Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Introduces Tekton bundles: take 2 #3142

Merged
merged 1 commit into from
Oct 22, 2020

Conversation

pierretasci
Copy link
Contributor

@pierretasci pierretasci commented Aug 26, 2020

Changes

Introduces Tekton Bundles with docs, apis, examples, and updates to the reconcilers to allow Task and Pipeline references from Tekton Bundles

Note, I had to re-submit this PR to get the CLA to pass

Summary of changes:

  • adds docs for how to use Tekton Bundles as refs including a tekton bundle contract
  • adds a field to task and pipeline refs to specify a tekton bundle url
  • adds validation and tests to the api
  • Wires up the OCI remote fetcher to the pipeline ref and task ref handlers
  • adds tests into the pipelinerun and taskrun reconcilers to test for remote refs
  • requires a change to the way we resolve tasks in the pipelinerun resource handler because we want to decide how to fetch each task ref on a case by case basis instead of using one uniform task fetcher

This is a large change but there are significant side-effects to any one part of this change and it felt half-hearted to only provide the API change to either tasksruns or pipelines and not both at the same time.

Submitter Checklist

  • Includes tests (if functionality changed/added)
  • Includes docs (if user facing)
  • Commit messages follow commit message best practices
  • Release notes block has been filled in or deleted (only if no user facing changes)

Release Notes

Task and Pipeline refs now support remote references via Tekton Bundles. Disabled by default. Enable bundles with feature flag.

@tekton-robot tekton-robot added the release-note Denotes a PR that will be considered when it comes time to generate release notes. label Aug 26, 2020
@linux-foundation-easycla
Copy link

linux-foundation-easycla bot commented Aug 26, 2020

CLA Check
The committers are authorized under a signed CLA.

@tekton-robot tekton-robot added size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Aug 26, 2020
@tekton-robot
Copy link
Collaborator

Hi @pierretasci. Thanks for your PR.

I'm waiting for a tektoncd member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@pritidesai
Copy link
Member

/ok-to-test
/kind feature

@tekton-robot tekton-robot added kind/feature Categorizes issue or PR as related to a new feature. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Aug 27, 2020
@tekton-robot
Copy link
Collaborator

The following is the coverage report on the affected files.
Say /test pull-tekton-pipeline-go-coverage to re-run this coverage report

File Old Coverage New Coverage Delta
internal/builder/v1beta1/pipeline.go 81.8% 82.4% 0.6
internal/builder/v1beta1/task.go 75.5% 75.7% 0.2
pkg/apis/pipeline/v1beta1/pipelinerun_validation.go 96.4% 97.0% 0.5
pkg/apis/pipeline/v1beta1/taskrun_validation.go 97.4% 97.7% 0.3
pkg/reconciler/pipelinerun/pipelinerun.go 86.3% 85.0% -1.4
pkg/reconciler/pipelinerun/resources/pipelineref.go 66.7% 61.9% -4.8
pkg/reconciler/pipelinerun/resources/pipelinerunresolution.go 90.2% 90.3% 0.2
pkg/reconciler/taskrun/resources/taskref.go 75.0% 60.6% -14.4
pkg/reconciler/taskrun/taskrun.go 78.3% 77.3% -1.0
pkg/remote/oci/resolver.go 76.3% 76.9% 0.6

@bobcatfish
Copy link
Collaborator

Note, I had to re-submit this PR to get the CLA to pass

usually force pushing a slightly modified commit works as well (not that that is a great solution either)

@tekton-robot
Copy link
Collaborator

The following is the coverage report on the affected files.
Say /test pull-tekton-pipeline-go-coverage to re-run this coverage report

File Old Coverage New Coverage Delta
internal/builder/v1beta1/pipeline.go 81.8% 82.4% 0.6
internal/builder/v1beta1/task.go 75.5% 75.7% 0.2
pkg/apis/pipeline/v1beta1/pipelinerun_validation.go 96.4% 97.0% 0.5
pkg/apis/pipeline/v1beta1/taskrun_validation.go 97.4% 97.7% 0.3
pkg/reconciler/pipelinerun/pipelinerun.go 86.3% 85.1% -1.2
pkg/reconciler/pipelinerun/resources/pipelineref.go 66.7% 61.9% -4.8
pkg/reconciler/pipelinerun/resources/pipelinerunresolution.go 90.2% 90.3% 0.2
pkg/reconciler/taskrun/resources/taskref.go 75.0% 60.6% -14.4
pkg/reconciler/taskrun/taskrun.go 78.9% 77.9% -1.0
pkg/remote/oci/resolver.go 76.3% 76.9% 0.6

@pritidesai
Copy link
Member

@pierretasci Haven't looked at the changes yet but from the PR policy perspective, we need to squash five commits into one 😞 and fix the release note section, delete extra spaces before "```release-note".

This is very exciting and hoping to review it soon.

Copy link
Member

@imjasonh imjasonh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Lookin' good! Can't wait to see tkn support, especially, looking at the contract docs.

spec:
taskRef:
name: hello-world
bundle: registry.hub.docker.com/ptasci67/test-oci@sha256:7a8e6b41d37e16c86dc38fbb395673fe496edb9ac759aee135df488b55b4c732
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We should move this to a Tekton-owned repo, maybe gcr.io/tekton-nightly?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Absolutely! I don't think I have push access to that repo but I am happy to figure out how to do that or work with someone who does have push permissions.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah what we'll probably end up doing is moving this to a real Go test that pushes a bundle image first then references it, to ensure it's there and up-to-date.

We can stick with this for now, but we should have a TODO to clean it up soon, in case Docker deletes the image or something 😅

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Will do.

// Check that the expected TaskRun was created
actual := actions[1].(ktesting.CreateAction).GetObject().(*v1beta1.TaskRun)
actual := actions[2].(ktesting.CreateAction).GetObject().(*v1beta1.TaskRun)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is there some way we could loop and find the right action, instead of pulling out the one we expect to be right by index? This feels really brittle to implementation changes.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As someone who had to change all these I am highly inclined to agree so to reduce the brittleness I added two helper functions!

funParam := tb.PipelineTaskParam("foo", "somethingfun")
moreFunParam := tb.PipelineTaskParam("bar", "$(params.bar)")
templatedParam := tb.PipelineTaskParam("templatedparam", "$(inputs.workspace.$(params.rev-param))")
ps := tb.Pipeline("test-pipeline",
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'd prefer not to add new usages of test builders if we can avoid it. I'm (slowly) trying to weed them out in favor of structs.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sure. Happy to change it though I am genuinely curious why we are moving away from builders. As the change shows, it is a bit tedious to write out the whole thing.

remotePipelines []runtime.Object
ref *v1beta1.PipelineRef
expected runtime.Object
}{
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nit: you can save some horizontal space by putting both {{s on the same line here.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done.

@imjasonh
Copy link
Member

This is going to have so many merge conflicts with #3115 😅

But this is definitely higher priority than that, so let's get this in first and I'll clean up.

@pierretasci
Copy link
Contributor Author

@pierretasci Haven't looked at the changes yet but from the PR policy perspective, we need to squash five commits into one 😞 and fix the release note section, delete extra spaces before "```release-note".

This is very exciting and hoping to review it soon.

Much appreciated! Done.

@tekton-robot
Copy link
Collaborator

The following is the coverage report on the affected files.
Say /test pull-tekton-pipeline-go-coverage to re-run this coverage report

File Old Coverage New Coverage Delta
internal/builder/v1beta1/pipeline.go 81.8% 82.4% 0.6
internal/builder/v1beta1/task.go 75.5% 75.7% 0.2
pkg/apis/pipeline/v1beta1/pipelinerun_validation.go 96.4% 97.0% 0.5
pkg/apis/pipeline/v1beta1/taskrun_validation.go 97.4% 97.7% 0.3
pkg/reconciler/pipelinerun/pipelinerun.go 86.3% 85.1% -1.2
pkg/reconciler/pipelinerun/resources/pipelineref.go 66.7% 61.9% -4.8
pkg/reconciler/pipelinerun/resources/pipelinerunresolution.go 90.2% 90.3% 0.2
pkg/reconciler/taskrun/resources/taskref.go 75.0% 60.6% -14.4
pkg/reconciler/taskrun/taskrun.go 78.9% 77.9% -1.0
pkg/remote/oci/resolver.go 76.3% 76.9% 0.6

Copy link
Contributor Author

@pierretasci pierretasci left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Addressed feedback from ImJasonH

spec:
taskRef:
name: hello-world
bundle: registry.hub.docker.com/ptasci67/test-oci@sha256:7a8e6b41d37e16c86dc38fbb395673fe496edb9ac759aee135df488b55b4c732
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Absolutely! I don't think I have push access to that repo but I am happy to figure out how to do that or work with someone who does have push permissions.

remotePipelines []runtime.Object
ref *v1beta1.PipelineRef
expected runtime.Object
}{
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done.

// Check that the expected TaskRun was created
actual := actions[1].(ktesting.CreateAction).GetObject().(*v1beta1.TaskRun)
actual := actions[2].(ktesting.CreateAction).GetObject().(*v1beta1.TaskRun)
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As someone who had to change all these I am highly inclined to agree so to reduce the brittleness I added two helper functions!

funParam := tb.PipelineTaskParam("foo", "somethingfun")
moreFunParam := tb.PipelineTaskParam("bar", "$(params.bar)")
templatedParam := tb.PipelineTaskParam("templatedparam", "$(inputs.workspace.$(params.rev-param))")
ps := tb.Pipeline("test-pipeline",
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sure. Happy to change it though I am genuinely curious why we are moving away from builders. As the change shows, it is a bit tedious to write out the whole thing.

@tekton-robot
Copy link
Collaborator

The following is the coverage report on the affected files.
Say /test pull-tekton-pipeline-go-coverage to re-run this coverage report

File Old Coverage New Coverage Delta
internal/builder/v1beta1/pipeline.go 81.8% 82.4% 0.6
internal/builder/v1beta1/task.go 75.5% 75.7% 0.2
pkg/apis/pipeline/v1beta1/pipelinerun_validation.go 96.4% 97.0% 0.5
pkg/apis/pipeline/v1beta1/taskrun_validation.go 97.4% 97.7% 0.3
pkg/reconciler/pipelinerun/pipelinerun.go 86.3% 85.1% -1.2
pkg/reconciler/pipelinerun/resources/pipelineref.go 66.7% 61.9% -4.8
pkg/reconciler/pipelinerun/resources/pipelinerunresolution.go 90.2% 90.3% 0.2
pkg/reconciler/taskrun/resources/taskref.go 75.0% 60.6% -14.4
pkg/reconciler/taskrun/taskrun.go 78.9% 77.9% -1.0
pkg/remote/oci/resolver.go 76.3% 76.9% 0.6

@tekton-robot
Copy link
Collaborator

The following is the coverage report on the affected files.
Say /test pull-tekton-pipeline-go-coverage to re-run this coverage report

File Old Coverage New Coverage Delta
internal/builder/v1beta1/pipeline.go 81.8% 82.4% 0.6
internal/builder/v1beta1/task.go 75.5% 75.7% 0.2
pkg/apis/pipeline/v1beta1/pipelinerun_validation.go 96.4% 97.0% 0.5
pkg/apis/pipeline/v1beta1/taskrun_validation.go 97.4% 97.7% 0.3
pkg/reconciler/pipelinerun/pipelinerun.go 86.3% 85.1% -1.2
pkg/reconciler/pipelinerun/resources/pipelineref.go 66.7% 61.9% -4.8
pkg/reconciler/pipelinerun/resources/pipelinerunresolution.go 90.2% 90.3% 0.2
pkg/reconciler/taskrun/resources/taskref.go 75.0% 60.6% -14.4
pkg/reconciler/taskrun/taskrun.go 78.9% 77.9% -1.0
pkg/remote/oci/resolver.go 76.3% 76.9% 0.6

@imjasonh
Copy link
Member

imjasonh commented Sep 1, 2020

Sure. Happy to change it though I am genuinely curious why we are moving away from builders. As the change shows, it is a bit tedious to write out the whole thing.

There's been some debate about their usefulness, especially compared with the effort it takes to hand-write the builder methods, keep them consistently named with consistent behavior, etc. -- by comparison, simply writing out the structs is natively supported already, and though it might end up being more keystrokes, I think it's actually more readable in the end. So now I'm on a crusade to wipe out test builders everywhere. 😅

```yaml
spec:
tasks:
- name: hello-world
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: i think the - name: list can be unindented a bit.

```yaml
spec:
tasks:
- name: hello-world
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

same here: unindent.

- name: hello-world
taskRef:
name: echo-task
bundle: docker.com/myrepo/mycatalog@sha256:abc123
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I know this is just an example, but I think this should be "index.docker.io/myrepo/mycatalog..."

docs/taskruns.md Outdated
spec:
taskRef:
name: echo-task
bundle: docker.com/myrepo/mycatalog
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

same as above - I think this needs to be index.docker.io for Dockerhub.

docs/taskruns.md Outdated
`metadata.name` field of the `Task`.

You may also specify a `tag` as you would with a Docker image which will give you a fixed,
repeatable reference to a `Task`.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Wouldn't the digest be the "fixed repeatable reference"?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

AFAIK, best practice is to treat tags as fixed elements but that is not an enforced aspect of the spec so I will call out digests as well

docs/taskruns.md Outdated
of the same named `Task` to be run at once.

`Tekton Bundles` may be constructed with any toolsets that produces valid OCI image artifacts so long as
the artifact adheres to the [contract](tekton-bundle-contract.md). Additionally, you may also use the `tkn`
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: the file is named "contracts", not "contract"

Each { `apiVersion`, `kind`, `title` } must be unique in the image. No resources of the
same version and kind can be named the same.

The contents of each layer must be the parsed YAML of the corresponding Tekton resource. If
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is the layer still a gzipped tar file, or just the raw YAML?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good point. This is a bit confusing as worded. The intention is that you should inject a single object into each layer in YAML/JSON form and then perform the standard compression/digesting required by the OCI spec. I will reword this to be more clear

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I looked at the code to see what actually happens, it might be worth specifying a bit more here. Each layer is a raw yaml file, we don't do any "tar-ing". That then gets compressed as it is stored in the registry.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I like this approach - but there are some cons to think through:

  • Do we ever think we'll want to have multiple files per bundle? We can't do that without a tar.
  • "docker pull/docker save" and "crane pull" expect image layers to be tars. The mime type is actually application/vnd.oci.image.layer.v1.tar+gzip - so clients might be expecting a tar here. We could change the mime type, but that might not be supported everywhere.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Admittedly my knowledge of the underlying OCI standard is minimal but I will give it a go based on what I think I know. My understanding is that the go-containerregistry tool before uploading the image, performs the necessary compression and tar'ing to make the image conform to the standard expected by the registry. If that is the case, I believe that means that while we store and read YAML bytes, transiently there is some compressing/decompressing happening.

Also, I am able to store multiple files in a bundle by adding each one as a new layer with the experimental tool I have built. I think that semi-validates my half-understanding that there is some compression happening in the background but I am happy to be wrong here.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So go-containerregistry will compress, but not archive the layer. The mime type it sets by default is tar+gzip, but it's up to you to actually put these bytes into a tar and extract them from a tar when you call "Uncompressed".

I think we have two choices:

cc @jonjohnsonjr, the resident OCI spec expert.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is excellent context that I didn't have so thanks for sharing! Based on your description, to me the latter option makes the most sense because it seems like a waste of space to store uncompressed files in a registry. I will add a note to the contract that the layers must be tar'ed.

KindAnnotation = "dev.tekton.image.kind"
APIVersionAnnotation = "dev.tekton.image.apiVersion"
TitleAnnotation = "dev.tekton.image.name"
MaximumBundleObjects = 10
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is it documented somewhere that we limit to 10 the content of a bundle ?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ah right, make sense. We can change this later on if we need 👍

@vdemeester
Copy link
Member

/lgtm
/meow

@tekton-robot
Copy link
Collaborator

@vdemeester: cat image

In response to this:

/lgtm
/meow

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@tekton-robot tekton-robot added the lgtm Indicates that a PR is ready to be merged. label Oct 15, 2020
@pierretasci
Copy link
Contributor Author

/retest

@pritidesai
Copy link
Member

@pierretasci @vdemeester looks like this has been failing with the same error:

TestTektonBundlesUsingRegularImage: init_test.go:131: Create namespace arendelle-rkgds to deploy to
    TestTektonBundlesUsingRegularImage: init_test.go:147: Verify SA "default" is created in namespace "arendelle-rkgds"
    TestTektonBundlesUsingRegularImage: tektonbundles_test.go:378: Failed to create image. Pod logs are: 
        Getting image source signatures
        time="2020-10-15T18:42:36Z" level=fatal msg="Error trying to reuse blob sha256:98899d80a497fc980938a2dfb0fb37f537262aec96201c52d4246619a60af9b8 at destination: error pinging docker registry registry.arendelle-rkgds.svc.cluster.local:5000: Get http://registry.arendelle-rkgds.svc.cluster.local:5000/v2/: dial tcp 10.91.244.92:5000: connect: connection refused"

@tekton-robot tekton-robot removed the lgtm Indicates that a PR is ready to be merged. label Oct 15, 2020
@pierretasci
Copy link
Contributor Author

@pierretasci @vdemeester looks like this has been failing with the same error:

TestTektonBundlesUsingRegularImage: init_test.go:131: Create namespace arendelle-rkgds to deploy to
    TestTektonBundlesUsingRegularImage: init_test.go:147: Verify SA "default" is created in namespace "arendelle-rkgds"
    TestTektonBundlesUsingRegularImage: tektonbundles_test.go:378: Failed to create image. Pod logs are: 
        Getting image source signatures
        time="2020-10-15T18:42:36Z" level=fatal msg="Error trying to reuse blob sha256:98899d80a497fc980938a2dfb0fb37f537262aec96201c52d4246619a60af9b8 at destination: error pinging docker registry registry.arendelle-rkgds.svc.cluster.local:5000: Get http://registry.arendelle-rkgds.svc.cluster.local:5000/v2/: dial tcp 10.91.244.92:5000: connect: connection refused"

Yeah I am trying to figure out why this is failing in the GKE cluster but not locally. I think there is a timing issue happening here but I can't be sure. What I do know is that skopeo is not behaving the same locally as it does remotely.

@pierretasci
Copy link
Contributor Author

@pierretasci @vdemeester looks like this has been failing with the same error:

TestTektonBundlesUsingRegularImage: init_test.go:131: Create namespace arendelle-rkgds to deploy to
    TestTektonBundlesUsingRegularImage: init_test.go:147: Verify SA "default" is created in namespace "arendelle-rkgds"
    TestTektonBundlesUsingRegularImage: tektonbundles_test.go:378: Failed to create image. Pod logs are: 
        Getting image source signatures
        time="2020-10-15T18:42:36Z" level=fatal msg="Error trying to reuse blob sha256:98899d80a497fc980938a2dfb0fb37f537262aec96201c52d4246619a60af9b8 at destination: error pinging docker registry registry.arendelle-rkgds.svc.cluster.local:5000: Get http://registry.arendelle-rkgds.svc.cluster.local:5000/v2/: dial tcp 10.91.244.92:5000: connect: connection refused"

Yeah I am trying to figure out why this is failing in the GKE cluster but not locally. I think there is a timing issue happening here but I can't be sure. What I do know is that skopeo is not behaving the same locally as it does remotely.

Worse yet, it always succeeds the first time but fails the second time.

@tekton-robot
Copy link
Collaborator

The following is the coverage report on the affected files.
Say /test pull-tekton-pipeline-go-coverage to re-run this coverage report

File Old Coverage New Coverage Delta
internal/builder/v1beta1/pipeline.go 85.7% 86.1% 0.4

@pierretasci
Copy link
Contributor Author

/retest

@tekton-robot
Copy link
Collaborator

The following is the coverage report on the affected files.
Say /test pull-tekton-pipeline-go-coverage to re-run this coverage report

File Old Coverage New Coverage Delta
internal/builder/v1beta1/pipeline.go 85.7% 86.1% 0.4

@tekton-robot
Copy link
Collaborator

The following is the coverage report on the affected files.
Say /test pull-tekton-pipeline-go-coverage to re-run this coverage report

File Old Coverage New Coverage Delta
internal/builder/v1beta1/pipeline.go 85.7% 86.1% 0.4

@tekton-robot
Copy link
Collaborator

The following is the coverage report on the affected files.
Say /test pull-tekton-pipeline-go-coverage to re-run this coverage report

File Old Coverage New Coverage Delta
internal/builder/v1beta1/pipeline.go 85.7% 86.1% 0.4

@tekton-robot
Copy link
Collaborator

The following is the coverage report on the affected files.
Say /test pull-tekton-pipeline-go-coverage to re-run this coverage report

File Old Coverage New Coverage Delta
internal/builder/v1beta1/pipeline.go 85.7% 86.1% 0.4

@pierretasci
Copy link
Contributor Author

/test all

@tekton-robot
Copy link
Collaborator

The following is the coverage report on the affected files.
Say /test pull-tekton-pipeline-go-coverage to re-run this coverage report

File Old Coverage New Coverage Delta
internal/builder/v1beta1/pipeline.go 85.7% 86.1% 0.4

@vdemeester
Copy link
Member

/lgtm
I'll start working on the follow-ups 😉

@tekton-robot tekton-robot added the lgtm Indicates that a PR is ready to be merged. label Oct 21, 2020
@pierretasci
Copy link
Contributor Author

/retest

1 similar comment
@pierretasci
Copy link
Contributor Author

/retest

@tekton-robot tekton-robot merged commit 7e376a0 into tektoncd:master Oct 22, 2020
@mattmoor
Copy link
Member

This regressed Tekton's ability to run e2e tests against clusters without the standard .cluster.local suffix.

I opened #3429 to track.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. kind/feature Categorizes issue or PR as related to a new feature. lgtm Indicates that a PR is ready to be merged. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. release-note Denotes a PR that will be considered when it comes time to generate release notes. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

9 participants