Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

E2E framework #304

Merged
merged 1 commit into from
Mar 1, 2022
Merged

E2E framework #304

merged 1 commit into from
Mar 1, 2022

Conversation

nckturner
Copy link
Contributor

@nckturner nckturner commented Feb 4, 2022

What type of PR is this?

/kind cleanup

What this PR does / why we need it:

Add e2e test runner based on kubetest2.

Which issue(s) this PR fixes:

Fixes #

Special notes for your reviewer:

Requires:

EDIT: this will be required in a future iteration, once we take full advantage of kubetest2.

Does this PR introduce a user-facing change?:

None

@k8s-ci-robot k8s-ci-robot added release-note-none Denotes a PR that doesn't merit a release note. do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. kind/cleanup Categorizes issue or PR as related to cleaning up code, process, or technical debt. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. labels Feb 4, 2022
@nckturner nckturner changed the title E2e framework E2E framework Feb 4, 2022
@k8s-ci-robot k8s-ci-robot added the size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. label Feb 4, 2022
@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Feb 4, 2022
@nckturner nckturner force-pushed the e2e-framework branch 2 times, most recently from 276366c to b0353e9 Compare February 4, 2022 18:56
hack/install-e2e-tools.sh Outdated Show resolved Hide resolved
Copy link

@adityavenneti adityavenneti left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/approve

@linux-foundation-easycla
Copy link

linux-foundation-easycla bot commented Feb 16, 2022

CLA Signed

The committers are authorized under a signed CLA.

@k8s-ci-robot k8s-ci-robot added cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. and removed cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. labels Feb 16, 2022
@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. and removed cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. labels Feb 16, 2022
-v 2 \
--up \
--run-id=${test_run_id} \
--cloud-provider=aws \
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

need to build and deploy a ccm as built from the current PR

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The way kops solves this is to upload the image as file and sideload it. May be doable for CCM too.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Spoke with @olemarkus about this possibility and it sound interesting, (especially when using the ECR kubelet image credential provider). He is going to do some exploratory work but in the meantime we will just push to ECR and expect an ECR repository to be present in the current account.

@nckturner nckturner force-pushed the e2e-framework branch 4 times, most recently from 6cdb3eb to d0c3af7 Compare February 28, 2022 23:06
hack/e2e/run.sh Outdated

echo "Building and pushing test driver image to ${IMAGE_NAME}:${IMAGE_TAG}"
aws ecr get-login-password --region "${REGION}" | docker login --username AWS --password-stdin "${AWS_ACCOUNT_ID}.dkr.ecr.${REGION}.amazonaws.com"
docker tag "${IMAGE}" "${IMAGE_NAME}:${IMAGE_TAG}"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

is IMAGE expected to be an arg? no magic allowed, it should be defined at the top with other args

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

might need some prefixes to disambiguate IMAGE from IMAGE_NAME and IMAGE_TAG... IMAGE is the image that is assumed t o exist, IMAGE_NAME:IMAGE_TAG is the destination to push it to

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Updated to use $MAKE_ prefix to differentiate variables passed from Makefile.


//. "github.com/onsi/ginkgo"

type ServiceDetails struct {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't really understand the organization of these files

example_tester.go
specs.go
testsuites.go

plz shuffle them or add some comments explaining it

- Use ginkgo binary to run the tests for now instead of using the kops
kubetest2 tester.  We can improve this once we have the ability to run
arbitrary e2e.test binaries with the kops tester.
@wongma7
Copy link
Contributor

wongma7 commented Mar 1, 2022

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Mar 1, 2022
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: adityavenneti, nckturner, wongma7

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@nckturner
Copy link
Contributor Author

/unhold

@k8s-ci-robot k8s-ci-robot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Mar 1, 2022
@k8s-ci-robot k8s-ci-robot merged commit 564792e into kubernetes:master Mar 1, 2022
k8s-ci-robot added a commit that referenced this pull request Mar 1, 2022
…stream-release-1.22

Automated cherry pick of #304: E2E framework
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/cleanup Categorizes issue or PR as related to cleaning up code, process, or technical debt. lgtm "Looks good to me", indicates that a PR is ready to be merged. release-note-none Denotes a PR that doesn't merit a release note. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants