Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Skip runtimeclass test unless provider GCE #104803

Merged
merged 1 commit into from Sep 27, 2021

Conversation

bobbypage
Copy link
Member

What type of PR is this?

/kind bug
/kind cleanup

What this PR does / why we need it:

This test case requires special test-handler setup which is only done for gce clusters created by kube-up scripts. Let's skip the test when run under other providers since it will fail under other environments due to test-handler not being setup.

Which issue(s) this PR fixes:

Fixes #

Special notes for your reviewer:

See #81915 (comment) for some old discussion about this.

Does this PR introduce a user-facing change?

NONE

Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.:


@k8s-ci-robot k8s-ci-robot added release-note-none Denotes a PR that doesn't merit a release note. kind/bug Categorizes issue or PR as related to a bug. kind/cleanup Categorizes issue or PR as related to cleaning up code, process, or technical debt. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. do-not-merge/needs-kind Indicates a PR lacks a `kind/foo` label and requires one. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. do-not-merge/needs-sig Indicates an issue or PR lacks a `sig/foo` label and requires one. needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one. needs-priority Indicates a PR lacks a `priority/foo` label and requires one. area/test and removed do-not-merge/needs-kind Indicates a PR lacks a `kind/foo` label and requires one. labels Sep 6, 2021
@k8s-ci-robot k8s-ci-robot added sig/node Categorizes an issue or PR as relevant to SIG Node. sig/testing Categorizes an issue or PR as relevant to SIG Testing. and removed do-not-merge/needs-sig Indicates an issue or PR lacks a `sig/foo` label and requires one. labels Sep 6, 2021
@bobbypage
Copy link
Member Author

/cc @jprzychodzen

@ehashman ehashman added this to Triage in SIG Node PR Triage Sep 9, 2021
@SergeyKanzhelev SergeyKanzhelev moved this from Triage to PRs - Needs Reviewer in SIG Node CI/Test Board Sep 9, 2021
@SergeyKanzhelev
Copy link
Member

/triage accepted
/priority backlog
/assign

@k8s-ci-robot k8s-ci-robot added triage/accepted Indicates an issue or PR is ready to be actively worked on. priority/backlog Higher priority than priority/awaiting-more-evidence. and removed needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one. needs-priority Indicates a PR lacks a `priority/foo` label and requires one. labels Sep 9, 2021
@jprzychodzen
Copy link
Contributor

/retest

@jkaniuk
Copy link
Contributor

jkaniuk commented Sep 14, 2021

I think that should run a Pod requesting a RuntimeClass with scheduling without taints should also be skipped on GKE

This test case requires special test-handler setup which is only done
for gce clusters created by kube-up scripts. Let's skip the test when
run under other providers.
@bobbypage bobbypage force-pushed the runtimeclass-skip branch 2 times, most recently from d40f22b to 4b056a6 Compare September 14, 2021 20:23
@k8s-ci-robot k8s-ci-robot added size/S Denotes a PR that changes 10-29 lines, ignoring generated files. and removed size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels Sep 14, 2021
@bobbypage
Copy link
Member Author

I think that should run a Pod requesting a RuntimeClass with scheduling without taints should also be skipped on GKE

Thanks, also added skip for this test. It also required runtime class handler to be setup.

@bobbypage
Copy link
Member Author

/assign @SergeyKanzhelev

@jkaniuk
Copy link
Contributor

jkaniuk commented Sep 17, 2021

/retest

1 similar comment
@jkaniuk
Copy link
Contributor

jkaniuk commented Sep 23, 2021

/retest

@jkaniuk
Copy link
Contributor

jkaniuk commented Sep 24, 2021

/lgtm
/retest

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Sep 24, 2021
@k8s-ci-robot
Copy link
Contributor

@bobbypage: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
pull-kubernetes-node-kubelet-serial 4b056a6 link false /test pull-kubernetes-node-kubelet-serial

Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@ehashman
Copy link
Member

These tests are broken/disabled on OpenShift right now, probably for this exact reason: https://bugzilla.redhat.com/show_bug.cgi?id=1923737#c5

I have one concern though... this feature is supposedly GA: kubernetes/enhancements#585 (comment)

Hence I don't think we should have environment-specific tests for it. Before we merge, what other coverage do we have for RuntimeClasses?

@SergeyKanzhelev
Copy link
Member

Hence I don't think we should have environment-specific tests for it.

It is configuration specific, I think environment check here is a simplest proxy to validate that the needed runtime class was configured for the test.

Before we merge, what other coverage do we have for RuntimeClasses?

I don't think there are any coverage for success path execution fro the pod scheduling with the runtime class. Reject is being tested all right.

@ehashman ehashman moved this from PRs - Needs Reviewer to PRs - Needs Approver in SIG Node CI/Test Board Sep 27, 2021
Copy link
Member

@ehashman ehashman left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/approve

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: bobbypage, ehashman

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Sep 27, 2021
@k8s-ci-robot k8s-ci-robot merged commit 7c1e37e into kubernetes:master Sep 27, 2021
SIG Node CI/Test Board automation moved this from PRs - Needs Approver to Done Sep 27, 2021
@k8s-ci-robot k8s-ci-robot added this to the v1.23 milestone Sep 27, 2021
@liggitt
Copy link
Member

liggitt commented Sep 28, 2021

didn't this skip tests that previously ran successfully in other envs (like https://testgrid.k8s.io/sig-release-1.22-blocking#kind-1.22-parallel&include-filter-by-regex=requesting%20a%20RuntimeClass)?

shouldn't we detect whether the runtimeclass is loaded rather than pinning to a particular provider?

@bobbypage
Copy link
Member Author

bobbypage commented Sep 28, 2021

didn't this skip tests that previously ran successfully in other envs (like https://testgrid.k8s.io/sig-release-1.22-blocking#kind-1.22-parallel&include-filter-by-regex=requesting%20a%20RuntimeClass)?

shouldn't we detect whether the runtimeclass is loaded rather than pinning to a particular provider?

Thanks Jordan for mentioning that. I wasn't aware that kind also sets up runtime class handler, it looks like it does so here.

shouldn't we detect whether the runtimeclass is loaded rather than pinning to a particular provider?

I agree this would be ideal, but unfortunately we don't really know easily during runtime if the runtime class is configured because it requires the underlying CRI implementation (containerd / crio) config to have explicit test-handler configured. AFAIU I'm aware this is only setup for kind and GCE provider. I suppose we could do something like have the test SSH into the node and dump the containerd config file and grep for test-handler but it seems a bit hacky as well :)

@hakman
Copy link
Member

hakman commented Dec 15, 2021

@bobbypage @liggitt These tests are used by other projects too (like kOps - kubernetes/kops#12974).
https://prow.k8s.io/view/gs/kubernetes-jenkins/pr-logs/pull/kops/12974/pull-kops-e2e-k8s-gce-ci/1471056821153173504

Usually tests that need a special setup to run are named [Feature: and can be later skipped by the [Feature:.+] pattern. Would this be acceptable in this case too?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. area/test cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/bug Categorizes issue or PR as related to a bug. kind/cleanup Categorizes issue or PR as related to cleaning up code, process, or technical debt. lgtm "Looks good to me", indicates that a PR is ready to be merged. priority/backlog Higher priority than priority/awaiting-more-evidence. release-note-none Denotes a PR that doesn't merit a release note. sig/node Categorizes an issue or PR as relevant to SIG Node. sig/testing Categorizes an issue or PR as relevant to SIG Testing. size/S Denotes a PR that changes 10-29 lines, ignoring generated files. triage/accepted Indicates an issue or PR is ready to be actively worked on.
Development

Successfully merging this pull request may close these issues.

None yet

8 participants