Skip to content

Conversation

@stevekuznetsov
Copy link
Contributor

@stevekuznetsov stevekuznetsov commented Nov 17, 2019

Signed-off-by: Steve Kuznetsov [email protected]

/cc @bbguimaraes @AlexNPavel

When we get support for the registry in rehearsal I can add a job that runs these things

TODO

  • image for bootstrap must-gather that has jq ssh and curl
  • rehearsed job that uses this stuff to run e2e
  • all the install steps ... @bbguimaraes what is our workflow for changing install config? It's going to be really horrendous if the "FIPS" step is running a full container to add one line to the end of the install-config YAML with a cat
  • bootstrap OWNERS in these dirs
  • add a presubmit for YAML lint and/or shell lint and/or python?
  • bespoke artifacts script into python from shell?
  • do we have a better way to do this incrementally?

@openshift-ci-robot openshift-ci-robot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Nov 17, 2019
@openshift-ci-robot openshift-ci-robot added the size/L Denotes a PR that changes 100-499 lines, ignoring generated files. label Nov 17, 2019
@openshift-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: stevekuznetsov

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci-robot openshift-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Nov 17, 2019
@stevekuznetsov stevekuznetsov force-pushed the skuznets/bootstrap-registry-contents branch 3 times, most recently from 868a450 to b8a3208 Compare November 17, 2019 21:41
@stevekuznetsov stevekuznetsov force-pushed the skuznets/bootstrap-registry-contents branch from b8a3208 to 23ca2ce Compare November 18, 2019 22:56
@stevekuznetsov
Copy link
Contributor Author

/retitle Bootstrap step registry with cluster-launch-e2e items

Going to get this in so we have something in the registry

@openshift-ci-robot openshift-ci-robot changed the title [WIP] Bootstrap step registry with cluster-launch-e2e items Bootstrap step registry with cluster-launch-e2e items Dec 3, 2019
@openshift-ci-robot openshift-ci-robot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Dec 3, 2019
@stevekuznetsov stevekuznetsov added the lgtm Indicates that a PR is ready to be merged. label Dec 3, 2019
@openshift-merge-robot openshift-merge-robot merged commit 9ea7734 into openshift:master Dec 3, 2019
@openshift-ci-robot
Copy link
Contributor

@stevekuznetsov: Updated the step-registry configmap in namespace ci at cluster default using the following files:

  • key ipi-deprovision-artifacts-artifacts-commands.sh using file ci-operator/step-registry/ipi/deprovision/artifacts/artifacts/ipi-deprovision-artifacts-artifacts-commands.sh
  • key ipi-deprovision-artifacts-artifacts-ref.yaml using file ci-operator/step-registry/ipi/deprovision/artifacts/artifacts/ipi-deprovision-artifacts-artifacts-ref.yaml
  • key ipi-deprovision-artifacts-bootstrap-commands.sh using file ci-operator/step-registry/ipi/deprovision/artifacts/bootstrap/ipi-deprovision-artifacts-bootstrap-commands.sh
  • key ipi-deprovision-artifacts-bootstrap-ref.yaml using file ci-operator/step-registry/ipi/deprovision/artifacts/bootstrap/ipi-deprovision-artifacts-bootstrap-ref.yaml
  • key ipi-deprovision-artifacts-chain.yaml using file ci-operator/step-registry/ipi/deprovision/artifacts/ipi-deprovision-artifacts-chain.yaml
  • key ipi-deprovision-artifacts-must-gather-commands.sh using file ci-operator/step-registry/ipi/deprovision/artifacts/must-gather/ipi-deprovision-artifacts-must-gather-commands.sh
  • key ipi-deprovision-artifacts-must-gather-ref.yaml using file ci-operator/step-registry/ipi/deprovision/artifacts/must-gather/ipi-deprovision-artifacts-must-gather-ref.yaml
  • key ipi-deprovision-deprovision-commands.sh using file ci-operator/step-registry/ipi/deprovision/deprovision/ipi-deprovision-deprovision-commands.sh
  • key ipi-deprovision-deprovision-ref.yaml using file ci-operator/step-registry/ipi/deprovision/deprovision/ipi-deprovision-deprovision-ref.yaml
  • key ipi-deprovision-chain.yaml using file ci-operator/step-registry/ipi/deprovision/ipi-deprovision-chain.yaml
  • key ipi-install-install-commands.sh using file ci-operator/step-registry/ipi/install/install/ipi-install-install-commands.sh
  • key ipi-install-install-ref.yaml using file ci-operator/step-registry/ipi/install/install/ipi-install-install-ref.yaml
  • key ipi-install-chain.yaml using file ci-operator/step-registry/ipi/install/ipi-install-chain.yaml
  • key ipi-install-rbac-commands.sh using file ci-operator/step-registry/ipi/install/rbac/ipi-install-rbac-commands.sh
  • key ipi-install-rbac-ref.yaml using file ci-operator/step-registry/ipi/install/rbac/ipi-install-rbac-ref.yaml
  • key ipi-workflow.yaml using file ci-operator/step-registry/ipi/ipi-workflow.yaml
Details

In response to this:

Signed-off-by: Steve Kuznetsov [email protected]

/cc @bbguimaraes @AlexNPavel

When we get support for the registry in rehearsal I can add a job that runs these things

TODO

  • image for bootstrap must-gather that has jq ssh and curl
  • rehearsed job that uses this stuff to run e2e
  • all the install steps ... @bbguimaraes what is our workflow for changing install config? It's going to be really horrendous if the "FIPS" step is running a full container to add one line to the end of the install-config YAML with a cat
  • bootstrap OWNERS in these dirs
  • add a presubmit for YAML lint and/or shell lint and/or python?
  • bespoke artifacts script into python from shell?
  • do we have a better way to do this incrementally?

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

wking added a commit to wking/openshift-release that referenced this pull request Mar 25, 2020
The directory was from 23ca2ce (Bootstrap step registry with IPI
steps, 2019-11-17, openshift#5962).  But chains and refs are distinct types; we
don't need to use separate subdirectories to further distinguish their
names.
wking added a commit to wking/openshift-release that referenced this pull request Mar 25, 2020
The directory was from 23ca2ce (Bootstrap step registry with IPI
steps, 2019-11-17, openshift#5962).  But chains and refs are distinct types; we
don't need to use separate subdirectories to further distinguish their
names.
wking added a commit to wking/openshift-release that referenced this pull request Apr 6, 2020
Missing from the script since it landed in 23ca2ce (Bootstrap step
registry with IPI steps, 2019-11-17, openshift#5962).  We need the wait to
drain out the queue before the container exits.  The bare 'wait' (with
no arguments) means we always exit 0, but this log gathering is
already not caring about errors, so that's not a functional change.
wking added a commit to wking/openshift-release that referenced this pull request Jun 24, 2020
The directory was from 23ca2ce (Bootstrap step registry with IPI
steps, 2019-11-17, openshift#5962).  But chains and refs are distinct types; we
don't need to use separate subdirectories to further distinguish their
names.
wking added a commit to wking/openshift-release that referenced this pull request Jun 24, 2020
The directory was from 23ca2ce (Bootstrap step registry with IPI
steps, 2019-11-17, openshift#5962).  But chains and refs are distinct types; we
don't need to use separate subdirectories to further distinguish their
names, especially since openshift/ci-tools@dd11c766ed
(rehearse,registry: make explicit maps for type in NodeByName,
2020-05-19, openshift/ci-tools#818).
wking added a commit to wking/openshift-release that referenced this pull request Jan 14, 2022
We've had these in the steps since the steps were created in
23ca2ce (Bootstrap step registry with IPI steps, 2019-11-17, openshift#5962).
It seems to have originally descended from 51df634 (Support an aws
installer CI job, 2018-06-07, openshift#928), where it was used to copy 'oc'
from the test container into the teardown container.  But since the
gather commands are run directly from the 'cli' image, there's no need
for that sort of hoop-jumping.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants