-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[CONFORMANCE] Use kube-network-policies to run conformance tests in the CI #225
Comments
It is already merged, isn't it ? |
I think @tssurya meant we should be running the core K8s network policy tests on the network-policy-api repo as well as in the core prow instance so that we can easily see if anything is broken/ go fix it At the very least it'd be nice for us to be alerted if something was broken with the core tests so that we could assist in fixing them, since part of our charter is "maintaining the in-tree NetworkPolicy resource/tests" |
you mean set a periodic job in prow? |
I was thinking run the core netpol tests against But maybe Surya had something else in mind here? |
kube-network-policies is used for kubernetes CI , periodic and presubmit https://testgrid.k8s.io/sig-network-gce#network-policies,%20google-gce&width=20 There is a flake with one specific test , I'm investigating it here kubernetes-sigs/kube-network-policies#12, but it seems some kernel or OS thing but there are zero flakes on the github actions in kube-network-policies |
I don't fully understand but happy to help or discuss |
yes exactly what was done in #224 except I didn't see that PR :) Andrew merged it too quick haha |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close not-planned |
@k8s-triage-robot: Closing this issue, marking it as "Not Planned". In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Why this is needed:
We need to use https://github.com/kubernetes-sigs/kube-network-policies now that we have an implementation that will help us catch CI flakes and improve our testing framework
thanks @aojea for the awesome work here. Definitely helps having a non-vendor implementation based CI runs that we can play with and maintain
TODO: Add a CI lane for this
The text was updated successfully, but these errors were encountered: