Skip to content

Conversation

@smarterclayton
Copy link
Contributor

Components based on 4.0 but who aren't in the payload should be able
to have their test scripts get access to IMAGE_FORMAT so they can
pull the images built in the ci-operator PR pull run.

To leverage this, in your src based tests use the following in bash:

component=service-catalog
image=$(eval "echo $IMAGE_FORMAT")

which will make $image resolve to registry.svc.ci.openshift.org/namespace/stable:service-catalog

Components based on 4.0 but who aren't in the payload should be able
to have their test scripts get access to IMAGE_FORMAT so they can
pull the images built in the ci-operator PR pull run.

To leverage this, in your src based tests use the following in bash:

    component=service-catalog
    image=$(eval "echo $IMAGE_FORMAT")

which will make $image resolve to `registry.svc.ci.openshift.org/namespace/stable:service-catalog`
@openshift-ci-robot openshift-ci-robot added size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. approved Indicates a PR has been approved by an approver from all required OWNERS files. labels Jan 25, 2019
@smarterclayton
Copy link
Contributor Author

@gabemontero @csrwng @jboyd01

@csrwng
Copy link
Contributor

csrwng commented Jan 25, 2019

/lgtm

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Jan 25, 2019
@openshift-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: csrwng, smarterclayton

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-merge-robot openshift-merge-robot merged commit 14fb8da into openshift:master Jan 25, 2019
@openshift-ci-robot
Copy link
Contributor

@smarterclayton: Updated the following 2 configmaps:

  • prow-job-cluster-launch-installer-src configmap using the following files:
    • key cluster-launch-installer-src.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-src.yaml
  • prow-job-cluster-launch-installer-src configmap in namespace ci-stg using the following files:
    • key cluster-launch-installer-src.yaml using file ci-operator/templates/openshift/installer/cluster-launch-installer-src.yaml
Details

In response to this:

Components based on 4.0 but who aren't in the payload should be able
to have their test scripts get access to IMAGE_FORMAT so they can
pull the images built in the ci-operator PR pull run.

To leverage this, in your src based tests use the following in bash:

component=service-catalog
image=$(eval "echo $IMAGE_FORMAT")

which will make $image resolve to registry.svc.ci.openshift.org/namespace/stable:service-catalog

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

wking added a commit to wking/openshift-release that referenced this pull request Feb 27, 2019
This image has been unused since the e2e template landed in 51df634
(Support an aws installer CI job, 2018-06-07, openshift#928) and since the
Ansible template landed in c35a30a (Add a profile openshift-ansible
custom AWS provisioner, 2018-08-30, openshift#1367).

Also remove the duplicated entry from the src template which landed in
aed67fc (Source installer tests should have access to IMAGE_FORMAT,
2019-01-25, openshift#2701).
@smarterclayton smarterclayton deleted the add_image_format branch April 24, 2019 14:00
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants