Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

enable pairing with branches from ksctl repository #1030

Merged

Conversation

MatousJobanek
Copy link
Collaborator

@MatousJobanek MatousJobanek commented Aug 12, 2024

Since the e2e test setup is increasingly dependent on ksctl commands, I introduced a possibility of pairing between toolchain-e2e and ksctl.

  • It's only one-directional - the e2e tests are not executed in ksctl repo for now. It can be changed later.
  • It's not included into the limit that we can pair only one PR (host/member/reg-service) with only one PR from toolchain-e2e repo. In other words, it can be combined with it.
  • it's not included in the migration test suite for now
  • local execution uses ksctl version from master if not specified otherwise via env variables USE_INSTALLED_KSCTL or KSCTL_REPO_PATH. The UX can be changed later.

paired PR kubesaw/ksctl#58 (expecting to fail when generating tier manifests)

Copy link
Contributor

@alexeykazakov alexeykazakov left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

@MatousJobanek
Copy link
Collaborator Author

/retest
the paired PR was closed and the branch was deleted

Copy link

sonarcloud bot commented Aug 13, 2024

Copy link
Contributor

@mfrancisc mfrancisc left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks great 👍

Thanks a lot for creating this and for answering my comments!

minor note - maybe we could document somewhere these variables:
USE_INSTALLED_KSCTL=true would use the installed ksctl version
KSCTL_REPO_PATH=/my/local/path/to/ksctl/ would build your local version of ksctl

WDYT?

Copy link

openshift-ci bot commented Aug 13, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: alexeykazakov, MatousJobanek, mfrancisc

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:
  • OWNERS [MatousJobanek,alexeykazakov,mfrancisc]

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@MatousJobanek MatousJobanek merged commit 74da2b9 into codeready-toolchain:master Aug 13, 2024
7 of 8 checks passed
sadlerap added a commit to sadlerap/infra-deployments that referenced this pull request Aug 13, 2024
With [PR redhat-appstudio#1030] landing in toolchain-e2e, tests now will try to pair an
open PR against toolchain-e2e with an open PR against [ksctl].  We're
always going to run tests with the latest version of ksctl, so we should
install it before deploying member-operator.

[PR redhat-appstudio#1030]: codeready-toolchain/toolchain-e2e#1030
[ksctl]: https://github.com/kubesaw/ksctl/

Signed-off-by: Andy Sadler <[email protected]>
rhtap-qe-bots-2 pushed a commit to redhat-appstudio-qe/infra-deployments that referenced this pull request Aug 13, 2024
With [PR redhat-appstudio#1030] landing in toolchain-e2e, tests now will try to pair an
open PR against toolchain-e2e with an open PR against [ksctl].  We're
always going to run tests with the latest version of ksctl, so we should
install it before deploying member-operator.

[PR redhat-appstudio#1030]: codeready-toolchain/toolchain-e2e#1030
[ksctl]: https://github.com/kubesaw/ksctl/

Signed-off-by: Andy Sadler <[email protected]>
rhtap-qe-bots-2 pushed a commit to redhat-appstudio-qe/infra-deployments that referenced this pull request Aug 13, 2024
With [PR redhat-appstudio#1030] landing in toolchain-e2e, tests now will try to pair an
open PR against toolchain-e2e with an open PR against [ksctl].  We're
always going to run tests with the latest version of ksctl, so we should
install it before deploying member-operator.

[PR redhat-appstudio#1030]: codeready-toolchain/toolchain-e2e#1030
[ksctl]: https://github.com/kubesaw/ksctl/

Signed-off-by: Andy Sadler <[email protected]>
redhat-appstudio-qe-bot pushed a commit to redhat-appstudio-qe/infra-deployments that referenced this pull request Aug 13, 2024
With [PR redhat-appstudio#1030] landing in toolchain-e2e, tests now will try to pair an
open PR against toolchain-e2e with an open PR against [ksctl].  We're
always going to run tests with the latest version of ksctl, so we should
install it before deploying member-operator.

[PR redhat-appstudio#1030]: codeready-toolchain/toolchain-e2e#1030
[ksctl]: https://github.com/kubesaw/ksctl/

Signed-off-by: Andy Sadler <[email protected]>
rhtap-qe-bots-2 pushed a commit to redhat-appstudio-qe/infra-deployments that referenced this pull request Aug 13, 2024
With [PR redhat-appstudio#1030] landing in toolchain-e2e, tests now will try to pair an
open PR against toolchain-e2e with an open PR against [ksctl].  We're
always going to run tests with the latest version of ksctl, so we should
install it before deploying member-operator.

[PR redhat-appstudio#1030]: codeready-toolchain/toolchain-e2e#1030
[ksctl]: https://github.com/kubesaw/ksctl/

Signed-off-by: Andy Sadler <[email protected]>
openshift-merge-bot bot pushed a commit to redhat-appstudio/infra-deployments that referenced this pull request Aug 13, 2024
* install ksctl during kubesaw deployment

With [PR #1030] landing in toolchain-e2e, tests now will try to pair an
open PR against toolchain-e2e with an open PR against [ksctl].  We're
always going to run tests with the latest version of ksctl, so we should
install it before deploying member-operator.

[PR #1030]: codeready-toolchain/toolchain-e2e#1030
[ksctl]: https://github.com/kubesaw/ksctl/

Signed-off-by: Andy Sadler <[email protected]>

* install ksctl directly

Signed-off-by: Andy Sadler <[email protected]>

---------

Signed-off-by: Andy Sadler <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants