Skip to content

Commit

Permalink
UPSTREAM: <carry>: Add OpenShift tooling, images, configs and docs
Browse files Browse the repository at this point in the history
  • Loading branch information
bertinatto committed Dec 10, 2024
1 parent 083a03d commit a4da702
Show file tree
Hide file tree
Showing 4 changed files with 37 additions and 6 deletions.
3 changes: 2 additions & 1 deletion hack/make-rules/test.sh
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,8 @@ kube::test::find_go_packages() {
-e '^k8s.io/kubernetes/test/e2e$' \
-e '^k8s.io/kubernetes/test/e2e_node(/.*)?$' \
-e '^k8s.io/kubernetes/test/e2e_kubeadm(/.*)?$' \
-e '^k8s.io/.*/test/integration(/.*)?$'
-e '^k8s.io/.*/test/integration(/.*)?$' \
-e '^k8s.io/kubernetes/openshift-hack/e2e(/.*)?$'
)
}

Expand Down
36 changes: 31 additions & 5 deletions openshift-hack/e2e/annotate/rules.go
Original file line number Diff line number Diff line change
Expand Up @@ -11,17 +11,22 @@ var (
"[Disabled:Alpha]": {
`\[Feature:StorageVersionAPI\]`,
`\[Feature:InPlacePodVerticalScaling\]`,
`\[Feature:RecoverVolumeExpansionFailure\]`,
`\[Feature:WatchList\]`,
`\[Feature:ServiceCIDRs\]`,
`\[Feature:ClusterTrustBundle\]`,
`\[Feature:SELinuxMount\]`,
`\[FeatureGate:SELinuxMount\]`,
`\[Feature:RelaxedEnvironmentVariableValidation\]`,
`\[Feature:UserNamespacesPodSecurityStandards\]`,
`\[Feature:UserNamespacesSupport\]`, // disabled Beta
`\[Feature:DynamicResourceAllocation\]`,
`\[Feature:VolumeAttributesClass\]`, // disabled Beta
`\[sig-cli\] Kubectl client Kubectl prune with applyset should apply and prune objects`, // Alpha feature since k8s 1.27
// 4.19
`\[Feature:PodLevelResources\]`,
`\[Feature:SchedulerAsyncPreemption\]`,
`\[Feature:RelaxedDNSSearchValidation\]`,
`\[Feature:PodLogsQuerySplitStreams\]`,
`\[Feature:PodLifecycleSleepActionAllowZero\]`,
`\[Feature:volumegroupsnapshot\]`,
},
// tests for features that are not implemented in openshift
"[Disabled:Unimplemented]": {
Expand Down Expand Up @@ -158,11 +163,32 @@ var (
"[Disabled:RebaseInProgress]": {
// https://issues.redhat.com/browse/OCPBUGS-7297
`DNS HostNetwork should resolve DNS of partial qualified names for services on hostNetwork pods with dnsPolicy`,
`\[sig-network\] Connectivity Pod Lifecycle should be able to connect to other Pod from a terminating Pod`, // TODO(network): simple test in k8s 1.27, needs investigation
`\[sig-cli\] Kubectl client Kubectl prune with applyset should apply and prune objects`, // TODO(workloads): alpha feature in k8s 1.27. It's failing with `error: unknown flag: --applyset`. Needs investigation

// https://issues.redhat.com/browse/OCPBUGS-45275
`\[sig-network\] Connectivity Pod Lifecycle should be able to connect to other Pod from a terminating Pod`,

// https://issues.redhat.com/browse/OCPBUGS-17194
`\[sig-node\] ImageCredentialProvider \[Feature:KubeletCredentialProviders\] should be able to create pod with image credentials fetched from external credential provider`,

// https://issues.redhat.com/browse/OCPBUGS-45214
// Even though this feature is not GA in k/k, it will be GA in OCP 4.19, so we should fix it and unskip this test
`\[Feature:volumegroupsnapshot\] VolumeGroupSnapshottable should create snapshots for multiple volumes in a pod`,

// https://issues.redhat.com/browse/OCPBUGS-45220
// `\[sig-api-machinery\] API Streaming`,

// https://issues.redhat.com/browse/OCPBUGS-45273
`\[sig-network\] Services should implement NodePort and HealthCheckNodePort correctly when ExternalTrafficPolicy changes`,

// https://issues.redhat.com/browse/OCPBUGS-45273
`\[sig-cli\] Kubectl Port forwarding Shutdown client connection while the remote stream is writing data to the port-forward connection port-forward should keep working after detect broken connection`,

// https://issues.redhat.com/browse/OCPBUGS-45274
// https://github.com/kubernetes/kubernetes/issues/129056
`\[sig-node\] PodRejectionStatus Kubelet should reject pod when the node didn't have enough resource`,

// https://issues.redhat.com/browse/OCPBUGS-45359
`\[Feature:RecoverVolumeExpansionFailure\]`,
},
// tests that may work, but we don't support them
"[Disabled:Unsupported]": {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -43,6 +43,8 @@ else
exit 1
fi

GOFLAGS=-mod=readonly

# smoke test
echo "Smoke testing examples by compiling..."
pushd "${SCRIPT_ROOT}"
Expand Down
2 changes: 2 additions & 0 deletions staging/src/k8s.io/code-generator/kube_codegen.sh
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,8 @@ set -o pipefail

KUBE_CODEGEN_ROOT="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd -P)"

GOFLAGS=-mod=readonly

function kube::codegen::internal::findz() {
# We use `find` rather than `git ls-files` because sometimes external
# projects use this across repos. This is an imperfect wrapper of find,
Expand Down

0 comments on commit a4da702

Please sign in to comment.