-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Per-Provider Post-Up Setup #2143
Comments
cc @justinsb |
In the abstract, post-up seems like a valid hook. But I question why this wouldn't just be a modification to the existing deployer's "up" I am firm believer that |
@spiffxp: Then you're seemingly opting for (2) above, which is to say "tests should work on the default setup"? |
To be fair, this is my general desire as well - and I believe everything tagged with |
Yeah, I guess I'm opting for 2. Or asking that we find a better way than Varying levels of fidelity here:
I'm open to whatever solves |
Heh, c.f. kubernetes/kubernetes#2953 .. which we haven't implemented. |
FWIW, I made some comments about feature flags in the layers doc: |
/assign @zmerlynn I believe you added this logic to kubetest? Can we close if so? |
Issues go stale after 90d of inactivity. Prevent issues from auto-closing with an If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or |
/area kubetest |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
In the
kops
testing, we're currently disabling NodePort testing, c.f. kubernetes/kops#775 . I just added the-slow
tests as well, and there's more of these issue. Essentially, all of the providers do some tiny amount of post-deployment setup to "ready" the cluster for e2e testing, but becausekops
is outside the normalkube-up
framework, allkops
deployments are as a customer would have them.I see a couple of options here:
kubetest
kops deployment that handles the post-deployment configuration. This could call a kops function, but likely as not, we'd just thunk out to the AWS CLI, or pull in the AWS SDK to kubetest (yay?).kops
testing. This has obvious coverage issues, but lets us filter the tag without specially calling out NodePort.Thoughts from @kubernetes/sig-testing-misc?
The text was updated successfully, but these errors were encountered: