Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Check for new member webhook config names #950

Open
wants to merge 20 commits into
base: master
Choose a base branch
from

Conversation

mfrancisc
Copy link
Contributor

@mfrancisc mfrancisc commented Apr 18, 2024

This PR uses the new cicd scripts without the toolchaincluster resource creation and checks for the new member operator webhook config names.

The renaming is needed in order to reshuffle the make targets so that :

  • we can first deploy the member operators
  • check for the toolchaincluster SA
  • delete member webhook from member2 namespace

Related PR: codeready-toolchain/toolchain-cicd#107

Paired with:

@rsoaresd
Copy link
Contributor

/retest

flaky migration test ? https://gcsweb-ci.apps.ci.l2s4.p1.openshiftapps.com/gcs/test-platform-results/pr-logs/pull/codeready-toolchain_toolchain-e2e/950/pull-ci-codeready-toolchain-toolchain-e2e-master-e2e/1780857087673241600/build-log.txt

Hello, @mfrancisc
I was trying to understand that. I will try to reproduce it locally.

From this search query, we can see occurrences in this PR and in PR #934

@mfrancisc
Copy link
Contributor Author

thank you @rsoaresd ! I wrote "Flaky" in there, but I see they failing again with same error :) , so maybe related to my changes, I'm running those migration tests locally as well !

@rsoaresd
Copy link
Contributor

thank you @rsoaresd ! I wrote "Flaky" in there, but I see they failing again with same error :) , so maybe related to my changes, I'm running those migration tests locally as well !

I was able to reproduce it locally with this code change

@mfrancisc
Copy link
Contributor Author

/retest

updated script

@@ -1,5 +1,5 @@

OWNER_AND_BRANCH_LOCATION=codeready-toolchain/toolchain-cicd/master
OWNER_AND_BRANCH_LOCATION=mfrancisc/toolchain-cicd/removetoolchainclusterres
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

reminder

@mfrancisc mfrancisc changed the title DO NOT MERGE: test new cicd scripts Check for new member webhook config names Apr 25, 2024
@@ -263,7 +263,7 @@ get-and-publish-operators: clean-e2e-files get-and-publish-host-operator get-and
# The reason is that when the host operator is installed, then the logic creates ToolchainConfig CR which
# defines that the webhook should be deployed from the first member instance (and not from the second one).
# This is important to set before the member operators are installed, otherwise, it can lead to flaky e2e tests.
get-publish-install-and-register-operators: get-and-publish-host-operator setup-toolchainclusters create-host-resources get-and-publish-member-operator
get-publish-install-and-register-operators: get-and-publish-host-operator get-and-publish-member-operator setup-toolchainclusters create-host-resources
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this is needed since now we are deploying the toolchaincluster-member SA from the member-operator deployment, thus we need to run setup-toolchainclusters only after deploying the member operator deployment.

In order to invert those make targets I had todo some changes in member operator, see paired PR for those.

@mfrancisc
Copy link
Contributor Author

/retest

@mfrancisc
Copy link
Contributor Author

/retest

make/test.mk Outdated Show resolved Hide resolved
testsupport/init.go Show resolved Hide resolved
Copy link
Collaborator

@MatousJobanek MatousJobanek left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Great Job 👍 🥇 🚀

Copy link

openshift-ci bot commented May 31, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: MatousJobanek, mfrancisc

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:
  • OWNERS [MatousJobanek,mfrancisc]

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link

sonarcloud bot commented May 31, 2024

Quality Gate Passed Quality Gate passed

Issues
0 New issues
0 Accepted issues

Measures
0 Security Hotspots
No data about Coverage
3.1% Duplication on New Code

See analysis details on SonarCloud

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants