Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

kubevirtci 1.25 provider #872

Closed
wants to merge 3 commits into from
Closed

Conversation

dhiller
Copy link
Contributor

@dhiller dhiller commented Aug 31, 2022

This is a replacement for the automated PR #866

Todo:

/cc @brianmcarey

@kubevirt-bot
Copy link
Contributor

Skipping CI for Draft Pull Request.
If you want CI signal for your change, please convert it to an actual PR.
You can still manually trigger a test run with /test all

@kubevirt-bot kubevirt-bot added do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. dco-signoff: yes Indicates the PR's author has DCO signed all their commits. labels Aug 31, 2022
@kubevirt-bot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please ask for approval from dhiller by writing /assign @dhiller in a comment. For more information see:The Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@dhiller
Copy link
Contributor Author

dhiller commented Aug 31, 2022

/test check-provision-k8s-1.25

@kubevirt-bot
Copy link
Contributor

@dhiller: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
check-provision-k8s-1.25 cbe50bd link false /test check-provision-k8s-1.25

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@dhiller
Copy link
Contributor Author

dhiller commented Sep 14, 2022

We are currently running into an issue when running provision.sh from 1.25 folder:

+ kubeadm config images pull --kubernetes-version 1.25.0
failed to pull image "registry.k8s.io/kube-apiserver:v1.25.0": output: E0914 09:09:41.663018   39216 remote_image.go:238] "PullImage from image service failed" err="rpc error: code = Unknown desc = invalid policy in \"/etc/containers/policy.json\": Unknown key \"keyPaths\"" image="registry.k8s.io/kube-apiserver:v1.25.0"
time="2022-09-14T09:09:41Z" level=fatal msg="pulling image: rpc error: code = Unknown desc = invalid policy in \"/etc/containers/policy.json\": Unknown key \"keyPaths\""
, error: exit status 1
To see the stack trace of this error execute with --v=5 or higher

See cri-o/cri-o#6197

@Barakmor1
Copy link
Member

We are currently running into an issue when running provision.sh from 1.25 folder:

+ kubeadm config images pull --kubernetes-version 1.25.0
failed to pull image "registry.k8s.io/kube-apiserver:v1.25.0": output: E0914 09:09:41.663018   39216 remote_image.go:238] "PullImage from image service failed" err="rpc error: code = Unknown desc = invalid policy in \"/etc/containers/policy.json\": Unknown key \"keyPaths\"" image="registry.k8s.io/kube-apiserver:v1.25.0"
time="2022-09-14T09:09:41Z" level=fatal msg="pulling image: rpc error: code = Unknown desc = invalid policy in \"/etc/containers/policy.json\": Unknown key \"keyPaths\""
, error: exit status 1
To see the stack trace of this error execute with --v=5 or higher

See cri-o/cri-o#6197

The strange things is that this error didn't happen in the logs of this PR:
https://storage.googleapis.com/kubevirt-prow/pr-logs/pull/kubevirt_kubevirtci/872/check-provision-k8s-1.25/1565061005749260288/build-log.txt

kubevirt-bot and others added 3 commits September 14, 2022 14:30
…sure-latest --k8s-provider-dir /home/prow/go/src/github.com/kubevirt/project-infra/../kubevirtci/cluster-provision/k8s --cluster-up-dir /home/prow/go/src/github.com/kubevirt/project-infra/../kubevirtci/cluster-up/cluster

Signed-off-by: kubevirt-bot <kubevirtbot@redhat.com>
See kubevirt#873

Signed-off-by: Daniel Hiller <dhiller@redhat.com>
@Barakmor1
Copy link
Member

Barakmor1 commented Sep 15, 2022

@dhiller @brianmcarey
The is also a problem with rock-ceph
Currently they are working on some workaround:
rook/rook#10826
I will try to update it to 1.10:
https://github.com/rook/rook/pull/10937/files

@oshoval
Copy link
Contributor

oshoval commented Sep 22, 2022

Note that @Barakmor1 also tried to do so, and have problems with macvtap which is part of CNAO

@kubevirt-bot kubevirt-bot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Oct 17, 2022
@kubevirt-bot
Copy link
Contributor

@dhiller: PR needs rebase.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@dhiller
Copy link
Contributor Author

dhiller commented Oct 18, 2022

/close

Was merged with #887

@kubevirt-bot
Copy link
Contributor

@dhiller: Closed this PR.

In response to this:

/close

Was merged with #887

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dco-signoff: yes Indicates the PR's author has DCO signed all their commits. do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. size/XXL
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants