-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix test issues + increase number of nodes in the cluster #241
Conversation
/lgtm |
6718716
to
7545885
Compare
/hold |
7545885
to
ea8a9f6
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I know you mostly just moved some stuff around, but since you are improving the code maybe look at some of the nits. I am fine if you ignore me.
tests/framework/pod.go
Outdated
}, | ||
Spec: v1.PodSpec{ | ||
SecurityContext: &v1.PodSecurityContext{ | ||
FSGroup: pointer.Int64(uid), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think the pointer
library is deprecated and you should use the ptr
library k8s.io/utils/ptr
. This becomes something like this
ptr.To[int64](uid)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
tests/framework/pod.go
Outdated
}, | ||
}, | ||
SecurityContext: &v1.SecurityContext{ | ||
RunAsNonRoot: pointer.Bool(true), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
same with pointer
to ptr
RunAsNonRoot : ptr.To[bool](true)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
…d of alpha Signed-off-by: Shelly Kagan <[email protected]>
First write to the pvc and only after start the vm, this will prevent the option of pvc already mounted to the virt-launcher and then the writer-pod might fail writing from another pod it will be scheduled on. Also delete redundant stop of vm before deletion. Fixes: https://issues.redhat.com/browse/CNV-39913 Signed-off-by: Shelly Kagan <[email protected]>
*Remove duplicated function (NewPod) *Fix pod security issues by using function that already handles that *Move pod functions to new file *Create and use wait for pod phase function Signed-off-by: Shelly Kagan <[email protected]>
Signed-off-by: Shelly Kagan <[email protected]>
Signed-off-by: Shelly Kagan <[email protected]>
Signed-off-by: Shelly Kagan <[email protected]>
9bc8fc5
to
26fb1a3
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/approve
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: awels, mhenriks The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/unhold |
/cherrypick release-v0.6 |
@ShellyKa13: #241 failed to apply on top of branch "release-v0.6":
In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
What this PR does / why we need it:
We have seen several test issues when running with more then 1 nodes.
This PR fixes those issues and increase the number of nodes running in the CI to better catch this issues.
Changes:
Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes # test 9864 and 10191 d/s
Special notes for your reviewer:
Release note: