Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update kubevirtci to latest and KubeVirt to 1.0, fix all the tests #187

Merged
merged 2 commits into from
Sep 21, 2023

Conversation

mhenriks
Copy link
Member

What this PR does / why we need it:

Update test environment and make sure all tests pass. Biggest issues around GC now being disabled by default.

Which issue(s) this PR fixes (optional, in fixes #<issue number>(, fixes #<issue_number>, ...) format, will close the issue(s) when PR gets merged):
Fixes #

Special notes for your reviewer:

Release note:

Update test environment to run KubeVirt 1.0 

@kubevirt-bot kubevirt-bot added the dco-signoff: yes Indicates the PR's author has DCO signed all their commits. label Sep 14, 2023
@mhenriks mhenriks force-pushed the update-deps-fix-tests branch 2 times, most recently from 568781a to abb2a23 Compare September 14, 2023 14:17
@mhenriks
Copy link
Member Author

cc @alromeros

Signed-off-by: Michael Henriksen <mhenriks@redhat.com>

By("Creating backup test-backup")
err = framework.CreateBackupForNamespace(timeout, backupName, f.Namespace.Name, snapshotLocation, f.BackupNamespace, true)
Expect(err).ToNot(HaveOccurred())

phase, err := framework.GetBackupPhase(timeout, backupName, f.BackupNamespace)
Expect(err).ToNot(HaveOccurred())
Expect(phase).To(Equal(velerov1api.BackupPhaseCompleted))
Expect(phase).To(Equal(velerov1api.BackupPhasePartiallyFailed))
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This change is related to populators. This test does a backup while clone in progress. Velero does not like that the PVC is Pending. I don't think there is anything we can do on our end to prevent this.

Copy link

@alromeros alromeros left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good! Adding a couple of questions so this looks like a proper review
/lgtm

users:
- "fedora"
qemuGuestAgent: {}
# users:
Copy link

@alromeros alromeros Sep 19, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this a typo or intended? (I mean the commented user)

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

left that there to indicate the actual user used but I'm not sure anyone is looking at these yamls

@@ -60,6 +66,20 @@ func PodWithPvcSpec(podName, pvcName string, cmd, args []string) *v1.Pod {
MountPath: "/pvc",
},
},
SecurityContext: &v1.SecurityContext{

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just nitpick but most of the time I see people using the pointer library, IMO looks cleaner than having vars for each boolean. No need to change anything though.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah I don't disagree

@kubevirt-bot kubevirt-bot added the lgtm Indicates that a PR is ready to be merged. label Sep 19, 2023
Signed-off-by: Michael Henriksen <mhenriks@redhat.com>
@kubevirt-bot kubevirt-bot removed the lgtm Indicates that a PR is ready to be merged. label Sep 20, 2023
@alromeros
Copy link

/lgtm

@kubevirt-bot kubevirt-bot added the lgtm Indicates that a PR is ready to be merged. label Sep 21, 2023
@mhenriks
Copy link
Member Author

/approve

@kubevirt-bot
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: mhenriks

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@kubevirt-bot kubevirt-bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Sep 21, 2023
@kubevirt-bot kubevirt-bot merged commit bacfcd5 into kubevirt:main Sep 21, 2023
5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. dco-signoff: yes Indicates the PR's author has DCO signed all their commits. lgtm Indicates that a PR is ready to be merged. size/XXL
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants