Comments (15)
@smarterclayton I see your point now. Perhaps it's most important that the client version
part of version.txt
match the directory you're submitting to. I think if we update the instructions, we're keeping the spirit of the check and unblocking you. Correct?
from k8s-conformance.
@smarterclayton not sure I follow the question. version.txt
is generated by code added in heptio/kube-conformance#6. I am already working on upstreaming that so the test itself generates this data (kubernetes/kubernetes#53551).
It is possible we need to cut new version of 1.7 and 1.8 kube-conformance
docker images. @timothysc would be able to do that.
In the absence of those, you can build the images yourself from kube-conformance
sources, or I have some images I built for 1.7 and for 1.8.
from k8s-conformance.
We are planning a 0.9.0 release to match with 1.8.0/1.8.1 ... and will rev appropriately.
@mml Could you poke about getting your e2e patch into 1.8.1 please?
from k8s-conformance.
The problem with version is that it doesn't identify the vendor version for any distribution that has a commit history that is not in kubernetes/kubernetes. If we think version.txt is important it needs to capture more than what client/server versions return
from k8s-conformance.
So in general I don't think it should be a requirement for the kubectl client to match the server. The e2e tests expect a particular kubectl version, and in practice the conformance tests are validating that the server (i.e. the conformant kubernetes implementation) matches a set of expected API and runtime behavior. I think kubectl in this case is part of the test suite, not part of the distribution. The 1.8 e2e tests run against a 1.7 kubectl and 1.7 server make less sense than verifying the 1.8 e2e tests and the 1.8 tests run correctly against a 1.7 server.
from k8s-conformance.
from k8s-conformance.
For now the instructions specify that the tests should match. The reason for that is that we think the definition of "Kubernetes 1.7" is codified on the 1.7 branch. You could imagine a future where Kubernetes N.{M+1}
is the first version without behavior X, and so running those tests doesn't prove that the cluster is N.M
.
If we need to discuss versioning further, happy to do so. Maybe on the mailing list?
from k8s-conformance.
(Oh, and I will send a PR to fix the instructions.)
from k8s-conformance.
For now the instructions specify that the tests should match. The reason for that is that we think the definition of "Kubernetes 1.7" is codified on the 1.7 branch. You could imagine a future where Kubernetes N.{M+1} is the first version without behavior X, and so running those tests doesn't prove that the cluster is N.M.
We had a discussion (EDIT: somewhere, can't find it) where we said to use 1.8 against 1.7. However, if the fixes have been delivered to correct the issues in the 1.7 tests then I can update it again and run it.
from k8s-conformance.
I'm also a little confused by this - why would tests @ v1.7.3 be the canonical version for all v1.7 clusters? https://github.com/cncf/k8s-conformance/blob/master/sonobuoy-conformance-1.7.yaml#L95
Shouldn't it either be highest patch version available, or at least same version that you're deploying / testing conformance? (I've never been aware of discussions to use next minor release)
from k8s-conformance.
I updated to build against release-1.7 kubectl and e2e and this is my version output:
Client Version: version.Info{Major:"1", Minor:"7+", GitVersion:"v1.7.9-beta.0.30+0a69594976467a", GitCommit:"0a69594976467a56597ad805585b1947d8b4cec0", GitTreeState:"clean", BuildDate:"2017-10-17T15:46:49Z", GoVersion:"go1.8.3", Compiler:"gc", Platform:"linux/amd64"}
Server Version: version.Info{Major:"1", Minor:"7", GitVersion:"v1.7.6+a08f5eeb62", GitCommit:"c84beff", GitTreeState:"clean", BuildDate:"2017-10-17T15:10:20Z", GoVersion:"go1.8.3", Compiler:"gc", Platform:"linux/amd64"}
-----
oc v3.7.0-alpha.1+b507a7f-1152
kubernetes v1.7.6+a08f5eeb62
features: Basic-Auth GSSAPI Kerberos SPNEGO
Server https://internal-api.prtest-060e08d-10.origin-ci-int-gce.dev.rhcloud.com:8443
openshift v3.7.0-alpha.1+b507a7f-1152
kubernetes v1.7.6+a08f5eeb62
This is using the release-1.7 branch kubectl, paired with the release-1.7 branch e2e tests, against OpenShift with Kube 1.7.6+patches.
from k8s-conformance.
Does this satisfy the version constraints as written?
from k8s-conformance.
@smarterclayton Please note that I'm also happy for you to suggest revisions in the reviewing directions: #9 (comment)
from k8s-conformance.
My personal opinion is that we can tolerate +1 on the minor and it should be ok. There were was conflict on #24
from k8s-conformance.
This was resolved in 19212f4#diff-832893d512e4929e92c510d2d3bdb772
from k8s-conformance.
Related Issues (20)
- Attempt to run sonobuoy on K8s cluster failed at pull images for the container.
- README.md : Fix spelling and grammar HOT 2
- conformance v1.18.7 & v1.18.8 fails with Pod entered a fatal terminal status: failed HOT 1
- Missing conformance docs for 1.16-1.21
- Update verify-conformance-tests to have better xml parsing HOT 6
- Our installer product doesn't have a website yet HOT 2
- After conformance certification, service not displayed in 'Certified Kubernetes - Hosted '. HOT 2
- Kubernetes Conformance - Expired Certification HOT 3
- [cncf-ci checks failed] The acutal conformance test has passed. HOT 1
- Windows Operational Readiness formatting HOT 2
- Branch protection rules HOT 5
- Missing conformance docs for 1.22-1.25
- Add contact email as requiement for PRODUCT.yaml with Conformance submissions HOT 3
- GHA to Automate the generation of the Conformance Document HOT 1
- Scrape commit email addresses for CNCF/K8s-Conformance for Conformance submissions for release 1.23-1.25 HOT 2
- Roll out Prow Github actions on cncf/k8s-conformance for test in of /assign of multi github handles HOT 5
- Update reviewing.md HOT 5
- doc for extend conformance time period
- Reduce repo size to improve end user experience on submitting K8s Conformance pull requests HOT 2
- Document `hydrophone` as yet another option for running conformance tests HOT 3
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from k8s-conformance.