before which it sat for almost three years exactly meaning it was on an unsupported branch for O(years) - base_sha: 0ff1922aa2269879957646a232f657bcb57824b1 # head of master branch as of 2021-09-25
+ base_sha: 75a8e7ef8b22fe41525d28c1818384aab795f145 # head of master branch as of 2024-09-05 Can we use https://github.com/kubernetes/community/blob/322066e7dba7c5043071392fec427a57f8660734/contributors/devel/sig-release/kubernetes-versions.md to get k8s-stable1 isntead? |
BTW You should check these binaries, I don't think it's actually using the intended go version anyhow for years now: kubernetes/perf-tests#3146 AFAICT this tooling is not overriding how go builds actually work in Kubernetes when it attempts to locally commit a patch to the k/k sources (!), not only is this fragile but at a glance the builds are ignoring go tip and using .go-version anyhow since we've been using GOTOOLCHAIN for some time now. If this script had been using the kubernetes-specific Also, this means the reported commit in the build is a commit that doesn't exist upstream. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: BenTheElder, dims, saschagrunert The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Let's drop the hard coded SHA(s) please
xref: #34237