Squashed 'release-tools/' changes from 3b6d17b..5489de6
5489de6 Merge pull request #174 from mauriciopoppe/bump-kind-version 0c675d4 Bump kind version to v0.11.1 ef69a88 Merge pull request #173 from nick5616/add-ws2022 44c710c added WS2022 to build platforms 0883be4 Merge pull request #171 from pohly/example-commands 02cda51 build.make: support binaries outside of cmd, with optional go.mod 65922ea Merge pull request #170 from pohly/canary-snapshot-controller c0bdfb3 prow.sh: deploy canary snapshot-controller in canary jobs 0438f15 Merge pull request #167 from c0va23/feature/release-armv7-image 4786f4d Merge pull request #168 from msau42/update-release-prereq 6a2dc64 Remove requirement to be top-level approver. Only maintainers membership is required to do a release 30a4f7b Release armv7 image ac8108f Merge pull request #165 from consideRatio/pr/update-github-links-ref-to-master-to-HEAD 999b483 docs: make github links reference HEAD instead of main fd67069 docs: make github links reference HEAD instead of master c0a4fb1 Merge pull request #164 from anubha-v-ardhan/patch-1 9c6a6c0 Master to main cleanup 682c686 Merge pull request #162 from pohly/pod-name-via-shell-command 36a29f5 Merge pull request #163 from pohly/remove-bazel 68e43ca prow.sh: remove Bazel build support c5f59c5 prow.sh: allow shell commands in CSI_PROW_SANITY_POD 71c810a Merge pull request #161 from pohly/mock-test-fixes 9e438f8 prow.sh: fix mock testing d7146c7 Merge pull request #160 from pohly/kind-update 4b6aa60 prow.sh: update to KinD v0.11.0 7cdc76f Merge pull request #159 from pohly/fix-deployment-selection ef8bd33 prow.sh: more flexible CSI_PROW_DEPLOYMENT, part II 204bc89 Merge pull request #158 from pohly/fix-deployment-selection 61538bb prow.sh: more flexible CSI_PROW_DEPLOYMENT 2b0e6db Merge pull request #157 from humblec/csi-release a2fcd6d Adding myself to csi reviewers group f325590 Merge pull request #149 from pohly/cluster-logs 4b03b30 Merge pull request #155 from pohly/owners a6453c8 owners: introduce aliases ad83def Merge pull request #153 from pohly/fix-image-builds 5561780 build.make: fix image publishng 29bd39b Merge pull request #152 from pohly/bump-csi-test bc42793 prow.sh: use csi-test v4.2.0 b546baa Merge pull request #150 from mauriciopoppe/windows-multiarch-args bfbb6f3 add parameter base_image and addon_image to BUILD_PARAMETERS 2d61d3b Merge pull request #151 from humblec/cm 48e71f0 Replace `which` command ( non standard) with `command -v` builtin feb20e2 prow.sh: collect cluster logs 7b96bea Merge pull request #148 from dobsonj/add-checkpathcmd-to-prow 2d2e03b prow.sh: enable -csi.checkpathcmd option in csi-sanity 09d4151 Merge pull request #147 from pohly/mock-testing 74cfbc9 prow.sh: support mock tests 4a3f110 prow.sh: remove obsolete test suppression 6616a6b Merge pull request #146 from pohly/kubernetes-1.21 510fb0f prow.sh: support Kubernetes 1.21 c63c61b prow.sh: add CSI_PROW_DEPLOYMENT_SUFFIX 51ac11c Merge pull request #144 from pohly/pull-jobs dd54c92 pull-test.sh: test importing csi-release-tools into other repo 7d2643a Merge pull request #143 from pohly/path-setup 6880b0c prow.sh: avoid creating paths unless really running tests bc0504a Merge pull request #140 from jsafrane/remove-unused-k8s-libs 5b1de1a go-get-kubernetes.sh: remove unused k8s libs 49b4269 Merge pull request #120 from pohly/add-kubernetes-release a1e1127 Merge pull request #139 from pohly/kind-for-kubernetes-latest 1c0fb09 prow.sh: use KinD main for latest Kubernetes 1d77cfc Merge pull request #138 from pohly/kind-update-0.10 bff2fb7 prow.sh: KinD 0.10.0 95eac33 Merge pull request #137 from pohly/fix-go-version-check 437e431 verify-go-version.sh: fix check after removal of travis.yml 1748b16 Merge pull request #136 from pohly/go-1.16 ec844ea remove travis.yml, Go 1.16 df76aba Merge pull request #134 from andyzhangx/add-build-arg e314a56 add build-arg ARCH for building multi-arch images, e.g. ARG ARCH FROM k8s.gcr.io/build-image/debian-base-${ARCH}:v2.1.3 7bc70e5 Merge pull request #129 from pohly/squash-documentation e0b02e7 README.md: document usage of --squash 316cb95 Merge pull request #132 from yiyang5055/bugfix/boilerplate 26e2ab1 fix: default boilerplate path 1add8c1 Merge pull request #133 from pohly/kubernetes-1.20-tag 3e811d6 prow.sh: fix "on-master" prow jobs 1d60e77 Merge pull request #131 from pohly/kubernetes-1.20-tag 9f10459 prow.sh: support building Kubernetes for a specific version f7e7ee4 docs: steps for adding testing against new Kubernetes release fe1f284 Merge pull request #121 from kvaps/namespace-check 8fdf0f7 Merge pull request #128 from fengzixu/master 1c94220 fix: fix a bug of csi-sanity a4c41e6 Merge pull request #127 from pohly/fix-boilerplate ece0f50 check namespace for snapshot-controller dbd8967 verify-boilerplate.sh: fix path to script 9289fd1 Merge pull request #125 from sachinkumarsingh092/optional-spelling-boilerplate-checks ad29307 Make the spelling and boilerplate checks optional 5f06d02 Merge pull request #124 from sachinkumarsingh092/fix-spellcheck-boilerplate-tests 48186eb Fix spelling and boilerplate errors 71690af Merge pull request #122 from sachinkumarsingh092/include-spellcheck-boilerplate-tests 981be3f Adding spelling and boilerplate checks. 2bb7525 Merge pull request #117 from fengzixu/master 4ab8b15 use the tag to replace commit of csi-test 5d74e45 change the csi-test import path to v4 7dcd0a9 upgrade csi-test to v4.0.2 git-subtree-dir: release-tools git-subtree-split: 5489de6e743cf8362e5ab8275988cc748d0758b0
This commit is contained in:
parent
3b6d17b13d
commit
a17045a909
16
.prow.sh
16
.prow.sh
|
|
@ -1,7 +1,23 @@
|
||||||
#! /bin/bash -e
|
#! /bin/bash -e
|
||||||
|
|
||||||
|
# Copyright 2021 The Kubernetes Authors.
|
||||||
#
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
# This is for testing csi-release-tools itself in Prow. All other
|
# This is for testing csi-release-tools itself in Prow. All other
|
||||||
# repos use prow.sh for that, but as csi-release-tools isn't a normal
|
# repos use prow.sh for that, but as csi-release-tools isn't a normal
|
||||||
# repo with some Go code in it, it has a custom Prow test script.
|
# repo with some Go code in it, it has a custom Prow test script.
|
||||||
|
|
||||||
./verify-shellcheck.sh "$(pwd)"
|
./verify-shellcheck.sh "$(pwd)"
|
||||||
|
./verify-spelling.sh "$(pwd)"
|
||||||
|
./verify-boilerplate.sh "$(pwd)"
|
||||||
|
|
|
||||||
|
|
@ -0,0 +1,45 @@
|
||||||
|
# See the OWNERS docs: https://git.k8s.io/community/contributors/guide/owners.md
|
||||||
|
|
||||||
|
aliases:
|
||||||
|
|
||||||
|
# SIG-Storage chairs and leads should always have approval rights in all repos.
|
||||||
|
# Others may be added as needed here or in each repo.
|
||||||
|
kubernetes-csi-approvers:
|
||||||
|
- jsafrane
|
||||||
|
- msau42
|
||||||
|
- saad-ali
|
||||||
|
- xing-yang
|
||||||
|
|
||||||
|
# Reviewers are automatically assigned to new PRs. The following
|
||||||
|
# reviewers will be active in all repos. Other reviewers can be
|
||||||
|
# added in each repo.
|
||||||
|
#
|
||||||
|
# Reviewers are encouraged to set the "Busy" flag in their GitHub status
|
||||||
|
# when they are temporarily unable to review PRs.
|
||||||
|
kubernetes-csi-reviewers:
|
||||||
|
- andyzhangx
|
||||||
|
- chrishenzie
|
||||||
|
- ggriffiths
|
||||||
|
- gnufied
|
||||||
|
- humblec
|
||||||
|
- j-griffith
|
||||||
|
- Jiawei0227
|
||||||
|
- jingxu97
|
||||||
|
- jsafrane
|
||||||
|
- pohly
|
||||||
|
- xing-yang
|
||||||
|
|
||||||
|
# This documents who previously contributed to Kubernetes-CSI
|
||||||
|
# as approver.
|
||||||
|
emeritus_approver:
|
||||||
|
- lpabon
|
||||||
|
- sbezverk
|
||||||
|
- vladimirvivien
|
||||||
|
|
||||||
|
# This documents who previously contributed to Kubernetes-CSI
|
||||||
|
# as reviewer.
|
||||||
|
emeritus_reviewer:
|
||||||
|
- lpabon
|
||||||
|
- saad-ali
|
||||||
|
- sbezverk
|
||||||
|
- vladimirvivien
|
||||||
7
OWNERS
7
OWNERS
|
|
@ -1,11 +1,8 @@
|
||||||
# See the OWNERS docs: https://git.k8s.io/community/contributors/guide/owners.md
|
# See the OWNERS docs: https://git.k8s.io/community/contributors/guide/owners.md
|
||||||
|
|
||||||
approvers:
|
approvers:
|
||||||
- saad-ali
|
- kubernetes-csi-approvers
|
||||||
- msau42
|
|
||||||
- pohly
|
- pohly
|
||||||
|
|
||||||
reviewers:
|
reviewers:
|
||||||
- saad-ali
|
- kubernetes-csi-reviewers
|
||||||
- msau42
|
|
||||||
- pohly
|
|
||||||
|
|
|
||||||
|
|
@ -0,0 +1 @@
|
||||||
|
KUBERNETES_CSI_OWNERS_ALIASES
|
||||||
21
README.md
21
README.md
|
|
@ -21,7 +21,11 @@ The expected repository layout is:
|
||||||
Dockerfile in the root when only building a single command
|
Dockerfile in the root when only building a single command
|
||||||
- `Makefile` - includes `release-tools/build.make` and sets
|
- `Makefile` - includes `release-tools/build.make` and sets
|
||||||
configuration variables
|
configuration variables
|
||||||
- `.travis.yml` - a symlink to `release-tools/.travis.yml`
|
- `.prow.sh` script which imports `release-tools/prow.sh`
|
||||||
|
and may contain further customization
|
||||||
|
- `.cloudbuild.sh` and `cloudbuild.yaml` as symlinks to
|
||||||
|
the corresponding files in `release-tools` or (if necessary)
|
||||||
|
as custom files
|
||||||
|
|
||||||
To create a release, tag a certain revision with a name that
|
To create a release, tag a certain revision with a name that
|
||||||
starts with `v`, for example `v1.0.0`, then `make push`
|
starts with `v`, for example `v1.0.0`, then `make push`
|
||||||
|
|
@ -38,16 +42,23 @@ images. Building from master creates the main `canary` image.
|
||||||
Sharing and updating
|
Sharing and updating
|
||||||
--------------------
|
--------------------
|
||||||
|
|
||||||
[`git subtree`](https://github.com/git/git/blob/master/contrib/subtree/git-subtree.txt)
|
[`git subtree`](https://github.com/git/git/blob/HEAD/contrib/subtree/git-subtree.txt)
|
||||||
is the recommended way of maintaining a copy of the rules inside the
|
is the recommended way of maintaining a copy of the rules inside the
|
||||||
`release-tools` directory of a project. This way, it is possible to make
|
`release-tools` directory of a project. This way, it is possible to make
|
||||||
changes also locally, test them and then push them back to the shared
|
changes also locally, test them and then push them back to the shared
|
||||||
repository at a later time.
|
repository at a later time.
|
||||||
|
|
||||||
|
We no longer care about importing the full commit history, so `--squash` should be used
|
||||||
|
when submitting a `release-tools` update. Also make sure that the PR for that
|
||||||
|
contains the automatically generated commit message in the PR description.
|
||||||
|
It contains the list of individual commits that were squashed. The script from
|
||||||
|
https://github.com/kubernetes-csi/csi-release-tools/issues/7 can create such
|
||||||
|
PRs automatically.
|
||||||
|
|
||||||
Cheat sheet:
|
Cheat sheet:
|
||||||
|
|
||||||
- `git subtree add --prefix=release-tools https://github.com/kubernetes-csi/csi-release-tools.git master` - add release tools to a repo which does not have them yet (only once)
|
- `git subtree add --squash --prefix=release-tools https://github.com/kubernetes-csi/csi-release-tools.git master` - add release tools to a repo which does not have them yet (only once)
|
||||||
- `git subtree pull --prefix=release-tools https://github.com/kubernetes-csi/csi-release-tools.git master` - update local copy to latest upstream (whenever upstream changes)
|
- `git subtree pull --squash --prefix=release-tools https://github.com/kubernetes-csi/csi-release-tools.git master` - update local copy to latest upstream (whenever upstream changes)
|
||||||
- edit, `git commit`, `git subtree push --prefix=release-tools git@github.com:<user>/csi-release-tools.git <my-new-or-existing-branch>` - push to a new branch before submitting a PR
|
- edit, `git commit`, `git subtree push --prefix=release-tools git@github.com:<user>/csi-release-tools.git <my-new-or-existing-branch>` - push to a new branch before submitting a PR
|
||||||
|
|
||||||
verify-shellcheck.sh
|
verify-shellcheck.sh
|
||||||
|
|
@ -78,7 +89,7 @@ main
|
||||||
|
|
||||||
All Kubernetes-CSI repos are expected to switch to Prow. For details
|
All Kubernetes-CSI repos are expected to switch to Prow. For details
|
||||||
on what is enabled in Prow, see
|
on what is enabled in Prow, see
|
||||||
https://github.com/kubernetes/test-infra/tree/master/config/jobs/kubernetes-csi
|
https://github.com/kubernetes/test-infra/tree/HEAD/config/jobs/kubernetes-csi
|
||||||
|
|
||||||
Test results for periodic jobs are visible in
|
Test results for periodic jobs are visible in
|
||||||
https://testgrid.k8s.io/sig-storage-csi-ci
|
https://testgrid.k8s.io/sig-storage-csi-ci
|
||||||
|
|
|
||||||
|
|
@ -4,7 +4,7 @@
|
||||||
# to for triaging and handling of incoming issues.
|
# to for triaging and handling of incoming issues.
|
||||||
#
|
#
|
||||||
# The below names agree to abide by the
|
# The below names agree to abide by the
|
||||||
# [Embargo Policy](https://github.com/kubernetes/sig-release/blob/master/security-release-process-documentation/security-release-process.md#embargo-policy)
|
# [Embargo Policy](https://github.com/kubernetes/sig-release/blob/HEAD/security-release-process-documentation/security-release-process.md#embargo-policy)
|
||||||
# and will be removed and replaced if they violate that agreement.
|
# and will be removed and replaced if they violate that agreement.
|
||||||
#
|
#
|
||||||
# DO NOT REPORT SECURITY VULNERABILITIES DIRECTLY TO THESE NAMES, FOLLOW THE
|
# DO NOT REPORT SECURITY VULNERABILITIES DIRECTLY TO THESE NAMES, FOLLOW THE
|
||||||
|
|
|
||||||
|
|
@ -9,13 +9,8 @@ The release manager must:
|
||||||
* Be a member of the kubernetes-csi organization. Open an
|
* Be a member of the kubernetes-csi organization. Open an
|
||||||
[issue](https://github.com/kubernetes/org/issues/new?assignees=&labels=area%2Fgithub-membership&template=membership.md&title=REQUEST%3A+New+membership+for+%3Cyour-GH-handle%3E) in
|
[issue](https://github.com/kubernetes/org/issues/new?assignees=&labels=area%2Fgithub-membership&template=membership.md&title=REQUEST%3A+New+membership+for+%3Cyour-GH-handle%3E) in
|
||||||
kubernetes/org to request membership
|
kubernetes/org to request membership
|
||||||
* Be a top level approver for the repository. To become a top level approver,
|
* Be part of the maintainers group for the repository.
|
||||||
the candidate must demonstrate ownership and deep knowledge of the repository
|
Membership can be requested by submitting a PR to kubernetes/org.
|
||||||
through active maintainence, responding to and fixing issues, reviewing PRs,
|
|
||||||
test triage.
|
|
||||||
* Be part of the maintainers or admin group for the repository. admin is a
|
|
||||||
superset of maintainers, only maintainers level is required for cutting a
|
|
||||||
release. Membership can be requested by submitting a PR to kubernetes/org.
|
|
||||||
[Example](https://github.com/kubernetes/org/pull/1467)
|
[Example](https://github.com/kubernetes/org/pull/1467)
|
||||||
|
|
||||||
## Updating CI Jobs
|
## Updating CI Jobs
|
||||||
|
|
@ -31,16 +26,16 @@ naming convention `<hostpath-deployment-version>-on-<kubernetes-version>`.
|
||||||
1. "-on-master" jobs are the closest reflection to the new Kubernetes version.
|
1. "-on-master" jobs are the closest reflection to the new Kubernetes version.
|
||||||
1. Fixes to our prow.sh CI script can be tested in the [CSI hostpath
|
1. Fixes to our prow.sh CI script can be tested in the [CSI hostpath
|
||||||
repo](https://github.com/kubernetes-csi/csi-driver-host-path) by modifying
|
repo](https://github.com/kubernetes-csi/csi-driver-host-path) by modifying
|
||||||
[prow.sh](https://github.com/kubernetes-csi/csi-driver-host-path/blob/master/release-tools/prow.sh)
|
[prow.sh](https://github.com/kubernetes-csi/csi-driver-host-path/blob/HEAD/release-tools/prow.sh)
|
||||||
along with any overrides in
|
along with any overrides in
|
||||||
[.prow.sh](https://github.com/kubernetes-csi/csi-driver-host-path/blob/master/.prow.sh)
|
[.prow.sh](https://github.com/kubernetes-csi/csi-driver-host-path/blob/HEAD/.prow.sh)
|
||||||
to mirror the failing environment. Once e2e tests are passing (verify-unit tests
|
to mirror the failing environment. Once e2e tests are passing (verify-unit tests
|
||||||
will fail), then the prow.sh changes can be submitted to [csi-release-tools](https://github.com/kubernetes-csi/csi-release-tools).
|
will fail), then the prow.sh changes can be submitted to [csi-release-tools](https://github.com/kubernetes-csi/csi-release-tools).
|
||||||
1. Changes can then be updated in all the sidecar repos and hostpath driver repo
|
1. Changes can then be updated in all the sidecar repos and hostpath driver repo
|
||||||
by following the [update
|
by following the [update
|
||||||
instructions](https://github.com/kubernetes-csi/csi-release-tools/blob/master/README.md#sharing-and-updating).
|
instructions](https://github.com/kubernetes-csi/csi-release-tools/blob/HEAD/README.md#sharing-and-updating).
|
||||||
1. New pull and CI jobs are configured by adding new K8s versions to the top of
|
1. New pull and CI jobs are configured by adding new K8s versions to the top of
|
||||||
[gen-jobs.sh](https://github.com/kubernetes/test-infra/blob/master/config/jobs/kubernetes-csi/gen-jobs.sh).
|
[gen-jobs.sh](https://github.com/kubernetes/test-infra/blob/HEAD/config/jobs/kubernetes-csi/gen-jobs.sh).
|
||||||
New pull jobs that have been unverified should be initially made optional by
|
New pull jobs that have been unverified should be initially made optional by
|
||||||
setting the new K8s version as
|
setting the new K8s version as
|
||||||
[experimental](https://github.com/kubernetes/test-infra/blob/a1858f46d6014480b130789df58b230a49203a64/config/jobs/kubernetes-csi/gen-jobs.sh#L40).
|
[experimental](https://github.com/kubernetes/test-infra/blob/a1858f46d6014480b130789df58b230a49203a64/config/jobs/kubernetes-csi/gen-jobs.sh#L40).
|
||||||
|
|
@ -52,7 +47,7 @@ naming convention `<hostpath-deployment-version>-on-<kubernetes-version>`.
|
||||||
1. Identify all issues and ongoing PRs that should go into the release, and
|
1. Identify all issues and ongoing PRs that should go into the release, and
|
||||||
drive them to resolution.
|
drive them to resolution.
|
||||||
1. Download v2.8+ [K8s release notes
|
1. Download v2.8+ [K8s release notes
|
||||||
generator](https://github.com/kubernetes/release/tree/master/cmd/release-notes)
|
generator](https://github.com/kubernetes/release/tree/HEAD/cmd/release-notes)
|
||||||
1. Generate release notes for the release. Replace arguments with the relevant
|
1. Generate release notes for the release. Replace arguments with the relevant
|
||||||
information.
|
information.
|
||||||
* Clean up old cached information (also needed if you are generating release
|
* Clean up old cached information (also needed if you are generating release
|
||||||
|
|
@ -95,12 +90,56 @@ naming convention `<hostpath-deployment-version>-on-<kubernetes-version>`.
|
||||||
1. Check [image build status](https://k8s-testgrid.appspot.com/sig-storage-image-build).
|
1. Check [image build status](https://k8s-testgrid.appspot.com/sig-storage-image-build).
|
||||||
1. Promote images from k8s-staging-sig-storage to k8s.gcr.io/sig-storage. From
|
1. Promote images from k8s-staging-sig-storage to k8s.gcr.io/sig-storage. From
|
||||||
the [k8s image
|
the [k8s image
|
||||||
repo](https://github.com/kubernetes/k8s.io/tree/master/k8s.gcr.io/images/k8s-staging-sig-storage),
|
repo](https://github.com/kubernetes/k8s.io/tree/HEAD/k8s.gcr.io/images/k8s-staging-sig-storage),
|
||||||
run `./generate.sh > images.yaml`, and send a PR with the updated images.
|
run `./generate.sh > images.yaml`, and send a PR with the updated images.
|
||||||
Once merged, the image promoter will copy the images from staging to prod.
|
Once merged, the image promoter will copy the images from staging to prod.
|
||||||
1. Update [kubernetes-csi/docs](https://github.com/kubernetes-csi/docs) sidecar
|
1. Update [kubernetes-csi/docs](https://github.com/kubernetes-csi/docs) sidecar
|
||||||
and feature pages with the new released version.
|
and feature pages with the new released version.
|
||||||
1. After all the sidecars have been released, update
|
1. After all the sidecars have been released, update
|
||||||
CSI hostpath driver with the new sidecars in the [CSI repo](https://github.com/kubernetes-csi/csi-driver-host-path/tree/master/deploy)
|
CSI hostpath driver with the new sidecars in the [CSI repo](https://github.com/kubernetes-csi/csi-driver-host-path/tree/HEAD/deploy)
|
||||||
and [k/k
|
and [k/k
|
||||||
in-tree](https://github.com/kubernetes/kubernetes/tree/master/test/e2e/testing-manifests/storage-csi/hostpath/hostpath)
|
in-tree](https://github.com/kubernetes/kubernetes/tree/HEAD/test/e2e/testing-manifests/storage-csi/hostpath/hostpath)
|
||||||
|
|
||||||
|
## Adding support for a new Kubernetes release
|
||||||
|
|
||||||
|
1. Add the new release to `k8s_versions` in
|
||||||
|
https://github.com/kubernetes/test-infra/blob/090dec5dd535d5f61b7ba52e671a810f5fc13dfd/config/jobs/kubernetes-csi/gen-jobs.sh#L25
|
||||||
|
to enable generating a job for it. Set `experimental_k8s_version`
|
||||||
|
in
|
||||||
|
https://github.com/kubernetes/test-infra/blob/090dec5dd535d5f61b7ba52e671a810f5fc13dfd/config/jobs/kubernetes-csi/gen-jobs.sh#L40
|
||||||
|
to ensure that the new jobs aren't run for PRs unless explicitly
|
||||||
|
requested. Generate and submit the new jobs.
|
||||||
|
1. Create a test PR to try out the new job in some repo with `/test
|
||||||
|
pull-kubernetes-csi-<repo>-<x.y>-on-kubernetes-<x.y>` where x.y
|
||||||
|
matches the Kubernetes release. Alternatively, run .prow.sh in that
|
||||||
|
repo locally with `CSI_PROW_KUBERNETES_VERSION=x.y.z`.
|
||||||
|
1. Optional: update to a [new
|
||||||
|
release](https://github.com/kubernetes-sigs/kind/tags) of kind with
|
||||||
|
pre-built images for the new Kubernetes release. This is optional
|
||||||
|
if the current version of kind is able to build images for the new
|
||||||
|
Kubernetes release. However, jobs require less resources when they
|
||||||
|
don't need to build those images from the Kubernetes source code.
|
||||||
|
This change needs to be tried out in a PR against a component
|
||||||
|
first, then get submitted against csi-release-tools.
|
||||||
|
1. Optional: propagate the updated csi-release-tools to all components
|
||||||
|
with the script from
|
||||||
|
https://github.com/kubernetes-csi/csi-release-tools/issues/7#issuecomment-707025402
|
||||||
|
1. Once it is likely to work in all components, unset
|
||||||
|
`experimental_k8s_version` and submit the updated jobs.
|
||||||
|
1. Once all sidecars for the new Kubernetes release are released,
|
||||||
|
either bump the version number of the images in the existing
|
||||||
|
[csi-driver-host-path
|
||||||
|
deployments](https://github.com/kubernetes-csi/csi-driver-host-path/tree/HEAD/deploy)
|
||||||
|
and/or create a new deployment, depending on what Kubernetes
|
||||||
|
release an updated sidecar is compatible with. If no new deployment
|
||||||
|
is needed, then add a symlink to document that there intentionally
|
||||||
|
isn't a separate deployment. This symlink is not needed for Prow
|
||||||
|
testing because that will use "kubernetes-latest" as fallback.
|
||||||
|
Update that link when creating a new deployment.
|
||||||
|
1. Create a new csi-driver-host-path release.
|
||||||
|
1. Bump `CSI_PROW_DRIVER_VERSION` in prow.sh to that new release and
|
||||||
|
(eventually) roll that change out to all repos by updating
|
||||||
|
`release-tools` in them. This is used when testing manually. The
|
||||||
|
Prow jobs override that value, so also update
|
||||||
|
`hostpath_driver_version` in
|
||||||
|
https://github.com/kubernetes/test-infra/blob/91b04e6af3a40a9bcff25aa030850a4721e2dd2b/config/jobs/kubernetes-csi/gen-jobs.sh#L46-L47
|
||||||
|
|
|
||||||
|
|
@ -0,0 +1,13 @@
|
||||||
|
# Copyright YEAR The Kubernetes Authors.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
@ -0,0 +1,13 @@
|
||||||
|
# Copyright YEAR The Kubernetes Authors.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
@ -0,0 +1,13 @@
|
||||||
|
# Copyright YEAR The Kubernetes Authors.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
@ -0,0 +1,15 @@
|
||||||
|
/*
|
||||||
|
Copyright YEAR The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
@ -0,0 +1,200 @@
|
||||||
|
#!/usr/bin/env python
|
||||||
|
|
||||||
|
# Copyright 2019 The Kubernetes Authors.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
from __future__ import print_function
|
||||||
|
|
||||||
|
import argparse
|
||||||
|
import difflib
|
||||||
|
import glob
|
||||||
|
import os
|
||||||
|
import re
|
||||||
|
import sys
|
||||||
|
from datetime import date
|
||||||
|
|
||||||
|
parser = argparse.ArgumentParser()
|
||||||
|
parser.add_argument(
|
||||||
|
"filenames",
|
||||||
|
help="list of files to check, all files if unspecified",
|
||||||
|
nargs='*')
|
||||||
|
|
||||||
|
# Rootdir defaults to the directory **above** the repo-infra dir.
|
||||||
|
rootdir = os.path.dirname(__file__) + "./../../"
|
||||||
|
rootdir = os.path.abspath(rootdir)
|
||||||
|
parser.add_argument(
|
||||||
|
"--rootdir", default=rootdir, help="root directory to examine")
|
||||||
|
|
||||||
|
default_boilerplate_dir = os.path.abspath(os.path.dirname(__file__))
|
||||||
|
|
||||||
|
parser.add_argument(
|
||||||
|
"--boilerplate-dir", default=default_boilerplate_dir)
|
||||||
|
|
||||||
|
parser.add_argument(
|
||||||
|
"-v", "--verbose",
|
||||||
|
help="give verbose output regarding why a file does not pass",
|
||||||
|
action="store_true")
|
||||||
|
|
||||||
|
args = parser.parse_args()
|
||||||
|
|
||||||
|
verbose_out = sys.stderr if args.verbose else open("/dev/null", "w")
|
||||||
|
|
||||||
|
def get_refs():
|
||||||
|
refs = {}
|
||||||
|
|
||||||
|
for path in glob.glob(os.path.join(args.boilerplate_dir, "boilerplate.*.txt")):
|
||||||
|
extension = os.path.basename(path).split(".")[1]
|
||||||
|
|
||||||
|
ref_file = open(path, 'r')
|
||||||
|
ref = ref_file.read().splitlines()
|
||||||
|
ref_file.close()
|
||||||
|
refs[extension] = ref
|
||||||
|
|
||||||
|
return refs
|
||||||
|
|
||||||
|
def file_passes(filename, refs, regexs):
|
||||||
|
try:
|
||||||
|
f = open(filename, 'r')
|
||||||
|
except Exception as exc:
|
||||||
|
print("Unable to open %s: %s" % (filename, exc), file=verbose_out)
|
||||||
|
return False
|
||||||
|
|
||||||
|
data = f.read()
|
||||||
|
f.close()
|
||||||
|
|
||||||
|
basename = os.path.basename(filename)
|
||||||
|
extension = file_extension(filename)
|
||||||
|
if extension != "":
|
||||||
|
ref = refs[extension]
|
||||||
|
else:
|
||||||
|
ref = refs[basename]
|
||||||
|
|
||||||
|
# remove build tags from the top of Go files
|
||||||
|
if extension == "go":
|
||||||
|
p = regexs["go_build_constraints"]
|
||||||
|
(data, found) = p.subn("", data, 1)
|
||||||
|
|
||||||
|
# remove shebang from the top of shell files
|
||||||
|
if extension == "sh" or extension == "py":
|
||||||
|
p = regexs["shebang"]
|
||||||
|
(data, found) = p.subn("", data, 1)
|
||||||
|
|
||||||
|
data = data.splitlines()
|
||||||
|
|
||||||
|
# if our test file is smaller than the reference it surely fails!
|
||||||
|
if len(ref) > len(data):
|
||||||
|
print('File %s smaller than reference (%d < %d)' %
|
||||||
|
(filename, len(data), len(ref)),
|
||||||
|
file=verbose_out)
|
||||||
|
return False
|
||||||
|
|
||||||
|
# trim our file to the same number of lines as the reference file
|
||||||
|
data = data[:len(ref)]
|
||||||
|
|
||||||
|
p = regexs["year"]
|
||||||
|
for d in data:
|
||||||
|
if p.search(d):
|
||||||
|
print('File %s is missing the year' % filename, file=verbose_out)
|
||||||
|
return False
|
||||||
|
|
||||||
|
# Replace all occurrences of the regex "CURRENT_YEAR|...|2016|2015|2014" with "YEAR"
|
||||||
|
p = regexs["date"]
|
||||||
|
for i, d in enumerate(data):
|
||||||
|
(data[i], found) = p.subn('YEAR', d)
|
||||||
|
if found != 0:
|
||||||
|
break
|
||||||
|
|
||||||
|
# if we don't match the reference at this point, fail
|
||||||
|
if ref != data:
|
||||||
|
print("Header in %s does not match reference, diff:" % filename, file=verbose_out)
|
||||||
|
if args.verbose:
|
||||||
|
print(file=verbose_out)
|
||||||
|
for line in difflib.unified_diff(ref, data, 'reference', filename, lineterm=''):
|
||||||
|
print(line, file=verbose_out)
|
||||||
|
print(file=verbose_out)
|
||||||
|
return False
|
||||||
|
|
||||||
|
return True
|
||||||
|
|
||||||
|
def file_extension(filename):
|
||||||
|
return os.path.splitext(filename)[1].split(".")[-1].lower()
|
||||||
|
|
||||||
|
skipped_dirs = ['Godeps', 'third_party', '_gopath', '_output', '.git',
|
||||||
|
'cluster/env.sh', 'vendor', 'test/e2e/generated/bindata.go',
|
||||||
|
'repo-infra/verify/boilerplate/test', '.glide']
|
||||||
|
|
||||||
|
def normalize_files(files):
|
||||||
|
newfiles = []
|
||||||
|
for pathname in files:
|
||||||
|
if any(x in pathname for x in skipped_dirs):
|
||||||
|
continue
|
||||||
|
newfiles.append(pathname)
|
||||||
|
return newfiles
|
||||||
|
|
||||||
|
def get_files(extensions):
|
||||||
|
files = []
|
||||||
|
if len(args.filenames) > 0:
|
||||||
|
files = args.filenames
|
||||||
|
else:
|
||||||
|
for root, dirs, walkfiles in os.walk(args.rootdir):
|
||||||
|
# don't visit certain dirs. This is just a performance improvement
|
||||||
|
# as we would prune these later in normalize_files(). But doing it
|
||||||
|
# cuts down the amount of filesystem walking we do and cuts down
|
||||||
|
# the size of the file list
|
||||||
|
for d in skipped_dirs:
|
||||||
|
if d in dirs:
|
||||||
|
dirs.remove(d)
|
||||||
|
|
||||||
|
for name in walkfiles:
|
||||||
|
pathname = os.path.join(root, name)
|
||||||
|
files.append(pathname)
|
||||||
|
|
||||||
|
files = normalize_files(files)
|
||||||
|
|
||||||
|
outfiles = []
|
||||||
|
for pathname in files:
|
||||||
|
basename = os.path.basename(pathname)
|
||||||
|
extension = file_extension(pathname)
|
||||||
|
if extension in extensions or basename in extensions:
|
||||||
|
outfiles.append(pathname)
|
||||||
|
return outfiles
|
||||||
|
|
||||||
|
def get_regexs():
|
||||||
|
regexs = {}
|
||||||
|
# Search for "YEAR" which exists in the boilerplate, but shouldn't in the real thing
|
||||||
|
regexs["year"] = re.compile( 'YEAR' )
|
||||||
|
# dates can be 2014, 2015, 2016, ..., CURRENT_YEAR, company holder names can be anything
|
||||||
|
years = range(2014, date.today().year + 1)
|
||||||
|
regexs["date"] = re.compile( '(%s)' % "|".join(map(lambda l: str(l), years)) )
|
||||||
|
# strip // +build \n\n build constraints
|
||||||
|
regexs["go_build_constraints"] = re.compile(r"^(// \+build.*\n)+\n", re.MULTILINE)
|
||||||
|
# strip #!.* from shell scripts
|
||||||
|
regexs["shebang"] = re.compile(r"^(#!.*\n)\n*", re.MULTILINE)
|
||||||
|
return regexs
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
def main():
|
||||||
|
regexs = get_regexs()
|
||||||
|
refs = get_refs()
|
||||||
|
filenames = get_files(refs.keys())
|
||||||
|
|
||||||
|
for filename in filenames:
|
||||||
|
if not file_passes(filename, refs, regexs):
|
||||||
|
print(filename, file=sys.stdout)
|
||||||
|
|
||||||
|
return 0
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
sys.exit(main())
|
||||||
|
|
@ -0,0 +1,13 @@
|
||||||
|
# Copyright YEAR The Kubernetes Authors.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
@ -0,0 +1,13 @@
|
||||||
|
# Copyright YEAR The Kubernetes Authors.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
75
build.make
75
build.make
|
|
@ -12,12 +12,19 @@
|
||||||
# See the License for the specific language governing permissions and
|
# See the License for the specific language governing permissions and
|
||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
|
|
||||||
|
# force the usage of /bin/bash instead of /bin/sh
|
||||||
|
SHELL := /bin/bash
|
||||||
|
|
||||||
.PHONY: build-% build container-% container push-% push clean test
|
.PHONY: build-% build container-% container push-% push clean test
|
||||||
|
|
||||||
# A space-separated list of all commands in the repository, must be
|
# A space-separated list of all commands in the repository, must be
|
||||||
# set in main Makefile of a repository.
|
# set in main Makefile of a repository.
|
||||||
# CMDS=
|
# CMDS=
|
||||||
|
|
||||||
|
# Normally, commands are expected in "cmd". That can be changed for a
|
||||||
|
# repository to something else by setting CMDS_DIR before including build.make.
|
||||||
|
CMDS_DIR ?= cmd
|
||||||
|
|
||||||
# This is the default. It can be overridden in the main Makefile after
|
# This is the default. It can be overridden in the main Makefile after
|
||||||
# including build.make.
|
# including build.make.
|
||||||
REGISTRY_NAME?=quay.io/k8scsi
|
REGISTRY_NAME?=quay.io/k8scsi
|
||||||
|
|
@ -63,30 +70,39 @@ endif
|
||||||
# Specific packages can be excluded from each of the tests below by setting the *_FILTER_CMD variables
|
# Specific packages can be excluded from each of the tests below by setting the *_FILTER_CMD variables
|
||||||
# to something like "| grep -v 'github.com/kubernetes-csi/project/pkg/foobar'". See usage below.
|
# to something like "| grep -v 'github.com/kubernetes-csi/project/pkg/foobar'". See usage below.
|
||||||
|
|
||||||
# BUILD_PLATFORMS contains a set of <os> <arch> <suffix> triplets,
|
# BUILD_PLATFORMS contains a set of tuples [os arch suffix base_image addon_image]
|
||||||
# separated by semicolon. An empty variable or empty entry (= just a
|
# separated by semicolon. An empty variable or empty entry (= just a
|
||||||
# semicolon) builds for the default platform of the current Go
|
# semicolon) builds for the default platform of the current Go
|
||||||
# toolchain.
|
# toolchain.
|
||||||
BUILD_PLATFORMS =
|
BUILD_PLATFORMS =
|
||||||
|
|
||||||
# Add go ldflags using LDFLAGS at the time of compilation.
|
# Add go ldflags using LDFLAGS at the time of compilation.
|
||||||
IMPORTPATH_LDFLAGS = -X main.version=$(REV)
|
IMPORTPATH_LDFLAGS = -X main.version=$(REV)
|
||||||
EXT_LDFLAGS = -extldflags "-static"
|
EXT_LDFLAGS = -extldflags "-static"
|
||||||
LDFLAGS =
|
LDFLAGS =
|
||||||
FULL_LDFLAGS = $(LDFLAGS) $(IMPORTPATH_LDFLAGS) $(EXT_LDFLAGS)
|
FULL_LDFLAGS = $(LDFLAGS) $(IMPORTPATH_LDFLAGS) $(EXT_LDFLAGS)
|
||||||
# This builds each command (= the sub-directories of ./cmd) for the target platform(s)
|
# This builds each command (= the sub-directories of ./cmd) for the target platform(s)
|
||||||
# defined by BUILD_PLATFORMS.
|
# defined by BUILD_PLATFORMS.
|
||||||
$(CMDS:%=build-%): build-%: check-go-version-go
|
$(CMDS:%=build-%): build-%: check-go-version-go
|
||||||
mkdir -p bin
|
mkdir -p bin
|
||||||
echo '$(BUILD_PLATFORMS)' | tr ';' '\n' | while read -r os arch suffix; do \
|
# os_arch_seen captures all of the $$os-$$arch seen for the current binary
|
||||||
if ! (set -x; CGO_ENABLED=0 GOOS="$$os" GOARCH="$$arch" go build $(GOFLAGS_VENDOR) -a -ldflags '$(FULL_LDFLAGS)' -o "./bin/$*$$suffix" ./cmd/$*); then \
|
# that we want to build, if we've seen an $$os-$$arch before it means that
|
||||||
|
# we don't need to build it again, this is done to avoid building
|
||||||
|
# the windows binary multiple times (see the default value of $$BUILD_PLATFORMS)
|
||||||
|
export os_arch_seen="" && echo '$(BUILD_PLATFORMS)' | tr ';' '\n' | while read -r os arch suffix base_image addon_image; do \
|
||||||
|
os_arch_seen_pre=$${os_arch_seen%%$$os-$$arch*}; \
|
||||||
|
if ! [ $${#os_arch_seen_pre} = $${#os_arch_seen} ]; then \
|
||||||
|
continue; \
|
||||||
|
fi; \
|
||||||
|
if ! (set -x; cd ./$(CMDS_DIR)/$* && CGO_ENABLED=0 GOOS="$$os" GOARCH="$$arch" go build $(GOFLAGS_VENDOR) -a -ldflags '$(FULL_LDFLAGS)' -o "$(abspath ./bin)/$*$$suffix" .); then \
|
||||||
echo "Building $* for GOOS=$$os GOARCH=$$arch failed, see error(s) above."; \
|
echo "Building $* for GOOS=$$os GOARCH=$$arch failed, see error(s) above."; \
|
||||||
exit 1; \
|
exit 1; \
|
||||||
fi; \
|
fi; \
|
||||||
|
os_arch_seen+=";$$os-$$arch"; \
|
||||||
done
|
done
|
||||||
|
|
||||||
$(CMDS:%=container-%): container-%: build-%
|
$(CMDS:%=container-%): container-%: build-%
|
||||||
docker build -t $*:latest -f $(shell if [ -e ./cmd/$*/Dockerfile ]; then echo ./cmd/$*/Dockerfile; else echo Dockerfile; fi) --label revision=$(REV) .
|
docker build -t $*:latest -f $(shell if [ -e ./$(CMDS_DIR)/$*/Dockerfile ]; then echo ./$(CMDS_DIR)/$*/Dockerfile; else echo Dockerfile; fi) --label revision=$(REV) .
|
||||||
|
|
||||||
$(CMDS:%=push-%): push-%: container-%
|
$(CMDS:%=push-%): push-%: container-%
|
||||||
set -ex; \
|
set -ex; \
|
||||||
|
|
@ -121,7 +137,7 @@ DOCKER_BUILDX_CREATE_ARGS ?=
|
||||||
# This target builds a multiarch image for one command using Moby BuildKit builder toolkit.
|
# This target builds a multiarch image for one command using Moby BuildKit builder toolkit.
|
||||||
# Docker Buildx is included in Docker 19.03.
|
# Docker Buildx is included in Docker 19.03.
|
||||||
#
|
#
|
||||||
# ./cmd/<command>/Dockerfile[.Windows] is used if found, otherwise Dockerfile[.Windows].
|
# ./$(CMDS_DIR)/<command>/Dockerfile[.Windows] is used if found, otherwise Dockerfile[.Windows].
|
||||||
# It is currently optional: if no such file exists, Windows images are not included,
|
# It is currently optional: if no such file exists, Windows images are not included,
|
||||||
# even when Windows is listed in BUILD_PLATFORMS. That way, projects can test that
|
# even when Windows is listed in BUILD_PLATFORMS. That way, projects can test that
|
||||||
# Windows binaries can be built before adding a Dockerfile for it.
|
# Windows binaries can be built before adding a Dockerfile for it.
|
||||||
|
|
@ -131,29 +147,46 @@ DOCKER_BUILDX_CREATE_ARGS ?=
|
||||||
# the tag for the resulting multiarch image.
|
# the tag for the resulting multiarch image.
|
||||||
$(CMDS:%=push-multiarch-%): push-multiarch-%: check-pull-base-ref build-%
|
$(CMDS:%=push-multiarch-%): push-multiarch-%: check-pull-base-ref build-%
|
||||||
set -ex; \
|
set -ex; \
|
||||||
DOCKER_CLI_EXPERIMENTAL=enabled; \
|
export DOCKER_CLI_EXPERIMENTAL=enabled; \
|
||||||
export DOCKER_CLI_EXPERIMENTAL; \
|
|
||||||
docker buildx create $(DOCKER_BUILDX_CREATE_ARGS) --use --name multiarchimage-buildertest; \
|
docker buildx create $(DOCKER_BUILDX_CREATE_ARGS) --use --name multiarchimage-buildertest; \
|
||||||
trap "docker buildx rm multiarchimage-buildertest" EXIT; \
|
trap "docker buildx rm multiarchimage-buildertest" EXIT; \
|
||||||
dockerfile_linux=$$(if [ -e ./cmd/$*/Dockerfile ]; then echo ./cmd/$*/Dockerfile; else echo Dockerfile; fi); \
|
dockerfile_linux=$$(if [ -e ./$(CMDS_DIR)/$*/Dockerfile ]; then echo ./$(CMDS_DIR)/$*/Dockerfile; else echo Dockerfile; fi); \
|
||||||
dockerfile_windows=$$(if [ -e ./cmd/$*/Dockerfile.Windows ]; then echo ./cmd/$*/Dockerfile.Windows; else echo Dockerfile.Windows; fi); \
|
dockerfile_windows=$$(if [ -e ./$(CMDS_DIR)/$*/Dockerfile.Windows ]; then echo ./$(CMDS_DIR)/$*/Dockerfile.Windows; else echo Dockerfile.Windows; fi); \
|
||||||
if [ '$(BUILD_PLATFORMS)' ]; then build_platforms='$(BUILD_PLATFORMS)'; else build_platforms="linux amd64"; fi; \
|
if [ '$(BUILD_PLATFORMS)' ]; then build_platforms='$(BUILD_PLATFORMS)'; else build_platforms="linux amd64"; fi; \
|
||||||
if ! [ -f "$$dockerfile_windows" ]; then \
|
if ! [ -f "$$dockerfile_windows" ]; then \
|
||||||
build_platforms="$$(echo "$$build_platforms" | sed -e 's/windows *[^ ]* *.exe//g' -e 's/; *;/;/g')"; \
|
build_platforms="$$(echo "$$build_platforms" | sed -e 's/windows *[^ ]* *.exe *[^ ]* *[^ ]*//g' -e 's/; *;/;/g' -e 's/;[ ]*$$//')"; \
|
||||||
fi; \
|
fi; \
|
||||||
pushMultiArch () { \
|
pushMultiArch () { \
|
||||||
tag=$$1; \
|
tag=$$1; \
|
||||||
echo "$$build_platforms" | tr ';' '\n' | while read -r os arch suffix; do \
|
echo "$$build_platforms" | tr ';' '\n' | while read -r os arch suffix base_image addon_image; do \
|
||||||
|
escaped_base_image=$${base_image/:/-}; \
|
||||||
|
if ! [ -z $$escaped_base_image ]; then escaped_base_image+="-"; fi; \
|
||||||
docker buildx build --push \
|
docker buildx build --push \
|
||||||
--tag $(IMAGE_NAME):$$arch-$$os-$$tag \
|
--tag $(IMAGE_NAME):$$arch-$$os-$$escaped_base_image$$tag \
|
||||||
--platform=$$os/$$arch \
|
--platform=$$os/$$arch \
|
||||||
--file $$(eval echo \$${dockerfile_$$os}) \
|
--file $$(eval echo \$${dockerfile_$$os}) \
|
||||||
--build-arg binary=./bin/$*$$suffix \
|
--build-arg binary=./bin/$*$$suffix \
|
||||||
|
--build-arg ARCH=$$arch \
|
||||||
|
--build-arg BASE_IMAGE=$$base_image \
|
||||||
|
--build-arg ADDON_IMAGE=$$addon_image \
|
||||||
--label revision=$(REV) \
|
--label revision=$(REV) \
|
||||||
.; \
|
.; \
|
||||||
done; \
|
done; \
|
||||||
images=$$(echo "$$build_platforms" | tr ';' '\n' | while read -r os arch suffix; do echo $(IMAGE_NAME):$$arch-$$os-$$tag; done); \
|
images=$$(echo "$$build_platforms" | tr ';' '\n' | while read -r os arch suffix base_image addon_image; do \
|
||||||
|
escaped_base_image=$${base_image/:/-}; \
|
||||||
|
if ! [ -z $$escaped_base_image ]; then escaped_base_image+="-"; fi; \
|
||||||
|
echo $(IMAGE_NAME):$$arch-$$os-$$escaped_base_image$$tag; \
|
||||||
|
done); \
|
||||||
docker manifest create --amend $(IMAGE_NAME):$$tag $$images; \
|
docker manifest create --amend $(IMAGE_NAME):$$tag $$images; \
|
||||||
|
echo "$$build_platforms" | tr ';' '\n' | while read -r os arch suffix base_image addon_image; do \
|
||||||
|
if [ $$os = "windows" ]; then \
|
||||||
|
escaped_base_image=$${base_image/:/-}; \
|
||||||
|
if ! [ -z $$escaped_base_image ]; then escaped_base_image+="-"; fi; \
|
||||||
|
image=$(IMAGE_NAME):$$arch-$$os-$$escaped_base_image$$tag; \
|
||||||
|
os_version=$$(docker manifest inspect mcr.microsoft.com/windows/$${base_image} | grep "os.version" | head -n 1 | awk '{print $$2}' | sed -e 's/"//g') || true; \
|
||||||
|
docker manifest annotate --os-version $$os_version $(IMAGE_NAME):$$tag $$image; \
|
||||||
|
fi; \
|
||||||
|
done; \
|
||||||
docker manifest push -p $(IMAGE_NAME):$$tag; \
|
docker manifest push -p $(IMAGE_NAME):$$tag; \
|
||||||
}; \
|
}; \
|
||||||
if [ $(PULL_BASE_REF) = "master" ]; then \
|
if [ $(PULL_BASE_REF) = "master" ]; then \
|
||||||
|
|
@ -275,3 +308,15 @@ test-shellcheck:
|
||||||
.PHONY: check-go-version-%
|
.PHONY: check-go-version-%
|
||||||
check-go-version-%:
|
check-go-version-%:
|
||||||
./release-tools/verify-go-version.sh "$*"
|
./release-tools/verify-go-version.sh "$*"
|
||||||
|
|
||||||
|
# Test for spelling errors.
|
||||||
|
.PHONY: test-spelling
|
||||||
|
test-spelling:
|
||||||
|
@ echo; echo "### $@:"
|
||||||
|
@ ./release-tools/verify-spelling.sh "$(pwd)"
|
||||||
|
|
||||||
|
# Test the boilerplates of the files.
|
||||||
|
.PHONY: test-boilerplate
|
||||||
|
test-boilerplate:
|
||||||
|
@ echo; echo "### $@:"
|
||||||
|
@ ./release-tools/verify-boilerplate.sh "$(pwd)"
|
||||||
|
|
|
||||||
|
|
@ -1,5 +1,19 @@
|
||||||
#! /bin/bash
|
#! /bin/bash
|
||||||
|
|
||||||
|
# Copyright 2021 The Kubernetes Authors.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
# shellcheck disable=SC1091
|
# shellcheck disable=SC1091
|
||||||
. release-tools/prow.sh
|
. release-tools/prow.sh
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -10,10 +10,10 @@
|
||||||
# because binaries will get built for different architectures and then
|
# because binaries will get built for different architectures and then
|
||||||
# get copied from the built host into the container image
|
# get copied from the built host into the container image
|
||||||
#
|
#
|
||||||
# See https://github.com/kubernetes/test-infra/blob/master/config/jobs/image-pushing/README.md
|
# See https://github.com/kubernetes/test-infra/blob/HEAD/config/jobs/image-pushing/README.md
|
||||||
# for more details on image pushing process in Kubernetes.
|
# for more details on image pushing process in Kubernetes.
|
||||||
#
|
#
|
||||||
# To promote release images, see https://github.com/kubernetes/k8s.io/tree/master/k8s.gcr.io/images/k8s-staging-sig-storage.
|
# To promote release images, see https://github.com/kubernetes/k8s.io/tree/HEAD/k8s.gcr.io/images/k8s-staging-sig-storage.
|
||||||
|
|
||||||
# This must be specified in seconds. If omitted, defaults to 600s (10 mins).
|
# This must be specified in seconds. If omitted, defaults to 600s (10 mins).
|
||||||
# Building three images in external-snapshotter takes roughly half an hour,
|
# Building three images in external-snapshotter takes roughly half an hour,
|
||||||
|
|
@ -25,9 +25,9 @@ options:
|
||||||
substitution_option: ALLOW_LOOSE
|
substitution_option: ALLOW_LOOSE
|
||||||
steps:
|
steps:
|
||||||
# The image must contain bash and curl. Ideally it should also contain
|
# The image must contain bash and curl. Ideally it should also contain
|
||||||
# the desired version of Go (currently defined in release-tools/travis.yml),
|
# the desired version of Go (currently defined in release-tools/prow.sh),
|
||||||
# but that just speeds up the build and is not required.
|
# but that just speeds up the build and is not required.
|
||||||
- name: 'gcr.io/k8s-testimages/gcb-docker-gcloud:v20200421-a2bf5f8'
|
- name: 'gcr.io/k8s-testimages/gcb-docker-gcloud:v20210331-c732583'
|
||||||
entrypoint: ./.cloudbuild.sh
|
entrypoint: ./.cloudbuild.sh
|
||||||
env:
|
env:
|
||||||
- GIT_TAG=${_GIT_TAG}
|
- GIT_TAG=${_GIT_TAG}
|
||||||
|
|
|
||||||
|
|
@ -55,6 +55,12 @@ mods=$( (set -x; curl --silent --show-error --fail "https://raw.githubuserconten
|
||||||
sed -n 's|.*k8s.io/\(.*\) => ./staging/src/k8s.io/.*|k8s.io/\1|p'
|
sed -n 's|.*k8s.io/\(.*\) => ./staging/src/k8s.io/.*|k8s.io/\1|p'
|
||||||
) || die "failed to determine Kubernetes staging modules"
|
) || die "failed to determine Kubernetes staging modules"
|
||||||
for mod in $mods; do
|
for mod in $mods; do
|
||||||
|
if ! (env GO111MODULE=on go mod graph) | grep "$mod@" > /dev/null; then
|
||||||
|
echo "Kubernetes module $mod is not used, skipping"
|
||||||
|
# Remove the module from go.mod "replace" that was added by an older version of this script.
|
||||||
|
(set -x; env GO111MODULE=on go mod edit "-dropreplace=$mod") || die "'go mod edit' failed"
|
||||||
|
continue
|
||||||
|
fi
|
||||||
# The presence of a potentially incomplete go.mod file affects this command,
|
# The presence of a potentially incomplete go.mod file affects this command,
|
||||||
# so move elsewhere.
|
# so move elsewhere.
|
||||||
modinfo=$(set -x; cd /; env GO111MODULE=on go mod download -json "$mod@kubernetes-${k8s}") ||
|
modinfo=$(set -x; cd /; env GO111MODULE=on go mod download -json "$mod@kubernetes-${k8s}") ||
|
||||||
|
|
|
||||||
354
prow.sh
354
prow.sh
|
|
@ -1,5 +1,5 @@
|
||||||
#! /bin/bash
|
#! /bin/bash
|
||||||
#
|
|
||||||
# Copyright 2019 The Kubernetes Authors.
|
# Copyright 2019 The Kubernetes Authors.
|
||||||
#
|
#
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
|
@ -33,8 +33,6 @@
|
||||||
# The expected environment is:
|
# The expected environment is:
|
||||||
# - $GOPATH/src/<import path> for the repository that is to be tested,
|
# - $GOPATH/src/<import path> for the repository that is to be tested,
|
||||||
# with PR branch merged (when testing a PR)
|
# with PR branch merged (when testing a PR)
|
||||||
# - optional: bazel installed (when testing against Kubernetes master),
|
|
||||||
# must be recent enough for Kubernetes master
|
|
||||||
# - running on linux-amd64
|
# - running on linux-amd64
|
||||||
# - kind (https://github.com/kubernetes-sigs/kind) installed
|
# - kind (https://github.com/kubernetes-sigs/kind) installed
|
||||||
# - optional: Go already installed
|
# - optional: Go already installed
|
||||||
|
|
@ -65,7 +63,22 @@ get_versioned_variable () {
|
||||||
echo "$value"
|
echo "$value"
|
||||||
}
|
}
|
||||||
|
|
||||||
configvar CSI_PROW_BUILD_PLATFORMS "linux amd64; windows amd64 .exe; linux ppc64le -ppc64le; linux s390x -s390x; linux arm64 -arm64" "Go target platforms (= GOOS + GOARCH) and file suffix of the resulting binaries"
|
# This takes a version string like CSI_PROW_KUBERNETES_VERSION and
|
||||||
|
# maps it to the corresponding git tag, branch or commit.
|
||||||
|
version_to_git () {
|
||||||
|
version="$1"
|
||||||
|
shift
|
||||||
|
case "$version" in
|
||||||
|
latest|master) echo "master";;
|
||||||
|
release-*) echo "$version";;
|
||||||
|
*) echo "v$version";;
|
||||||
|
esac
|
||||||
|
}
|
||||||
|
|
||||||
|
# the list of windows versions was matched from:
|
||||||
|
# - https://hub.docker.com/_/microsoft-windows-nanoserver
|
||||||
|
# - https://hub.docker.com/_/microsoft-windows-servercore
|
||||||
|
configvar CSI_PROW_BUILD_PLATFORMS "linux amd64; linux ppc64le -ppc64le; linux s390x -s390x; linux arm -arm; linux arm64 -arm64; windows amd64 .exe nanoserver:1809 servercore:ltsc2019; windows amd64 .exe nanoserver:1909 servercore:1909; windows amd64 .exe nanoserver:2004 servercore:2004; windows amd64 .exe nanoserver:20H2 servercore:20H2; windows amd64 .exe nanoserver:ltsc2022 servercore:ltsc2022" "Go target platforms (= GOOS + GOARCH) and file suffix of the resulting binaries"
|
||||||
|
|
||||||
# If we have a vendor directory, then use it. We must be careful to only
|
# If we have a vendor directory, then use it. We must be careful to only
|
||||||
# use this for "make" invocations inside the project's repo itself because
|
# use this for "make" invocations inside the project's repo itself because
|
||||||
|
|
@ -73,37 +86,12 @@ configvar CSI_PROW_BUILD_PLATFORMS "linux amd64; windows amd64 .exe; linux ppc64
|
||||||
# which is disabled with GOFLAGS=-mod=vendor).
|
# which is disabled with GOFLAGS=-mod=vendor).
|
||||||
configvar GOFLAGS_VENDOR "$( [ -d vendor ] && echo '-mod=vendor' )" "Go flags for using the vendor directory"
|
configvar GOFLAGS_VENDOR "$( [ -d vendor ] && echo '-mod=vendor' )" "Go flags for using the vendor directory"
|
||||||
|
|
||||||
# Go versions can be specified seperately for different tasks
|
configvar CSI_PROW_GO_VERSION_BUILD "1.16" "Go version for building the component" # depends on component's source code
|
||||||
# If the pre-installed Go is missing or a different
|
|
||||||
# version, the required version here will get installed
|
|
||||||
# from https://golang.org/dl/.
|
|
||||||
go_from_travis_yml () {
|
|
||||||
grep "^ *- go:" "${RELEASE_TOOLS_ROOT}/travis.yml" | sed -e 's/.*go: *//'
|
|
||||||
}
|
|
||||||
configvar CSI_PROW_GO_VERSION_BUILD "$(go_from_travis_yml)" "Go version for building the component" # depends on component's source code
|
|
||||||
configvar CSI_PROW_GO_VERSION_E2E "" "override Go version for building the Kubernetes E2E test suite" # normally doesn't need to be set, see install_e2e
|
configvar CSI_PROW_GO_VERSION_E2E "" "override Go version for building the Kubernetes E2E test suite" # normally doesn't need to be set, see install_e2e
|
||||||
configvar CSI_PROW_GO_VERSION_SANITY "${CSI_PROW_GO_VERSION_BUILD}" "Go version for building the csi-sanity test suite" # depends on CSI_PROW_SANITY settings below
|
configvar CSI_PROW_GO_VERSION_SANITY "${CSI_PROW_GO_VERSION_BUILD}" "Go version for building the csi-sanity test suite" # depends on CSI_PROW_SANITY settings below
|
||||||
configvar CSI_PROW_GO_VERSION_KIND "${CSI_PROW_GO_VERSION_BUILD}" "Go version for building 'kind'" # depends on CSI_PROW_KIND_VERSION below
|
configvar CSI_PROW_GO_VERSION_KIND "${CSI_PROW_GO_VERSION_BUILD}" "Go version for building 'kind'" # depends on CSI_PROW_KIND_VERSION below
|
||||||
configvar CSI_PROW_GO_VERSION_GINKGO "${CSI_PROW_GO_VERSION_BUILD}" "Go version for building ginkgo" # depends on CSI_PROW_GINKGO_VERSION below
|
configvar CSI_PROW_GO_VERSION_GINKGO "${CSI_PROW_GO_VERSION_BUILD}" "Go version for building ginkgo" # depends on CSI_PROW_GINKGO_VERSION below
|
||||||
|
|
||||||
# kind version to use. If the pre-installed version is different,
|
|
||||||
# the desired version is downloaded from https://github.com/kubernetes-sigs/kind/releases
|
|
||||||
# (if available), otherwise it is built from source.
|
|
||||||
configvar CSI_PROW_KIND_VERSION "v0.9.0" "kind"
|
|
||||||
|
|
||||||
# kind images to use. Must match the kind version.
|
|
||||||
# The release notes of each kind release list the supported images.
|
|
||||||
configvar CSI_PROW_KIND_IMAGES "kindest/node:v1.19.1@sha256:98cf5288864662e37115e362b23e4369c8c4a408f99cbc06e58ac30ddc721600
|
|
||||||
kindest/node:v1.18.8@sha256:f4bcc97a0ad6e7abaf3f643d890add7efe6ee4ab90baeb374b4f41a4c95567eb
|
|
||||||
kindest/node:v1.17.11@sha256:5240a7a2c34bf241afb54ac05669f8a46661912eab05705d660971eeb12f6555
|
|
||||||
kindest/node:v1.16.15@sha256:a89c771f7de234e6547d43695c7ab047809ffc71a0c3b65aa54eda051c45ed20
|
|
||||||
kindest/node:v1.15.12@sha256:d9b939055c1e852fe3d86955ee24976cab46cba518abcb8b13ba70917e6547a6
|
|
||||||
kindest/node:v1.14.10@sha256:ce4355398a704fca68006f8a29f37aafb49f8fc2f64ede3ccd0d9198da910146
|
|
||||||
kindest/node:v1.13.12@sha256:1c1a48c2bfcbae4d5f4fa4310b5ed10756facad0b7a2ca93c7a4b5bae5db29f5" "kind images"
|
|
||||||
|
|
||||||
# Use kind node-image --type=bazel by default, but allow to disable that.
|
|
||||||
configvar CSI_PROW_USE_BAZEL true "use Bazel during 'kind node-image' invocation"
|
|
||||||
|
|
||||||
# ginkgo test runner version to use. If the pre-installed version is
|
# ginkgo test runner version to use. If the pre-installed version is
|
||||||
# different, the desired version is built from source.
|
# different, the desired version is built from source.
|
||||||
configvar CSI_PROW_GINKGO_VERSION v1.7.0 "Ginkgo"
|
configvar CSI_PROW_GINKGO_VERSION v1.7.0 "Ginkgo"
|
||||||
|
|
@ -140,10 +128,36 @@ configvar CSI_PROW_KUBERNETES_VERSION 1.17.0 "Kubernetes"
|
||||||
# when a Prow job just defines the Kubernetes version.
|
# when a Prow job just defines the Kubernetes version.
|
||||||
csi_prow_kubernetes_version_suffix="$(echo "${CSI_PROW_KUBERNETES_VERSION}" | tr . _ | tr '[:lower:]' '[:upper:]' | sed -e 's/^RELEASE-//' -e 's/\([0-9]*\)_\([0-9]*\).*/\1_\2/')"
|
csi_prow_kubernetes_version_suffix="$(echo "${CSI_PROW_KUBERNETES_VERSION}" | tr . _ | tr '[:lower:]' '[:upper:]' | sed -e 's/^RELEASE-//' -e 's/\([0-9]*\)_\([0-9]*\).*/\1_\2/')"
|
||||||
|
|
||||||
# Work directory. It has to allow running executables, therefore /tmp
|
# Only the latest KinD is (eventually) guaranteed to work with the
|
||||||
# is avoided. Cleaning up after the script is intentionally left to
|
# latest Kubernetes. For example, KinD 0.10.0 failed with Kubernetes
|
||||||
# the caller.
|
# 1.21.0-beta1. Therefore the default version of KinD is "main"
|
||||||
configvar CSI_PROW_WORK "$(mkdir -p "$GOPATH/pkg" && mktemp -d "$GOPATH/pkg/csiprow.XXXXXXXXXX")" "work directory"
|
# for that, otherwise the latest stable release for which we then
|
||||||
|
# list the officially supported images below.
|
||||||
|
kind_version_default () {
|
||||||
|
case "${CSI_PROW_KUBERNETES_VERSION}" in
|
||||||
|
latest|master)
|
||||||
|
echo main;;
|
||||||
|
*)
|
||||||
|
echo v0.11.1;;
|
||||||
|
esac
|
||||||
|
}
|
||||||
|
|
||||||
|
# kind version to use. If the pre-installed version is different,
|
||||||
|
# the desired version is downloaded from https://github.com/kubernetes-sigs/kind/releases
|
||||||
|
# (if available), otherwise it is built from source.
|
||||||
|
configvar CSI_PROW_KIND_VERSION "$(kind_version_default)" "kind"
|
||||||
|
|
||||||
|
# kind images to use. Must match the kind version.
|
||||||
|
# The release notes of each kind release list the supported images.
|
||||||
|
configvar CSI_PROW_KIND_IMAGES "kindest/node:v1.22.0@sha256:b8bda84bb3a190e6e028b1760d277454a72267a5454b57db34437c34a588d047
|
||||||
|
kindest/node:v1.21.1@sha256:69860bda5563ac81e3c0057d654b5253219618a22ec3a346306239bba8cfa1a6
|
||||||
|
kindest/node:v1.20.7@sha256:cbeaf907fc78ac97ce7b625e4bf0de16e3ea725daf6b04f930bd14c67c671ff9
|
||||||
|
kindest/node:v1.19.11@sha256:07db187ae84b4b7de440a73886f008cf903fcf5764ba8106a9fd5243d6f32729
|
||||||
|
kindest/node:v1.18.19@sha256:7af1492e19b3192a79f606e43c35fb741e520d195f96399284515f077b3b622c
|
||||||
|
kindest/node:v1.17.17@sha256:66f1d0d91a88b8a001811e2f1054af60eef3b669a9a74f9b6db871f2f1eeed00
|
||||||
|
kindest/node:v1.16.15@sha256:83067ed51bf2a3395b24687094e283a7c7c865ccc12a8b1d7aa673ba0c5e8861
|
||||||
|
kindest/node:v1.15.12@sha256:b920920e1eda689d9936dfcf7332701e80be12566999152626b2c9d730397a95
|
||||||
|
kindest/node:v1.14.10@sha256:f8a66ef82822ab4f7569e91a5bccaf27bceee135c1457c512e54de8c6f7219f8" "kind images"
|
||||||
|
|
||||||
# By default, this script tests sidecars with the CSI hostpath driver,
|
# By default, this script tests sidecars with the CSI hostpath driver,
|
||||||
# using the install_csi_driver function. That function depends on
|
# using the install_csi_driver function. That function depends on
|
||||||
|
|
@ -171,8 +185,8 @@ configvar CSI_PROW_WORK "$(mkdir -p "$GOPATH/pkg" && mktemp -d "$GOPATH/pkg/csip
|
||||||
# CSI_PROW_DEPLOYMENT variable can be set in the
|
# CSI_PROW_DEPLOYMENT variable can be set in the
|
||||||
# .prow.sh of each component when there are breaking changes
|
# .prow.sh of each component when there are breaking changes
|
||||||
# that require using a non-default deployment. The default
|
# that require using a non-default deployment. The default
|
||||||
# is a deployment named "kubernetes-x.yy" (if available),
|
# is a deployment named "kubernetes-x.yy${CSI_PROW_DEPLOYMENT_SUFFIX}" (if available),
|
||||||
# otherwise "kubernetes-latest".
|
# otherwise "kubernetes-latest${CSI_PROW_DEPLOYMENT_SUFFIX}".
|
||||||
# "none" disables the deployment of the hostpath driver.
|
# "none" disables the deployment of the hostpath driver.
|
||||||
#
|
#
|
||||||
# When no deploy script is found (nothing in `deploy` directory,
|
# When no deploy script is found (nothing in `deploy` directory,
|
||||||
|
|
@ -184,6 +198,7 @@ configvar CSI_PROW_WORK "$(mkdir -p "$GOPATH/pkg" && mktemp -d "$GOPATH/pkg/csip
|
||||||
configvar CSI_PROW_DRIVER_VERSION "v1.3.0" "CSI driver version"
|
configvar CSI_PROW_DRIVER_VERSION "v1.3.0" "CSI driver version"
|
||||||
configvar CSI_PROW_DRIVER_REPO https://github.com/kubernetes-csi/csi-driver-host-path "CSI driver repo"
|
configvar CSI_PROW_DRIVER_REPO https://github.com/kubernetes-csi/csi-driver-host-path "CSI driver repo"
|
||||||
configvar CSI_PROW_DEPLOYMENT "" "deployment"
|
configvar CSI_PROW_DEPLOYMENT "" "deployment"
|
||||||
|
configvar CSI_PROW_DEPLOYMENT_SUFFIX "" "additional suffix in kubernetes-x.yy[suffix].yaml files"
|
||||||
|
|
||||||
# The install_csi_driver function may work also for other CSI drivers,
|
# The install_csi_driver function may work also for other CSI drivers,
|
||||||
# as long as they follow the conventions of the CSI hostpath driver.
|
# as long as they follow the conventions of the CSI hostpath driver.
|
||||||
|
|
@ -208,16 +223,7 @@ configvar CSI_PROW_DRIVER_CANARY_REGISTRY "gcr.io/k8s-staging-sig-storage" "regi
|
||||||
# all generated files are present.
|
# all generated files are present.
|
||||||
#
|
#
|
||||||
# CSI_PROW_E2E_REPO=none disables E2E testing.
|
# CSI_PROW_E2E_REPO=none disables E2E testing.
|
||||||
tag_from_version () {
|
configvar CSI_PROW_E2E_VERSION "$(version_to_git "${CSI_PROW_KUBERNETES_VERSION}")" "E2E version"
|
||||||
version="$1"
|
|
||||||
shift
|
|
||||||
case "$version" in
|
|
||||||
latest) echo "master";;
|
|
||||||
release-*) echo "$version";;
|
|
||||||
*) echo "v$version";;
|
|
||||||
esac
|
|
||||||
}
|
|
||||||
configvar CSI_PROW_E2E_VERSION "$(tag_from_version "${CSI_PROW_KUBERNETES_VERSION}")" "E2E version"
|
|
||||||
configvar CSI_PROW_E2E_REPO "https://github.com/kubernetes/kubernetes" "E2E repo"
|
configvar CSI_PROW_E2E_REPO "https://github.com/kubernetes/kubernetes" "E2E repo"
|
||||||
configvar CSI_PROW_E2E_IMPORT_PATH "k8s.io/kubernetes" "E2E package"
|
configvar CSI_PROW_E2E_IMPORT_PATH "k8s.io/kubernetes" "E2E package"
|
||||||
|
|
||||||
|
|
@ -227,8 +233,8 @@ configvar CSI_PROW_E2E_IMPORT_PATH "k8s.io/kubernetes" "E2E package"
|
||||||
# of the cluster. The alternative would have been to (cross-)compile csi-sanity
|
# of the cluster. The alternative would have been to (cross-)compile csi-sanity
|
||||||
# and install it inside the cluster, which is not necessarily easier.
|
# and install it inside the cluster, which is not necessarily easier.
|
||||||
configvar CSI_PROW_SANITY_REPO https://github.com/kubernetes-csi/csi-test "csi-test repo"
|
configvar CSI_PROW_SANITY_REPO https://github.com/kubernetes-csi/csi-test "csi-test repo"
|
||||||
configvar CSI_PROW_SANITY_VERSION 5421d9f3c37be3b95b241b44a094a3db11bee789 "csi-test version" # latest master
|
configvar CSI_PROW_SANITY_VERSION v4.2.0 "csi-test version"
|
||||||
configvar CSI_PROW_SANITY_IMPORT_PATH github.com/kubernetes-csi/csi-test "csi-test package"
|
configvar CSI_PROW_SANITY_PACKAGE_PATH github.com/kubernetes-csi/csi-test "csi-test package"
|
||||||
configvar CSI_PROW_SANITY_SERVICE "hostpath-service" "Kubernetes TCP service name that exposes csi.sock"
|
configvar CSI_PROW_SANITY_SERVICE "hostpath-service" "Kubernetes TCP service name that exposes csi.sock"
|
||||||
configvar CSI_PROW_SANITY_POD "csi-hostpathplugin-0" "Kubernetes pod with CSI driver"
|
configvar CSI_PROW_SANITY_POD "csi-hostpathplugin-0" "Kubernetes pod with CSI driver"
|
||||||
configvar CSI_PROW_SANITY_CONTAINER "hostpath" "Kubernetes container with CSI driver"
|
configvar CSI_PROW_SANITY_CONTAINER "hostpath" "Kubernetes container with CSI driver"
|
||||||
|
|
@ -287,13 +293,26 @@ tests_need_alpha_cluster () {
|
||||||
tests_enabled "parallel-alpha" "serial-alpha"
|
tests_enabled "parallel-alpha" "serial-alpha"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# Enabling mock tests adds the "CSI mock volume" tests from https://github.com/kubernetes/kubernetes/blob/HEAD/test/e2e/storage/csi_mock_volume.go
|
||||||
|
# to the e2e.test invocations (serial, parallel, and the corresponding alpha variants).
|
||||||
|
# When testing canary images, those get used instead of the images specified
|
||||||
|
# in the e2e.test's normal YAML files.
|
||||||
|
#
|
||||||
|
# The default is to enable this for all jobs which use canary images
|
||||||
|
# and the latest Kubernetes because those images will be used for mock
|
||||||
|
# testing once they are released. Using them for mock testing with
|
||||||
|
# older Kubernetes releases is too risky because the deployment files
|
||||||
|
# can be very old (for example, still using a removed -provisioner
|
||||||
|
# parameter in external-provisioner).
|
||||||
|
configvar CSI_PROW_E2E_MOCK "$(if [ "${CSI_PROW_DRIVER_CANARY}" = "canary" ] && [ "${CSI_PROW_KUBERNETES_VERSION}" = "latest" ]; then echo true; else echo false; fi)" "enable CSI mock volume tests"
|
||||||
|
|
||||||
# Regex for non-alpha, feature-tagged tests that should be run.
|
# Regex for non-alpha, feature-tagged tests that should be run.
|
||||||
#
|
#
|
||||||
configvar CSI_PROW_E2E_FOCUS_LATEST '\[Feature:VolumeSnapshotDataSource\]' "non-alpha, feature-tagged tests for latest Kubernetes version"
|
configvar CSI_PROW_E2E_FOCUS_LATEST '\[Feature:VolumeSnapshotDataSource\]' "non-alpha, feature-tagged tests for latest Kubernetes version"
|
||||||
configvar CSI_PROW_E2E_FOCUS "$(get_versioned_variable CSI_PROW_E2E_FOCUS "${csi_prow_kubernetes_version_suffix}")" "non-alpha, feature-tagged tests"
|
configvar CSI_PROW_E2E_FOCUS "$(get_versioned_variable CSI_PROW_E2E_FOCUS "${csi_prow_kubernetes_version_suffix}")" "non-alpha, feature-tagged tests"
|
||||||
|
|
||||||
# Serial vs. parallel is always determined by these regular expressions.
|
# Serial vs. parallel is always determined by these regular expressions.
|
||||||
# Individual regular expressions are seperated by spaces for readability
|
# Individual regular expressions are separated by spaces for readability
|
||||||
# and expected to not contain spaces. Use dots instead. The complete
|
# and expected to not contain spaces. Use dots instead. The complete
|
||||||
# regex for Ginkgo will be created by joining the individual terms.
|
# regex for Ginkgo will be created by joining the individual terms.
|
||||||
configvar CSI_PROW_E2E_SERIAL '\[Serial\] \[Disruptive\]' "tags for serial E2E tests"
|
configvar CSI_PROW_E2E_SERIAL '\[Serial\] \[Disruptive\]' "tags for serial E2E tests"
|
||||||
|
|
@ -345,16 +364,25 @@ configvar CSI_SNAPSHOTTER_VERSION "$(default_csi_snapshotter_version)" "external
|
||||||
# whether they can run with the current cluster provider, but until
|
# whether they can run with the current cluster provider, but until
|
||||||
# they are, we filter them out by name. Like the other test selection
|
# they are, we filter them out by name. Like the other test selection
|
||||||
# variables, this is again a space separated list of regular expressions.
|
# variables, this is again a space separated list of regular expressions.
|
||||||
#
|
configvar CSI_PROW_E2E_SKIP 'Disruptive' "tests that need to be skipped"
|
||||||
# "different node" test skips can be removed once
|
|
||||||
# https://github.com/kubernetes/kubernetes/pull/82678 has been backported
|
|
||||||
# to all the K8s versions we test against
|
|
||||||
configvar CSI_PROW_E2E_SKIP 'Disruptive|different\s+node' "tests that need to be skipped"
|
|
||||||
|
|
||||||
# This is the directory for additional result files. Usually set by Prow, but
|
# This creates directories that are required for testing.
|
||||||
# if not (for example, when invoking manually) it defaults to the work directory.
|
ensure_paths () {
|
||||||
configvar ARTIFACTS "${CSI_PROW_WORK}/artifacts" "artifacts"
|
# Work directory. It has to allow running executables, therefore /tmp
|
||||||
mkdir -p "${ARTIFACTS}"
|
# is avoided. Cleaning up after the script is intentionally left to
|
||||||
|
# the caller.
|
||||||
|
configvar CSI_PROW_WORK "$(mkdir -p "$GOPATH/pkg" && mktemp -d "$GOPATH/pkg/csiprow.XXXXXXXXXX")" "work directory"
|
||||||
|
|
||||||
|
# This is the directory for additional result files. Usually set by Prow, but
|
||||||
|
# if not (for example, when invoking manually) it defaults to the work directory.
|
||||||
|
configvar ARTIFACTS "${CSI_PROW_WORK}/artifacts" "artifacts"
|
||||||
|
mkdir -p "${ARTIFACTS}"
|
||||||
|
|
||||||
|
# For additional tools.
|
||||||
|
CSI_PROW_BIN="${CSI_PROW_WORK}/bin"
|
||||||
|
mkdir -p "${CSI_PROW_BIN}"
|
||||||
|
PATH="${CSI_PROW_BIN}:$PATH"
|
||||||
|
}
|
||||||
|
|
||||||
run () {
|
run () {
|
||||||
echo "$(date) $(go version | sed -e 's/.*version \(go[^ ]*\).*/\1/') $(if [ "$(pwd)" != "${REPO_DIR}" ]; then pwd; fi)\$" "$@" >&2
|
echo "$(date) $(go version | sed -e 's/.*version \(go[^ ]*\).*/\1/') $(if [ "$(pwd)" != "${REPO_DIR}" ]; then pwd; fi)\$" "$@" >&2
|
||||||
|
|
@ -374,11 +402,6 @@ die () {
|
||||||
exit 1
|
exit 1
|
||||||
}
|
}
|
||||||
|
|
||||||
# For additional tools.
|
|
||||||
CSI_PROW_BIN="${CSI_PROW_WORK}/bin"
|
|
||||||
mkdir -p "${CSI_PROW_BIN}"
|
|
||||||
PATH="${CSI_PROW_BIN}:$PATH"
|
|
||||||
|
|
||||||
# Ensure that PATH has the desired version of the Go tools, then run command given as argument.
|
# Ensure that PATH has the desired version of the Go tools, then run command given as argument.
|
||||||
# Empty parameter uses the already installed Go. In Prow, that version is kept up-to-date by
|
# Empty parameter uses the already installed Go. In Prow, that version is kept up-to-date by
|
||||||
# bumping the container image regularly.
|
# bumping the container image regularly.
|
||||||
|
|
@ -407,7 +430,7 @@ install_kind () {
|
||||||
chmod u+x "${CSI_PROW_WORK}/bin/kind"
|
chmod u+x "${CSI_PROW_WORK}/bin/kind"
|
||||||
else
|
else
|
||||||
git_checkout https://github.com/kubernetes-sigs/kind "${GOPATH}/src/sigs.k8s.io/kind" "${CSI_PROW_KIND_VERSION}" --depth=1 &&
|
git_checkout https://github.com/kubernetes-sigs/kind "${GOPATH}/src/sigs.k8s.io/kind" "${CSI_PROW_KIND_VERSION}" --depth=1 &&
|
||||||
(cd "${GOPATH}/src/sigs.k8s.io/kind" && make install INSTALL_DIR="${CSI_PROW_WORK}/bin")
|
(cd "${GOPATH}/src/sigs.k8s.io/kind" && run_with_go "$CSI_PROW_GO_VERSION_KIND" make install INSTALL_DIR="${CSI_PROW_WORK}/bin")
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -465,20 +488,22 @@ git_checkout () {
|
||||||
|
|
||||||
# This clones a repo ("https://github.com/kubernetes/kubernetes")
|
# This clones a repo ("https://github.com/kubernetes/kubernetes")
|
||||||
# in a certain location ("$GOPATH/src/k8s.io/kubernetes") at
|
# in a certain location ("$GOPATH/src/k8s.io/kubernetes") at
|
||||||
# a the head of a specific branch (i.e., release-1.13, master).
|
# a the head of a specific branch (i.e., release-1.13, master),
|
||||||
# The directory cannot exist.
|
# tag (v1.20.0) or commit.
|
||||||
git_clone_branch () {
|
#
|
||||||
local repo path branch parent
|
# The directory must not exist.
|
||||||
|
git_clone () {
|
||||||
|
local repo path name parent
|
||||||
repo="$1"
|
repo="$1"
|
||||||
shift
|
shift
|
||||||
path="$1"
|
path="$1"
|
||||||
shift
|
shift
|
||||||
branch="$1"
|
name="$1"
|
||||||
shift
|
shift
|
||||||
|
|
||||||
parent="$(dirname "$path")"
|
parent="$(dirname "$path")"
|
||||||
mkdir -p "$parent"
|
mkdir -p "$parent"
|
||||||
(cd "$parent" && run git clone --single-branch --branch "$branch" "$repo" "$path") || die "cloning $repo" failed
|
(cd "$parent" && run git clone --single-branch --branch "$name" "$repo" "$path") || die "cloning $repo" failed
|
||||||
# This is useful for local testing or when switching between different revisions in the same
|
# This is useful for local testing or when switching between different revisions in the same
|
||||||
# repo.
|
# repo.
|
||||||
(cd "$path" && run git clean -fdx) || die "failed to clean $path"
|
(cd "$path" && run git clean -fdx) || die "failed to clean $path"
|
||||||
|
|
@ -562,16 +587,12 @@ start_cluster () {
|
||||||
if [ "$version" = "latest" ]; then
|
if [ "$version" = "latest" ]; then
|
||||||
version=master
|
version=master
|
||||||
fi
|
fi
|
||||||
if ${CSI_PROW_USE_BAZEL}; then
|
git_clone https://github.com/kubernetes/kubernetes "${CSI_PROW_WORK}/src/kubernetes" "$(version_to_git "$version")" || die "checking out Kubernetes $version failed"
|
||||||
type="bazel"
|
|
||||||
else
|
|
||||||
type="docker"
|
|
||||||
fi
|
|
||||||
git_clone_branch https://github.com/kubernetes/kubernetes "${CSI_PROW_WORK}/src/kubernetes" "$version" || die "checking out Kubernetes $version failed"
|
|
||||||
|
|
||||||
go_version="$(go_version_for_kubernetes "${CSI_PROW_WORK}/src/kubernetes" "$version")" || die "cannot proceed without knowing Go version for Kubernetes"
|
go_version="$(go_version_for_kubernetes "${CSI_PROW_WORK}/src/kubernetes" "$version")" || die "cannot proceed without knowing Go version for Kubernetes"
|
||||||
# Changing into the Kubernetes source code directory is a workaround for https://github.com/kubernetes-sigs/kind/issues/1910
|
# Changing into the Kubernetes source code directory is a workaround for https://github.com/kubernetes-sigs/kind/issues/1910
|
||||||
(cd "${CSI_PROW_WORK}/src/kubernetes" && run_with_go "$go_version" kind build node-image --image csiprow/node:latest --type="$type" --kube-root "${CSI_PROW_WORK}/src/kubernetes") || die "'kind build node-image' failed"
|
# shellcheck disable=SC2046
|
||||||
|
(cd "${CSI_PROW_WORK}/src/kubernetes" && run_with_go "$go_version" kind build node-image --image csiprow/node:latest --kube-root "${CSI_PROW_WORK}/src/kubernetes") || die "'kind build node-image' failed"
|
||||||
csi_prow_kind_have_kubernetes=true
|
csi_prow_kind_have_kubernetes=true
|
||||||
fi
|
fi
|
||||||
image="csiprow/node:latest"
|
image="csiprow/node:latest"
|
||||||
|
|
@ -605,11 +626,16 @@ EOF
|
||||||
|
|
||||||
# Deletes kind cluster inside a prow job
|
# Deletes kind cluster inside a prow job
|
||||||
delete_cluster_inside_prow_job() {
|
delete_cluster_inside_prow_job() {
|
||||||
|
local name="$1"
|
||||||
|
|
||||||
# Inside a real Prow job it is better to clean up at runtime
|
# Inside a real Prow job it is better to clean up at runtime
|
||||||
# instead of leaving that to the Prow job cleanup code
|
# instead of leaving that to the Prow job cleanup code
|
||||||
# because the later sometimes times out (https://github.com/kubernetes-csi/csi-release-tools/issues/24#issuecomment-554765872).
|
# because the later sometimes times out (https://github.com/kubernetes-csi/csi-release-tools/issues/24#issuecomment-554765872).
|
||||||
|
#
|
||||||
|
# This is also a good time to collect logs.
|
||||||
if [ "$JOB_NAME" ]; then
|
if [ "$JOB_NAME" ]; then
|
||||||
if kind get clusters | grep -q csi-prow; then
|
if kind get clusters | grep -q csi-prow; then
|
||||||
|
run kind export logs --name=csi-prow "${ARTIFACTS}/cluster-logs/$name"
|
||||||
run kind delete cluster --name=csi-prow || die "kind delete failed"
|
run kind delete cluster --name=csi-prow || die "kind delete failed"
|
||||||
fi
|
fi
|
||||||
unset KUBECONFIG
|
unset KUBECONFIG
|
||||||
|
|
@ -619,24 +645,38 @@ delete_cluster_inside_prow_job() {
|
||||||
# Looks for the deployment as specified by CSI_PROW_DEPLOYMENT and CSI_PROW_KUBERNETES_VERSION
|
# Looks for the deployment as specified by CSI_PROW_DEPLOYMENT and CSI_PROW_KUBERNETES_VERSION
|
||||||
# in the given directory.
|
# in the given directory.
|
||||||
find_deployment () {
|
find_deployment () {
|
||||||
local dir file
|
local dir="$1"
|
||||||
dir="$1"
|
local file
|
||||||
|
|
||||||
# Fixed deployment name? Use it if it exists, otherwise fail.
|
|
||||||
if [ "${CSI_PROW_DEPLOYMENT}" ]; then
|
|
||||||
file="$dir/${CSI_PROW_DEPLOYMENT}/deploy.sh"
|
|
||||||
if ! [ -e "$file" ]; then
|
|
||||||
return 1
|
|
||||||
fi
|
|
||||||
echo "$file"
|
|
||||||
return 0
|
|
||||||
fi
|
|
||||||
|
|
||||||
|
# major/minor without release- prefix.
|
||||||
|
local k8sver
|
||||||
# Ignore: See if you can use ${variable//search/replace} instead.
|
# Ignore: See if you can use ${variable//search/replace} instead.
|
||||||
# shellcheck disable=SC2001
|
# shellcheck disable=SC2001
|
||||||
file="$dir/kubernetes-$(echo "${CSI_PROW_KUBERNETES_VERSION}" | sed -e 's/\([0-9]*\)\.\([0-9]*\).*/\1.\2/')/deploy.sh"
|
k8sver="$(echo "${CSI_PROW_KUBERNETES_VERSION}" | sed -e 's/^release-//' -e 's/\([0-9]*\)\.\([0-9]*\).*/\1.\2/')"
|
||||||
|
|
||||||
|
# Desired deployment, either specified completely, including version, or derived from other variables.
|
||||||
|
local deployment
|
||||||
|
deployment=${CSI_PROW_DEPLOYMENT:-kubernetes-${k8sver}${CSI_PROW_DEPLOYMENT_SUFFIX}}
|
||||||
|
|
||||||
|
# Fixed deployment name? Use it if it exists.
|
||||||
|
if [ "${CSI_PROW_DEPLOYMENT}" ]; then
|
||||||
|
file="$dir/${CSI_PROW_DEPLOYMENT}/deploy.sh"
|
||||||
|
if [ -e "$file" ]; then
|
||||||
|
echo "$file"
|
||||||
|
return 0
|
||||||
|
fi
|
||||||
|
|
||||||
|
# CSI_PROW_DEPLOYMENT=kubernetes-x.yy must be mapped to kubernetes-latest
|
||||||
|
# as fallback. Same for kubernetes-distributed-x.yy.
|
||||||
|
fi
|
||||||
|
|
||||||
|
file="$dir/${deployment}/deploy.sh"
|
||||||
if ! [ -e "$file" ]; then
|
if ! [ -e "$file" ]; then
|
||||||
file="$dir/kubernetes-latest/deploy.sh"
|
# Replace the first xx.yy number with "latest", for example
|
||||||
|
# kubernetes-1.21-test -> kubernetes-latest-test.
|
||||||
|
# Ignore: See if you can use ${variable//search/replace} instead.
|
||||||
|
# shellcheck disable=SC2001
|
||||||
|
file="$dir/$(echo "$deployment" | sed -e 's/[0-9][0-9]*\.[0-9][0-9]*/latest/')/deploy.sh"
|
||||||
if ! [ -e "$file" ]; then
|
if ! [ -e "$file" ]; then
|
||||||
return 1
|
return 1
|
||||||
fi
|
fi
|
||||||
|
|
@ -696,7 +736,7 @@ install_csi_driver () {
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
# Installs all nessesary snapshotter CRDs
|
# Installs all nessesary snapshotter CRDs
|
||||||
install_snapshot_crds() {
|
install_snapshot_crds() {
|
||||||
# Wait until volumesnapshot CRDs are in place.
|
# Wait until volumesnapshot CRDs are in place.
|
||||||
CRD_BASE_DIR="https://raw.githubusercontent.com/kubernetes-csi/external-snapshotter/${CSI_SNAPSHOTTER_VERSION}/client/config/crd"
|
CRD_BASE_DIR="https://raw.githubusercontent.com/kubernetes-csi/external-snapshotter/${CSI_SNAPSHOTTER_VERSION}/client/config/crd"
|
||||||
|
|
@ -743,7 +783,7 @@ install_snapshot_controller() {
|
||||||
fi
|
fi
|
||||||
echo "$(date +%H:%M:%S)" "waiting for snapshot RBAC setup complete, attempt #$cnt"
|
echo "$(date +%H:%M:%S)" "waiting for snapshot RBAC setup complete, attempt #$cnt"
|
||||||
cnt=$((cnt + 1))
|
cnt=$((cnt + 1))
|
||||||
sleep 10
|
sleep 10
|
||||||
done
|
done
|
||||||
|
|
||||||
SNAPSHOT_CONTROLLER_YAML="${CONTROLLER_DIR}/deploy/kubernetes/snapshot-controller/setup-snapshot-controller.yaml"
|
SNAPSHOT_CONTROLLER_YAML="${CONTROLLER_DIR}/deploy/kubernetes/snapshot-controller/setup-snapshot-controller.yaml"
|
||||||
|
|
@ -756,7 +796,7 @@ install_snapshot_controller() {
|
||||||
kind load docker-image --name csi-prow ${NEW_IMG} || die "could not load the snapshot-controller:csiprow image into the kind cluster"
|
kind load docker-image --name csi-prow ${NEW_IMG} || die "could not load the snapshot-controller:csiprow image into the kind cluster"
|
||||||
|
|
||||||
# deploy snapshot-controller
|
# deploy snapshot-controller
|
||||||
echo "Deploying snapshot-controller"
|
echo "Deploying snapshot-controller from ${SNAPSHOT_CONTROLLER_YAML} with $NEW_IMG."
|
||||||
# Replace image in SNAPSHOT_CONTROLLER_YAML with snapshot-controller:csiprow and deploy
|
# Replace image in SNAPSHOT_CONTROLLER_YAML with snapshot-controller:csiprow and deploy
|
||||||
# NOTE: This logic is similar to the logic here:
|
# NOTE: This logic is similar to the logic here:
|
||||||
# https://github.com/kubernetes-csi/csi-driver-host-path/blob/v1.4.0/deploy/util/deploy-hostpath.sh#L155
|
# https://github.com/kubernetes-csi/csi-driver-host-path/blob/v1.4.0/deploy/util/deploy-hostpath.sh#L155
|
||||||
|
|
@ -793,25 +833,37 @@ install_snapshot_controller() {
|
||||||
echo "$modified"
|
echo "$modified"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
echo "kubectl apply -f ${SNAPSHOT_CONTROLLER_YAML}(modified)"
|
|
||||||
done
|
done
|
||||||
|
elif [ "${CSI_PROW_DRIVER_CANARY}" = "canary" ]; then
|
||||||
|
echo "Deploying snapshot-controller from ${SNAPSHOT_CONTROLLER_YAML} with canary images."
|
||||||
|
yaml="$(kubectl apply --dry-run=client -o yaml -f "$SNAPSHOT_CONTROLLER_YAML")"
|
||||||
|
# Ignore: See if you can use ${variable//search/replace} instead.
|
||||||
|
# shellcheck disable=SC2001
|
||||||
|
modified="$(echo "$yaml" | sed -e "s;image: .*/\([^/:]*\):.*;image: ${CSI_PROW_DRIVER_CANARY_REGISTRY}/\1:canary;")"
|
||||||
|
diff <(echo "$yaml") <(echo "$modified")
|
||||||
|
if ! echo "$modified" | kubectl apply -f -; then
|
||||||
|
echo "modified version of $SNAPSHOT_CONTROLLER_YAML:"
|
||||||
|
echo "$modified"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
else
|
else
|
||||||
echo "kubectl apply -f ${CONTROLLER_DIR}/deploy/kubernetes/snapshot-controller/setup-snapshot-controller.yaml"
|
echo "kubectl apply -f $SNAPSHOT_CONTROLLER_YAML"
|
||||||
kubectl apply -f "${CONTROLLER_DIR}/deploy/kubernetes/snapshot-controller/setup-snapshot-controller.yaml"
|
kubectl apply -f "$SNAPSHOT_CONTROLLER_YAML"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
cnt=0
|
cnt=0
|
||||||
expected_running_pods=$(curl https://raw.githubusercontent.com/kubernetes-csi/external-snapshotter/"${CSI_SNAPSHOTTER_VERSION}"/deploy/kubernetes/snapshot-controller/setup-snapshot-controller.yaml | grep replicas | cut -d ':' -f 2-)
|
expected_running_pods=$(kubectl apply --dry-run=client -o "jsonpath={.spec.replicas}" -f "$SNAPSHOT_CONTROLLER_YAML")
|
||||||
while [ "$(kubectl get pods -l app=snapshot-controller | grep 'Running' -c)" -lt "$expected_running_pods" ]; do
|
expected_namespace=$(kubectl apply --dry-run=client -o "jsonpath={.metadata.namespace}" -f "$SNAPSHOT_CONTROLLER_YAML")
|
||||||
|
while [ "$(kubectl get pods -n "$expected_namespace" -l app=snapshot-controller | grep 'Running' -c)" -lt "$expected_running_pods" ]; do
|
||||||
if [ $cnt -gt 30 ]; then
|
if [ $cnt -gt 30 ]; then
|
||||||
echo "snapshot-controller pod status:"
|
echo "snapshot-controller pod status:"
|
||||||
kubectl describe pods -l app=snapshot-controller
|
kubectl describe pods -n "$expected_namespace" -l app=snapshot-controller
|
||||||
echo >&2 "ERROR: snapshot controller not ready after over 5 min"
|
echo >&2 "ERROR: snapshot controller not ready after over 5 min"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
echo "$(date +%H:%M:%S)" "waiting for snapshot controller deployment to complete, attempt #$cnt"
|
echo "$(date +%H:%M:%S)" "waiting for snapshot controller deployment to complete, attempt #$cnt"
|
||||||
cnt=$((cnt + 1))
|
cnt=$((cnt + 1))
|
||||||
sleep 10
|
sleep 10
|
||||||
done
|
done
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -856,6 +908,29 @@ start_loggers () {
|
||||||
done
|
done
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# Patches the image versions of test/e2e/testing-manifests/storage-csi/mock in the k/k
|
||||||
|
# source code, if needed.
|
||||||
|
patch_kubernetes () {
|
||||||
|
local source="$1" target="$2"
|
||||||
|
|
||||||
|
if [ "${CSI_PROW_DRIVER_CANARY}" = "canary" ]; then
|
||||||
|
# We cannot replace k8s.gcr.io/sig-storage with gcr.io/k8s-staging-sig-storage because
|
||||||
|
# e2e.test does not support it (see test/utils/image/manifest.go). Instead we
|
||||||
|
# invoke the e2e.test binary with KUBE_TEST_REPO_LIST set to a file that
|
||||||
|
# overrides that registry.
|
||||||
|
find "$source/test/e2e/testing-manifests/storage-csi/mock" -name '*.yaml' -print0 | xargs -0 sed -i -e 's;k8s.gcr.io/sig-storage/\(.*\):v.*;k8s.gcr.io/sig-storage/\1:canary;'
|
||||||
|
cat >"$target/e2e-repo-list" <<EOF
|
||||||
|
sigStorageRegistry: gcr.io/k8s-staging-sig-storage
|
||||||
|
EOF
|
||||||
|
cat >&2 <<EOF
|
||||||
|
|
||||||
|
Using a modified version of k/k/test/e2e:
|
||||||
|
$(cd "$source" && git diff 2>&1)
|
||||||
|
|
||||||
|
EOF
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
# Makes the E2E test suite binary available as "${CSI_PROW_WORK}/e2e.test".
|
# Makes the E2E test suite binary available as "${CSI_PROW_WORK}/e2e.test".
|
||||||
install_e2e () {
|
install_e2e () {
|
||||||
if [ -e "${CSI_PROW_WORK}/e2e.test" ]; then
|
if [ -e "${CSI_PROW_WORK}/e2e.test" ]; then
|
||||||
|
|
@ -864,6 +939,7 @@ install_e2e () {
|
||||||
|
|
||||||
git_checkout "${CSI_PROW_E2E_REPO}" "${GOPATH}/src/${CSI_PROW_E2E_IMPORT_PATH}" "${CSI_PROW_E2E_VERSION}" --depth=1 &&
|
git_checkout "${CSI_PROW_E2E_REPO}" "${GOPATH}/src/${CSI_PROW_E2E_IMPORT_PATH}" "${CSI_PROW_E2E_VERSION}" --depth=1 &&
|
||||||
if [ "${CSI_PROW_E2E_IMPORT_PATH}" = "k8s.io/kubernetes" ]; then
|
if [ "${CSI_PROW_E2E_IMPORT_PATH}" = "k8s.io/kubernetes" ]; then
|
||||||
|
patch_kubernetes "${GOPATH}/src/${CSI_PROW_E2E_IMPORT_PATH}" "${CSI_PROW_WORK}" &&
|
||||||
go_version="${CSI_PROW_GO_VERSION_E2E:-$(go_version_for_kubernetes "${GOPATH}/src/${CSI_PROW_E2E_IMPORT_PATH}" "${CSI_PROW_E2E_VERSION}")}" &&
|
go_version="${CSI_PROW_GO_VERSION_E2E:-$(go_version_for_kubernetes "${GOPATH}/src/${CSI_PROW_E2E_IMPORT_PATH}" "${CSI_PROW_E2E_VERSION}")}" &&
|
||||||
run_with_go "$go_version" make WHAT=test/e2e/e2e.test "-C${GOPATH}/src/${CSI_PROW_E2E_IMPORT_PATH}" &&
|
run_with_go "$go_version" make WHAT=test/e2e/e2e.test "-C${GOPATH}/src/${CSI_PROW_E2E_IMPORT_PATH}" &&
|
||||||
ln -s "${GOPATH}/src/${CSI_PROW_E2E_IMPORT_PATH}/_output/bin/e2e.test" "${CSI_PROW_WORK}"
|
ln -s "${GOPATH}/src/${CSI_PROW_E2E_IMPORT_PATH}/_output/bin/e2e.test" "${CSI_PROW_WORK}"
|
||||||
|
|
@ -879,8 +955,8 @@ install_sanity () (
|
||||||
return
|
return
|
||||||
fi
|
fi
|
||||||
|
|
||||||
git_checkout "${CSI_PROW_SANITY_REPO}" "${GOPATH}/src/${CSI_PROW_SANITY_IMPORT_PATH}" "${CSI_PROW_SANITY_VERSION}" --depth=1 || die "checking out csi-sanity failed"
|
git_checkout "${CSI_PROW_SANITY_REPO}" "${GOPATH}/src/${CSI_PROW_SANITY_PACKAGE_PATH}" "${CSI_PROW_SANITY_VERSION}" --depth=1 || die "checking out csi-sanity failed"
|
||||||
run_with_go "${CSI_PROW_GO_VERSION_SANITY}" go test -c -o "${CSI_PROW_WORK}/csi-sanity" "${CSI_PROW_SANITY_IMPORT_PATH}/cmd/csi-sanity" || die "building csi-sanity failed"
|
( cd "${GOPATH}/src/${CSI_PROW_SANITY_PACKAGE_PATH}/cmd/csi-sanity" && run_with_go "${CSI_PROW_GO_VERSION_SANITY}" go build -o "${CSI_PROW_WORK}/csi-sanity" ) || die "building csi-sanity failed"
|
||||||
)
|
)
|
||||||
|
|
||||||
# Captures pod output while running some other command.
|
# Captures pod output while running some other command.
|
||||||
|
|
@ -909,25 +985,33 @@ run_e2e () (
|
||||||
# the full Kubernetes E2E testsuite while only running a few tests.
|
# the full Kubernetes E2E testsuite while only running a few tests.
|
||||||
move_junit () {
|
move_junit () {
|
||||||
if ls "${ARTIFACTS}"/junit_[0-9]*.xml 2>/dev/null >/dev/null; then
|
if ls "${ARTIFACTS}"/junit_[0-9]*.xml 2>/dev/null >/dev/null; then
|
||||||
run_filter_junit -t="External Storage" -o "${ARTIFACTS}/junit_${name}.xml" "${ARTIFACTS}"/junit_[0-9]*.xml && rm -f "${ARTIFACTS}"/junit_[0-9]*.xml
|
run_filter_junit -t="External.Storage|CSI.mock.volume" -o "${ARTIFACTS}/junit_${name}.xml" "${ARTIFACTS}"/junit_[0-9]*.xml && rm -f "${ARTIFACTS}"/junit_[0-9]*.xml
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
trap move_junit EXIT
|
trap move_junit EXIT
|
||||||
|
|
||||||
cd "${GOPATH}/src/${CSI_PROW_E2E_IMPORT_PATH}" &&
|
cd "${GOPATH}/src/${CSI_PROW_E2E_IMPORT_PATH}" &&
|
||||||
run_with_loggers ginkgo -v "$@" "${CSI_PROW_WORK}/e2e.test" -- -report-dir "${ARTIFACTS}" -storage.testdriver="${CSI_PROW_WORK}/test-driver.yaml"
|
run_with_loggers env KUBECONFIG="$KUBECONFIG" KUBE_TEST_REPO_LIST="$(if [ -e "${CSI_PROW_WORK}/e2e-repo-list" ]; then echo "${CSI_PROW_WORK}/e2e-repo-list"; fi)" ginkgo -v "$@" "${CSI_PROW_WORK}/e2e.test" -- -report-dir "${ARTIFACTS}" -storage.testdriver="${CSI_PROW_WORK}/test-driver.yaml"
|
||||||
)
|
)
|
||||||
|
|
||||||
# Run csi-sanity against installed CSI driver.
|
# Run csi-sanity against installed CSI driver.
|
||||||
run_sanity () (
|
run_sanity () (
|
||||||
install_sanity || die "installing csi-sanity failed"
|
install_sanity || die "installing csi-sanity failed"
|
||||||
|
|
||||||
|
if [[ "${CSI_PROW_SANITY_POD}" =~ " " ]]; then
|
||||||
|
# Contains spaces, more complex than a simple pod name.
|
||||||
|
# Evaluate as a shell command.
|
||||||
|
pod=$(eval "${CSI_PROW_SANITY_POD}") || die "evaluation failed: CSI_PROW_SANITY_POD=${CSI_PROW_SANITY_POD}"
|
||||||
|
else
|
||||||
|
pod="${CSI_PROW_SANITY_POD}"
|
||||||
|
fi
|
||||||
|
|
||||||
cat >"${CSI_PROW_WORK}/mkdir_in_pod.sh" <<EOF
|
cat >"${CSI_PROW_WORK}/mkdir_in_pod.sh" <<EOF
|
||||||
#!/bin/sh
|
#!/bin/sh
|
||||||
kubectl exec "${CSI_PROW_SANITY_POD}" -c "${CSI_PROW_SANITY_CONTAINER}" -- mkdir "\$@" && echo "\$@"
|
kubectl exec "$pod" -c "${CSI_PROW_SANITY_CONTAINER}" -- mkdir "\$@" && echo "\$@"
|
||||||
EOF
|
EOF
|
||||||
# Using "rm -rf" as fallback for "rmdir" is a workaround for:
|
# Using "rm -rf" as fallback for "rmdir" is a workaround for:
|
||||||
# Node Service
|
# Node Service
|
||||||
# should work
|
# should work
|
||||||
# /nvme/gopath.tmp/src/github.com/kubernetes-csi/csi-test/pkg/sanity/node.go:624
|
# /nvme/gopath.tmp/src/github.com/kubernetes-csi/csi-test/pkg/sanity/node.go:624
|
||||||
# STEP: reusing connection to CSI driver at dns:///172.17.0.2:30896
|
# STEP: reusing connection to CSI driver at dns:///172.17.0.2:30896
|
||||||
|
|
@ -949,11 +1033,29 @@ EOF
|
||||||
# why it happened.
|
# why it happened.
|
||||||
cat >"${CSI_PROW_WORK}/rmdir_in_pod.sh" <<EOF
|
cat >"${CSI_PROW_WORK}/rmdir_in_pod.sh" <<EOF
|
||||||
#!/bin/sh
|
#!/bin/sh
|
||||||
if ! kubectl exec "${CSI_PROW_SANITY_POD}" -c "${CSI_PROW_SANITY_CONTAINER}" -- rmdir "\$@"; then
|
if ! kubectl exec "$pod" -c "${CSI_PROW_SANITY_CONTAINER}" -- rmdir "\$@"; then
|
||||||
kubectl exec "${CSI_PROW_SANITY_POD}" -c "${CSI_PROW_SANITY_CONTAINER}" -- rm -rf "\$@"
|
kubectl exec "$pod" -c "${CSI_PROW_SANITY_CONTAINER}" -- rm -rf "\$@"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
|
cat >"${CSI_PROW_WORK}/checkdir_in_pod.sh" <<EOF
|
||||||
|
#!/bin/sh
|
||||||
|
CHECK_PATH=\$(cat <<SCRIPT
|
||||||
|
if [ -f "\$@" ]; then
|
||||||
|
echo "file"
|
||||||
|
elif [ -d "\$@" ]; then
|
||||||
|
echo "directory"
|
||||||
|
elif [ -e "\$@" ]; then
|
||||||
|
echo "other"
|
||||||
|
else
|
||||||
|
echo "not_found"
|
||||||
|
fi
|
||||||
|
SCRIPT
|
||||||
|
)
|
||||||
|
kubectl exec "$pod" -c "${CSI_PROW_SANITY_CONTAINER}" -- /bin/sh -c "\${CHECK_PATH}"
|
||||||
|
EOF
|
||||||
|
|
||||||
chmod u+x "${CSI_PROW_WORK}"/*dir_in_pod.sh
|
chmod u+x "${CSI_PROW_WORK}"/*dir_in_pod.sh
|
||||||
|
|
||||||
# This cannot run in parallel, because -csi.junitfile output
|
# This cannot run in parallel, because -csi.junitfile output
|
||||||
|
|
@ -969,6 +1071,7 @@ EOF
|
||||||
-csi.createmountpathcmd "${CSI_PROW_WORK}/mkdir_in_pod.sh" \
|
-csi.createmountpathcmd "${CSI_PROW_WORK}/mkdir_in_pod.sh" \
|
||||||
-csi.removestagingpathcmd "${CSI_PROW_WORK}/rmdir_in_pod.sh" \
|
-csi.removestagingpathcmd "${CSI_PROW_WORK}/rmdir_in_pod.sh" \
|
||||||
-csi.removemountpathcmd "${CSI_PROW_WORK}/rmdir_in_pod.sh" \
|
-csi.removemountpathcmd "${CSI_PROW_WORK}/rmdir_in_pod.sh" \
|
||||||
|
-csi.checkpathcmd "${CSI_PROW_WORK}/checkdir_in_pod.sh" \
|
||||||
)
|
)
|
||||||
|
|
||||||
ascii_to_xml () {
|
ascii_to_xml () {
|
||||||
|
|
@ -998,7 +1101,7 @@ make_test_to_junit () {
|
||||||
echo "$line" # pass through
|
echo "$line" # pass through
|
||||||
if echo "$line" | grep -q "^### [^ ]*:$"; then
|
if echo "$line" | grep -q "^### [^ ]*:$"; then
|
||||||
if [ "$testname" ]; then
|
if [ "$testname" ]; then
|
||||||
# previous test succesful
|
# previous test successful
|
||||||
echo " </system-out>" >>"$out"
|
echo " </system-out>" >>"$out"
|
||||||
echo " </testcase>" >>"$out"
|
echo " </testcase>" >>"$out"
|
||||||
fi
|
fi
|
||||||
|
|
@ -1072,7 +1175,7 @@ make_test_to_junit () {
|
||||||
# version_gt 1.3.1 v1.2.0 (returns true)
|
# version_gt 1.3.1 v1.2.0 (returns true)
|
||||||
# version_gt 1.1.1 release-1.2.0 (returns false)
|
# version_gt 1.1.1 release-1.2.0 (returns false)
|
||||||
# version_gt 1.2.0 1.2.2 (returns false)
|
# version_gt 1.2.0 1.2.2 (returns false)
|
||||||
function version_gt() {
|
function version_gt() {
|
||||||
versions=$(for ver in "$@"; do ver=${ver#release-}; ver=${ver#kubernetes-}; echo "${ver#v}"; done)
|
versions=$(for ver in "$@"; do ver=${ver#release-}; ver=${ver#kubernetes-}; echo "${ver#v}"; done)
|
||||||
greaterVersion=${1#"release-"};
|
greaterVersion=${1#"release-"};
|
||||||
greaterVersion=${greaterVersion#"kubernetes-"};
|
greaterVersion=${greaterVersion#"kubernetes-"};
|
||||||
|
|
@ -1084,6 +1187,9 @@ main () {
|
||||||
local images ret
|
local images ret
|
||||||
ret=0
|
ret=0
|
||||||
|
|
||||||
|
# Set up work directory.
|
||||||
|
ensure_paths
|
||||||
|
|
||||||
images=
|
images=
|
||||||
if ${CSI_PROW_BUILD_JOB}; then
|
if ${CSI_PROW_BUILD_JOB}; then
|
||||||
# A successful build is required for testing.
|
# A successful build is required for testing.
|
||||||
|
|
@ -1132,7 +1238,7 @@ main () {
|
||||||
if [ "$rbac_file_path" == "" ]; then
|
if [ "$rbac_file_path" == "" ]; then
|
||||||
rbac_file_path="$(pwd)/deploy/kubernetes/rbac.yaml"
|
rbac_file_path="$(pwd)/deploy/kubernetes/rbac.yaml"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [ -e "$rbac_file_path" ]; then
|
if [ -e "$rbac_file_path" ]; then
|
||||||
# This is one of those components which has its own RBAC rules (like external-provisioner).
|
# This is one of those components which has its own RBAC rules (like external-provisioner).
|
||||||
# We are testing a locally built image and also want to test with the the current,
|
# We are testing a locally built image and also want to test with the the current,
|
||||||
|
|
@ -1143,6 +1249,12 @@ main () {
|
||||||
done
|
done
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# Run the external driver tests and optionally also mock tests.
|
||||||
|
local focus="External.Storage"
|
||||||
|
if "$CSI_PROW_E2E_MOCK"; then
|
||||||
|
focus="($focus|CSI.mock.volume)"
|
||||||
|
fi
|
||||||
|
|
||||||
if tests_need_non_alpha_cluster; then
|
if tests_need_non_alpha_cluster; then
|
||||||
start_cluster || die "starting the non-alpha cluster failed"
|
start_cluster || die "starting the non-alpha cluster failed"
|
||||||
|
|
||||||
|
|
@ -1150,6 +1262,7 @@ main () {
|
||||||
install_snapshot_crds
|
install_snapshot_crds
|
||||||
install_snapshot_controller
|
install_snapshot_controller
|
||||||
|
|
||||||
|
|
||||||
# Installing the driver might be disabled.
|
# Installing the driver might be disabled.
|
||||||
if ${CSI_PROW_DRIVER_INSTALL} "$images"; then
|
if ${CSI_PROW_DRIVER_INSTALL} "$images"; then
|
||||||
collect_cluster_info
|
collect_cluster_info
|
||||||
|
|
@ -1164,7 +1277,7 @@ main () {
|
||||||
# Ignore: Double quote to prevent globbing and word splitting.
|
# Ignore: Double quote to prevent globbing and word splitting.
|
||||||
# shellcheck disable=SC2086
|
# shellcheck disable=SC2086
|
||||||
if ! run_e2e parallel ${CSI_PROW_GINKO_PARALLEL} \
|
if ! run_e2e parallel ${CSI_PROW_GINKO_PARALLEL} \
|
||||||
-focus="External.Storage" \
|
-focus="$focus" \
|
||||||
-skip="$(regex_join "${CSI_PROW_E2E_SERIAL}" "${CSI_PROW_E2E_ALPHA}" "${CSI_PROW_E2E_SKIP}")"; then
|
-skip="$(regex_join "${CSI_PROW_E2E_SERIAL}" "${CSI_PROW_E2E_ALPHA}" "${CSI_PROW_E2E_SKIP}")"; then
|
||||||
warn "E2E parallel failed"
|
warn "E2E parallel failed"
|
||||||
ret=1
|
ret=1
|
||||||
|
|
@ -1174,7 +1287,7 @@ main () {
|
||||||
# Ignore: Double quote to prevent globbing and word splitting.
|
# Ignore: Double quote to prevent globbing and word splitting.
|
||||||
# shellcheck disable=SC2086
|
# shellcheck disable=SC2086
|
||||||
if ! run_e2e parallel-features ${CSI_PROW_GINKO_PARALLEL} \
|
if ! run_e2e parallel-features ${CSI_PROW_GINKO_PARALLEL} \
|
||||||
-focus="External.Storage.*($(regex_join "${CSI_PROW_E2E_FOCUS}"))" \
|
-focus="$focus.*($(regex_join "${CSI_PROW_E2E_FOCUS}"))" \
|
||||||
-skip="$(regex_join "${CSI_PROW_E2E_SERIAL}")"; then
|
-skip="$(regex_join "${CSI_PROW_E2E_SERIAL}")"; then
|
||||||
warn "E2E parallel features failed"
|
warn "E2E parallel features failed"
|
||||||
ret=1
|
ret=1
|
||||||
|
|
@ -1183,14 +1296,14 @@ main () {
|
||||||
|
|
||||||
if tests_enabled "serial"; then
|
if tests_enabled "serial"; then
|
||||||
if ! run_e2e serial \
|
if ! run_e2e serial \
|
||||||
-focus="External.Storage.*($(regex_join "${CSI_PROW_E2E_SERIAL}"))" \
|
-focus="$focus.*($(regex_join "${CSI_PROW_E2E_SERIAL}"))" \
|
||||||
-skip="$(regex_join "${CSI_PROW_E2E_ALPHA}" "${CSI_PROW_E2E_SKIP}")"; then
|
-skip="$(regex_join "${CSI_PROW_E2E_ALPHA}" "${CSI_PROW_E2E_SKIP}")"; then
|
||||||
warn "E2E serial failed"
|
warn "E2E serial failed"
|
||||||
ret=1
|
ret=1
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
delete_cluster_inside_prow_job
|
delete_cluster_inside_prow_job non-alpha
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if tests_need_alpha_cluster && [ "${CSI_PROW_E2E_ALPHA_GATES}" ]; then
|
if tests_need_alpha_cluster && [ "${CSI_PROW_E2E_ALPHA_GATES}" ]; then
|
||||||
|
|
@ -1209,7 +1322,7 @@ main () {
|
||||||
# Ignore: Double quote to prevent globbing and word splitting.
|
# Ignore: Double quote to prevent globbing and word splitting.
|
||||||
# shellcheck disable=SC2086
|
# shellcheck disable=SC2086
|
||||||
if ! run_e2e parallel-alpha ${CSI_PROW_GINKO_PARALLEL} \
|
if ! run_e2e parallel-alpha ${CSI_PROW_GINKO_PARALLEL} \
|
||||||
-focus="External.Storage.*($(regex_join "${CSI_PROW_E2E_ALPHA}"))" \
|
-focus="$focus.*($(regex_join "${CSI_PROW_E2E_ALPHA}"))" \
|
||||||
-skip="$(regex_join "${CSI_PROW_E2E_SERIAL}" "${CSI_PROW_E2E_SKIP}")"; then
|
-skip="$(regex_join "${CSI_PROW_E2E_SERIAL}" "${CSI_PROW_E2E_SKIP}")"; then
|
||||||
warn "E2E parallel alpha failed"
|
warn "E2E parallel alpha failed"
|
||||||
ret=1
|
ret=1
|
||||||
|
|
@ -1218,14 +1331,14 @@ main () {
|
||||||
|
|
||||||
if tests_enabled "serial-alpha"; then
|
if tests_enabled "serial-alpha"; then
|
||||||
if ! run_e2e serial-alpha \
|
if ! run_e2e serial-alpha \
|
||||||
-focus="External.Storage.*(($(regex_join "${CSI_PROW_E2E_SERIAL}")).*($(regex_join "${CSI_PROW_E2E_ALPHA}"))|($(regex_join "${CSI_PROW_E2E_ALPHA}")).*($(regex_join "${CSI_PROW_E2E_SERIAL}")))" \
|
-focus="$focus.*(($(regex_join "${CSI_PROW_E2E_SERIAL}")).*($(regex_join "${CSI_PROW_E2E_ALPHA}"))|($(regex_join "${CSI_PROW_E2E_ALPHA}")).*($(regex_join "${CSI_PROW_E2E_SERIAL}")))" \
|
||||||
-skip="$(regex_join "${CSI_PROW_E2E_SKIP}")"; then
|
-skip="$(regex_join "${CSI_PROW_E2E_SKIP}")"; then
|
||||||
warn "E2E serial alpha failed"
|
warn "E2E serial alpha failed"
|
||||||
ret=1
|
ret=1
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
delete_cluster_inside_prow_job
|
delete_cluster_inside_prow_job alpha
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
|
@ -1245,6 +1358,9 @@ gcr_cloud_build () {
|
||||||
# Required for "docker buildx build --push".
|
# Required for "docker buildx build --push".
|
||||||
gcloud auth configure-docker
|
gcloud auth configure-docker
|
||||||
|
|
||||||
|
# Might not be needed here, but call it just in case.
|
||||||
|
ensure_paths
|
||||||
|
|
||||||
if find . -name Dockerfile | grep -v ^./vendor | xargs --no-run-if-empty cat | grep -q ^RUN; then
|
if find . -name Dockerfile | grep -v ^./vendor | xargs --no-run-if-empty cat | grep -q ^RUN; then
|
||||||
# Needed for "RUN" steps on non-linux/amd64 platforms.
|
# Needed for "RUN" steps on non-linux/amd64 platforms.
|
||||||
# See https://github.com/multiarch/qemu-user-static#getting-started
|
# See https://github.com/multiarch/qemu-user-static#getting-started
|
||||||
|
|
|
||||||
|
|
@ -0,0 +1,32 @@
|
||||||
|
#! /bin/sh
|
||||||
|
|
||||||
|
# Copyright 2021 The Kubernetes Authors.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
# This script is called by pull Prow jobs for the csi-release-tools
|
||||||
|
# repo to ensure that the changes in the PR work when imported into
|
||||||
|
# some other repo.
|
||||||
|
|
||||||
|
set -ex
|
||||||
|
|
||||||
|
# It must be called inside the updated csi-release-tools repo.
|
||||||
|
CSI_RELEASE_TOOLS_DIR="$(pwd)"
|
||||||
|
|
||||||
|
# Update the other repo.
|
||||||
|
cd "$PULL_TEST_REPO_DIR"
|
||||||
|
git subtree pull --squash --prefix=release-tools "$CSI_RELEASE_TOOLS_DIR" master
|
||||||
|
git log -n2
|
||||||
|
|
||||||
|
# Now fall through to testing.
|
||||||
|
exec ./.prow.sh
|
||||||
21
travis.yml
21
travis.yml
|
|
@ -1,21 +0,0 @@
|
||||||
language: go
|
|
||||||
sudo: required
|
|
||||||
services:
|
|
||||||
- docker
|
|
||||||
git:
|
|
||||||
depth: false
|
|
||||||
matrix:
|
|
||||||
include:
|
|
||||||
- go: 1.15
|
|
||||||
before_script:
|
|
||||||
- mkdir -p bin
|
|
||||||
- wget https://github.com/golang/dep/releases/download/v0.5.1/dep-linux-amd64 -O bin/dep
|
|
||||||
- chmod u+x bin/dep
|
|
||||||
- export PATH=$PWD/bin:$PATH
|
|
||||||
script:
|
|
||||||
- make -k all test GOFLAGS_VENDOR=$( [ -d vendor ] && echo '-mod=vendor' )
|
|
||||||
after_success:
|
|
||||||
- if [ "${TRAVIS_PULL_REQUEST}" == "false" ]; then
|
|
||||||
docker login -u "${DOCKER_USERNAME}" -p "${DOCKER_PASSWORD}" quay.io;
|
|
||||||
make push GOFLAGS_VENDOR=$( [ -d vendor ] && echo '-mod=vendor' );
|
|
||||||
fi
|
|
||||||
|
|
@ -0,0 +1,54 @@
|
||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
# Copyright 2014 The Kubernetes Authors.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
set -o errexit
|
||||||
|
set -o nounset
|
||||||
|
set -o pipefail
|
||||||
|
|
||||||
|
echo "Verifying boilerplate"
|
||||||
|
|
||||||
|
if [[ -z "$(command -v python)" ]]; then
|
||||||
|
echo "Cannot find python. Make link to python3..."
|
||||||
|
update-alternatives --install /usr/bin/python python /usr/bin/python3 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# The csi-release-tools directory (absolute path).
|
||||||
|
TOOLS="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd -P)"
|
||||||
|
|
||||||
|
# Directory to check. Default is the parent of the tools themselves.
|
||||||
|
ROOT="${1:-${TOOLS}/..}"
|
||||||
|
|
||||||
|
boiler="${TOOLS}/boilerplate/boilerplate.py"
|
||||||
|
|
||||||
|
mapfile -t files_need_boilerplate < <("${boiler}" --rootdir="${ROOT}" --verbose)
|
||||||
|
|
||||||
|
# Run boilerplate.py unit tests
|
||||||
|
unitTestOut="$(mktemp)"
|
||||||
|
trap cleanup EXIT
|
||||||
|
cleanup() {
|
||||||
|
rm "${unitTestOut}"
|
||||||
|
}
|
||||||
|
|
||||||
|
# Run boilerplate check
|
||||||
|
if [[ ${#files_need_boilerplate[@]} -gt 0 ]]; then
|
||||||
|
for file in "${files_need_boilerplate[@]}"; do
|
||||||
|
echo "Boilerplate header is wrong for: ${file}"
|
||||||
|
done
|
||||||
|
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo "Done"
|
||||||
|
|
@ -29,8 +29,9 @@ die () {
|
||||||
version=$("$GO" version) || die "determining version of $GO failed"
|
version=$("$GO" version) || die "determining version of $GO failed"
|
||||||
# shellcheck disable=SC2001
|
# shellcheck disable=SC2001
|
||||||
majorminor=$(echo "$version" | sed -e 's/.*go\([0-9]*\)\.\([0-9]*\).*/\1.\2/')
|
majorminor=$(echo "$version" | sed -e 's/.*go\([0-9]*\)\.\([0-9]*\).*/\1.\2/')
|
||||||
# shellcheck disable=SC2001
|
# SC1091: Not following: release-tools/prow.sh was not specified as input (see shellcheck -x).
|
||||||
expected=$(grep "^ *- go:" "release-tools/travis.yml" | sed -e 's/.*go: *\([0-9]*\)\.\([0-9]*\).*/\1.\2/')
|
# shellcheck disable=SC1091
|
||||||
|
expected=$(. release-tools/prow.sh >/dev/null && echo "$CSI_PROW_GO_VERSION_BUILD")
|
||||||
|
|
||||||
if [ "$majorminor" != "$expected" ]; then
|
if [ "$majorminor" != "$expected" ]; then
|
||||||
cat >&2 <<EOF
|
cat >&2 <<EOF
|
||||||
|
|
|
||||||
|
|
@ -84,7 +84,7 @@ done < <(find . -name "*.sh" \
|
||||||
# detect if the host machine has the required shellcheck version installed
|
# detect if the host machine has the required shellcheck version installed
|
||||||
# if so, we will use that instead.
|
# if so, we will use that instead.
|
||||||
HAVE_SHELLCHECK=false
|
HAVE_SHELLCHECK=false
|
||||||
if which shellcheck &>/dev/null; then
|
if command -v shellcheck &>/dev/null; then
|
||||||
detected_version="$(shellcheck --version | grep 'version: .*')"
|
detected_version="$(shellcheck --version | grep 'version: .*')"
|
||||||
if [[ "${detected_version}" = "version: ${SHELLCHECK_VERSION}" ]]; then
|
if [[ "${detected_version}" = "version: ${SHELLCHECK_VERSION}" ]]; then
|
||||||
HAVE_SHELLCHECK=true
|
HAVE_SHELLCHECK=true
|
||||||
|
|
|
||||||
|
|
@ -0,0 +1,59 @@
|
||||||
|
#!/usr/bin/env bash
|
||||||
|
|
||||||
|
# Copyright 2019 The Kubernetes Authors.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
set -o errexit
|
||||||
|
set -o nounset
|
||||||
|
set -o pipefail
|
||||||
|
|
||||||
|
TOOL_VERSION="v0.3.4"
|
||||||
|
|
||||||
|
# The csi-release-tools directory (absolute path).
|
||||||
|
TOOLS="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd -P)"
|
||||||
|
|
||||||
|
# Directory to check. Default is the parent of the tools themselves.
|
||||||
|
ROOT="${1:-${TOOLS}/..}"
|
||||||
|
|
||||||
|
# create a temporary directory
|
||||||
|
TMP_DIR=$(mktemp -d)
|
||||||
|
|
||||||
|
# cleanup
|
||||||
|
exitHandler() (
|
||||||
|
echo "Cleaning up..."
|
||||||
|
rm -rf "${TMP_DIR}"
|
||||||
|
)
|
||||||
|
trap exitHandler EXIT
|
||||||
|
|
||||||
|
if [[ -z "$(command -v misspell)" ]]; then
|
||||||
|
echo "Cannot find misspell. Installing misspell..."
|
||||||
|
# perform go get in a temp dir as we are not tracking this version in a go module
|
||||||
|
# if we do the go get in the repo, it will create / update a go.mod and go.sum
|
||||||
|
cd "${TMP_DIR}"
|
||||||
|
GO111MODULE=on GOBIN="${TMP_DIR}" go get "github.com/client9/misspell/cmd/misspell@${TOOL_VERSION}"
|
||||||
|
export PATH="${TMP_DIR}:${PATH}"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# check spelling
|
||||||
|
RES=0
|
||||||
|
echo "Checking spelling..."
|
||||||
|
ERROR_LOG="${TMP_DIR}/errors.log"
|
||||||
|
cd "${ROOT}"
|
||||||
|
git ls-files | grep -v vendor | xargs misspell > "${ERROR_LOG}"
|
||||||
|
if [[ -s "${ERROR_LOG}" ]]; then
|
||||||
|
sed 's/^/error: /' "${ERROR_LOG}" # add 'error' to each line to highlight in e2e status
|
||||||
|
echo "Found spelling errors!"
|
||||||
|
RES=1
|
||||||
|
fi
|
||||||
|
exit "${RES}"
|
||||||
|
|
@ -1,5 +1,5 @@
|
||||||
#! /bin/sh -e
|
#! /bin/sh -e
|
||||||
#
|
|
||||||
# Copyright 2019 The Kubernetes Authors.
|
# Copyright 2019 The Kubernetes Authors.
|
||||||
#
|
#
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue