-
Notifications
You must be signed in to change notification settings - Fork 79
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improve coverage of E2E tests #253
Conversation
Hi @alan-ghelardi. Thanks for your PR. I'm waiting for a tektoncd member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/ok-to-test |
3fce144
to
314be46
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you so much for this PR! This will definitely help get the ball rolling on having sustainable e2e tests. And ++1 for catching a bug in the process!
I have a few suggestions about the rbac.yaml that is deployed, and a question about the kind configuration yaml. The other suggestions regarding configuring the cert pair locations are optional - IMO those should not block merge and can be captured as a follow-up item.
set -e | ||
kubectl create secret tls -n tekton-pipelines tekton-results-tls --cert="/tmp/tekton-results-cert.pem" --key="/tmp/tekton-results-key.pem" || true | ||
|
||
echo "Installing Tekton Results..." | ||
kubectl kustomize "${ROOT}/test/e2e/kustomize" | ko apply -f - | ||
|
||
echo "Fetching access tokens..." | ||
tokens_dir=/tmp/tekton-results/tokens |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ideally this can be a configuration option for the script. This can be addressed in a follow-up PR.
-keyout "/tmp/tekton-results-key.pem" \ | ||
-out "/tmp/tekton-results-cert.pem" \ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Future TODO - make the location of the keypair configurable.
-keyout "/tmp/tekton-results-key.pem" \ | ||
-out "/tmp/tekton-results-cert.pem" \ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ditto - as a follow up, we should make this configurable.
) | ||
|
||
const ( | ||
certFile = "/tmp/tekton-results-cert.pem" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If this path is made configurable, we would likely want to convert these constants to vars that live near a test main function.
allNamespacesReadAccess = "/tmp/tekton-results/tokens/all-namespaces-read-access" | ||
singleNamespaceReadAccess = "/tmp/tekton-results/tokens/single-namespace-read-access" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Likewise, when this is made configurable, we should move these constants near a test main.
Co-authored-by: Adam Kaplan <[email protected]>
/retest |
714e1fd
to
1d76e6f
Compare
@adambkaplan thank you for the review. I've accepted your suggestions and will make the tokens path configurable in a future pr. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/approve
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: adambkaplan The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/assign dibyom |
/lgtm (Opened an issue to capture the TODOs around making the this a bit more configurable) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/kind cleanup
We need this label for release as discussed in the last WG call.
Resolves #142.
What
Enhance the support for reading Results and Records across multiple collections #249. In addition, basic listing
operations were covered.
passed to the
Check
method was incorrect and if one created a Role to restrictthe access to a single namespace, the API server would always return an
unauthenticated error. The fix is covered in a newlycreated E2E test case.
versions of Kind and the tests will run on a cluster that uses a known
Kubernetes version. Note that Knative no longer supports the Kubernetes version
used by default in the Kind v0.10 (which is mentioned in the E2E documentation).
Additional information
There are two already existing E2E test cases failing consistently. I'm going to
open a new pull request to fix them to make changes more granular.