Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

way to integrate runtime validation with travis.ci #527

Open
liangchenye opened this issue Nov 29, 2017 · 3 comments
Open

way to integrate runtime validation with travis.ci #527

liangchenye opened this issue Nov 29, 2017 · 3 comments

Comments

@liangchenye
Copy link
Member

Once #439 been merged, we will have a very flexible way to verify/certify a runtime. I wrote a demo to explain how we can integrate it with travis.ci.
The approach is similar with code coverage which does these:

  1. using prove validate/*.t > output.txt to get a testing report
  2. send the testing report to a server
  3. add the icon to 'README.md' to show the certification result

I wrote a demo project to show how to achieve this:

  1. a ok demo and a fail demo. In the travis, I generate a 'ok.txt' and 'fail.txt'.
  2. In the travis, I upload them to a server -- 'ocihub.org' which I applied.
  3. In README.md, I added two icons, one is 'ok', one is 'fail'.

In the future, 'runc', 'rkt', runv' and other runtime projects could apply this approach. So both the maintainer/user could be easily know a runtime is conformed with oci spec.

The server code is very simple, I reuse isula/ihub framework.

@wking
Copy link
Contributor

wking commented Nov 29, 2017 via email

@liangchenye
Copy link
Member Author

liangchenye commented Nov 30, 2017

Yes, the admin will send the 'token' to the user, the user can put it in the travis environment.
Taking codecov for example, a user could login by his/her github account. codecov will generate the token and send it to the user automatically. I don't know how many man-power it will cost to develop such a system.

The certification progress is more official. In that case, we may not need to develop a 'token-generate' system. The certification team could just generate it by hand and hand out pre-project credentials to project admins.

@alban
Copy link
Contributor

alban commented Mar 15, 2018

I've run the validation tests on runc with CircleCI: opencontainers/runc#1757

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants