Skip to content

Conversation

@soltysh
Copy link

@soltysh soltysh commented Mar 29, 2021

serathius and others added 30 commits March 13, 2021 02:04
…be-test-with-kubelet-version

e2e/common/node: tag tests with MinimumKubeletVersion
Upgrade klog to avoid panics crashing components
Remove double-ownership of PV ResourceQuota tests
Update list of migrated directories
initialise capabilities unit test
Split upgrade tests into sig-owned directories
…cleanup

remove e2e volume registry as it is not used
kubeadm unit test initalize global variables
test: remove gcr.io/gke-release since it is deprecated
Include nltest in the windows busybox image
…ainer`

This enables building the conformance image when running `make
cross-in-a-container`, which is being used by the release engineering
tooling.

Signed-off-by: Sascha Grunert <[email protected]>
Only default Job fields when feature gates are enabled
passing all packages at once to logcheck reduces the time
taken by linter.

Signed-off-by: Umanga Chapagain <[email protected]>
- Adjust the period to trigger PodUpdate event
- Fix lock race between 'changeFile' and 'expectUpdate'
- Await fsnotify to be ready
disable flaky TestClientReceivedGOAWAY test case
@soltysh soltysh force-pushed the rebase-1.21.0-rc.0 branch from d3d95b4 to d101b9e Compare April 6, 2021 16:07
@openshift-ci-robot openshift-ci-robot added the backports/unvalidated-commits Indicates that not all commits come to merged upstream PRs. label Apr 6, 2021
@openshift-ci-robot
Copy link

@soltysh: the contents of this pull request could not be automatically validated.

The following commits are valid:

The following commits could not be validated and must be approved by a top-level approver:

@sttts
Copy link

sttts commented Apr 6, 2021

Tests were green, but we needed a rebase onto master due to merge conflicts.

/lgtm
/approve

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Apr 6, 2021
@openshift-ci-robot
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: mfojtik, soltysh, sttts

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@soltysh
Copy link
Author

soltysh commented Apr 6, 2021

/override ci/prow/verify-commits

@openshift-ci-robot
Copy link

@soltysh: Overrode contexts on behalf of soltysh: ci/prow/verify-commits

Details

In response to this:

/override ci/prow/verify-commits

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

"[Top Level] [sig-network] Conntrack should be able to preserve UDP traffic when server pod cycles for a NodePort service": "should be able to preserve UDP traffic when server pod cycles for a NodePort service [Suite:openshift/conformance/parallel] [Suite:k8s]",

"[Top Level] [sig-network] Conntrack should drop INVALID conntrack entries": "should drop INVALID conntrack entries [Suite:openshift/conformance/parallel] [Suite:k8s]",
"[Top Level] [sig-network] Conntrack should drop INVALID conntrack entries": "should drop INVALID conntrack entries [Disabled:Broken] [Suite:k8s]",

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

looks scary, is it?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Opened https://bugzilla.redhat.com/show_bug.cgi?id=1945329 for networking team to investigate.

@openshift-bot
Copy link

/retest

Please review the full test history for this PR and help us cut down flakes.

2 similar comments
@openshift-bot
Copy link

/retest

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link

/retest

Please review the full test history for this PR and help us cut down flakes.

@soltysh
Copy link
Author

soltysh commented Apr 6, 2021

/test k8s-e2e-gcp

@soltysh
Copy link
Author

soltysh commented Apr 6, 2021

/retest

@soltysh soltysh removed the backports/unvalidated-commits Indicates that not all commits come to merged upstream PRs. label Apr 6, 2021
@openshift-bot
Copy link

/retest

Please review the full test history for this PR and help us cut down flakes.

@soltysh
Copy link
Author

soltysh commented Apr 6, 2021

/retest

@openshift-ci
Copy link

openshift-ci bot commented Apr 6, 2021

@soltysh: The following tests failed, say /retest to rerun all failed tests:

Test name Commit Details Rerun command
ci/prow/e2e-aws-csi d101b9e link /test e2e-aws-csi
ci/prow/e2e-aws-downgrade d101b9e link /test e2e-aws-downgrade

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

wking added a commit to wking/cluster-version-operator that referenced this pull request Apr 7, 2021
Upstream docs [1]:

  kubelet must not be newer than kube-apiserver, and may be up to two
  minor versions older.

The coming OpenShift 4.8 is aiming at 1.21 [2].  This commit will end
up in 4.8.  So when it is considering Upgradeable guards, it is saying
"is the current state compatible with the next OpenShift minor?".  The
next minor will be 4.9, which will presumably run 1.22.  So it will be
compatible with 1.20, 1.21, and 1.22 kubelets.  If for some reason
OpenShift 4.9 ends up being compatible with 1.19 too (say, because it
sticks with 4.8's 1.21), we'll backport a patch to the 4.8
cluster-version operator to bring that wisdom back.  Those
next-minor-knowledge backports are the best we can do unless we get
something like preflight checks [3].

I'm not wildly excited about the current framework.  It has lots of
informers, and I think we might want a single NewSharedInformer to
reduce the number of parallel watches.  It also periodically polls all
of the upgradeable checks, and I would prefer a framework where our
informers fed queues and we had workers processing change events from
those queues to trigger state changes, which should give us lower
latency reactions.  But since we may end up taking this code back to
4.6, the current commit is a minimal addition following the existing
patterns, and we can consider more extensive refactors once we have
the backport-friendly pivot in place.

[1]: https://kubernetes.io/docs/setup/release/version-skew-policy/#kubelet
[2]: openshift/kubernetes#641
[3]: openshift/enhancements#363
@soltysh
Copy link
Author

soltysh commented Apr 7, 2021

/refresh

@soltysh
Copy link
Author

soltysh commented Apr 7, 2021

/override ci/prow/verify-commits

@soltysh
Copy link
Author

soltysh commented Apr 7, 2021

/refresh

@openshift-ci-robot
Copy link

@soltysh: The following tests failed, say /retest to rerun all failed tests:

Test name Commit Details Rerun command
ci/prow/e2e-aws-downgrade d101b9e link /test e2e-aws-downgrade
ci/prow/verify-commits d101b9e link /test verify-commits
ci/prow/e2e-aws-csi d101b9e link /test e2e-aws-csi

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged. vendor-update Touching vendor dir or related files

Projects

None yet

Development

Successfully merging this pull request may close these issues.