Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: more comments in injectForOrigin function #1264

Merged
merged 2 commits into from May 8, 2023

Conversation

Tiana2018
Copy link
Contributor

@Tiana2018 Tiana2018 commented May 4, 2023

Ⅰ. Describe what this PR does

add some comments in injectForOrigin Function

Ⅱ. Does this pull request fix one issue?

fixes #1251

Ⅲ. Describe how to verify it

Ⅳ. Special notes for reviews

V. Checklist

  • I have written necessary docs and comments
  • I have added necessary unit tests and integration tests
  • All checks passed in make test

@codecov
Copy link

codecov bot commented May 4, 2023

Codecov Report

Patch coverage: 100.00% and project coverage change: +0.17 🎉

Comparison is base (4a493a8) 64.90% compared to head (35f2673) 65.07%.

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #1264      +/-   ##
==========================================
+ Coverage   64.90%   65.07%   +0.17%     
==========================================
  Files         312      312              
  Lines       32660    32661       +1     
==========================================
+ Hits        21197    21254      +57     
+ Misses       9910     9851      -59     
- Partials     1553     1556       +3     
Flag Coverage Δ
unittests 65.07% <100.00%> (+0.17%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

Impacted Files Coverage Δ
...oordlet/runtimehooks/protocol/container_context.go 32.14% <100.00%> (+27.35%) ⬆️

... and 4 files with indirect coverage changes

☔ View full report in Codecov by Sentry.
📢 Do you have feedback about the report comment? Let us know in this issue.

Copy link
Member

@saintube saintube left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@Tiana2018 The CI fails. Please check the DCO and sign-off the commit.

DCO
There is one commit incorrectly signed off. This means that the author of this commit failed to include a Signed-off-by line in the commit message.
To avoid having PRs blocked in the future, always include Signed-off-by: Author Name authoremail@example.com in every commit message. You can also do this automatically by using the -s flag (i.e., git commit -s).

@@ -190,7 +190,9 @@ func (c *ContainerContext) ReconcilerDone(executor resourceexecutor.ResourceUpda
c.injectForOrigin()
}

// Inject illegal parameters
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This comment should be removed. The parameters below are legal.

"testing"

"github.com/koordinator-sh/koordinator/pkg/koordlet/resourceexecutor"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

please move the private pkg at the last

@@ -156,3 +176,85 @@ func TestPodResponse_ProxyDone(t *testing.T) {
})
}
}
func TestPodResponse_ReconcilerDone(t *testing.T) {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

please left a blank line between functions

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for your suggestion.

@saintube
Copy link
Member

saintube commented May 8, 2023

/lgtm
PTAL @zwzhang0107

Copy link
Member

@jasonliu747 jasonliu747 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@jasonliu747 jasonliu747 changed the title proposal: more comments needed to explain in injectForOrigin function chore: more comments in injectForOrigin function May 8, 2023
@zwzhang0107
Copy link
Contributor

/lgtm
/approve

@koordinator-bot
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: zwzhang0107

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@koordinator-bot koordinator-bot bot merged commit 96b6c0b into koordinator-sh:main May 8, 2023
16 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[proposal] empty cpuset string should be ignored in reconciler of koordlet runtime hooks
4 participants