Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Status of testing Providers that were prepared on April 02, 2023 #30427

Closed
40 of 64 tasks
eladkal opened this issue Apr 2, 2023 · 30 comments
Closed
40 of 64 tasks

Status of testing Providers that were prepared on April 02, 2023 #30427

eladkal opened this issue Apr 2, 2023 · 30 comments
Labels
kind:meta High-level information important to the community testing status Status of testing releases

Comments

@eladkal
Copy link
Contributor

eladkal commented Apr 2, 2023

Body

I have a kind request for all the contributors to the latest provider packages release.
Could you please help us to test the RC versions of the providers?

Let us know in the comment, whether the issue is addressed.

Those are providers that require testing as there were some substantial changes introduced:

Provider airbyte: 3.2.1rc1

Provider alibaba: 2.3.0rc1

Provider amazon: 7.4.0rc1

Provider apache.drill: 2.3.2rc1

Provider apache.hdfs: 3.2.1rc1

Provider apache.hive: 6.0.0rc1

Provider apache.livy: 3.4.0rc1

Provider apache.spark: 4.0.1rc1

Provider cncf.kubernetes: 5.3.0rc1

Provider common.sql: 1.4.0rc1

Provider databricks: 4.0.1rc1

Provider datadog: 3.2.0rc1

Provider google: 8.12.0rc1

Provider hashicorp: 3.3.1rc1

Provider http: 4.3.0rc1

Provider jenkins: 3.2.1rc1

Provider microsoft.azure: 5.3.0rc1

Provider ssh: 3.6.0rc1

The guidelines on how to test providers can be found in

Verify providers by contributors

All users involved in the PRs:
@Lee-W @IKholopov @uranusjr @josh-fell @vandonr-amz @aru-trackunit @o-nikolas @1inuxoid @pankajastro @syedahsn @tnk-ysk @trickysky @vchiapaikeo @r-richmond @blcksrx @moiseenkov @punx120 @nivangio @ashb
@sirVir @romibuzi @shahar1 @Yaro1 @phanikumv @ottomata @hussein-awala @ephraimbuddy @eladkal @adamwhitneysoftwire @potiuk @aibazhang @okayhooni

Committer

  • I acknowledge that I am a maintainer/committer of the Apache Airflow project.
@eladkal eladkal added kind:meta High-level information important to the community testing status Status of testing releases labels Apr 2, 2023
@potiuk
Copy link
Member

potiuk commented Apr 2, 2023

Verified that my changes are present in the new providers:

@hussein-awala
Copy link
Member

I tested:

For #29772 I will test it tomorrow for Amazon provider, but I can't test it for other providers.

@vchiapaikeo
Copy link
Contributor

Tested #30301 and it still looks good!

image

image

@phanikumv
Copy link
Contributor

Is it possible to include #30370 in the amazon RC ? It fixes a bug in #30090.

@aibazhang
Copy link
Contributor

I tested #30035, it works as expected

@eladkal
Copy link
Contributor Author

eladkal commented Apr 3, 2023

Is it possible to include #30370 in the amazon RC ? It fixes a bug in #30090.

No. this will be released in next wave

@adamwhitneysoftwire
Copy link
Contributor

Tested Fix AzureDataLakeStorageV2Hook with Active Directory authentication #29981 - The connection form improvements were present and the connection worked as expected.

@aru-trackunit
Copy link
Contributor

Tested #29694 - works as expected

@blcksrx
Copy link
Contributor

blcksrx commented Apr 3, 2023

Works as expected #29977

@ephraimbuddy
Copy link
Contributor

#30216 should not be included in a release yet. Is there a way this can be avoided @eladkal

@potiuk
Copy link
Member

potiuk commented Apr 3, 2023

#30216 should not be included in a release yet. Is there a way this can be avoided @eladkal

Good catch, but I think this is a wrong question.

Part of the change is in cncf.kubernetes @ephraimbuddy -> this is what''s being released, so if it is not compatible with currently released airflow, it should be fixed. Generally the expectation is that if there is any change in a provider that require some changes to airflow core, one of the two things happen:

a) it is made in a backwards-compatble way that will be well handled in the older airflow version (by fallback, etc.)
b) it limits min-airflow version to be the future airflow version in provider.yaml

In this case, I think a) case is the right approach, so my question is (and mostly to you @ephraimbuddy :)

Is it backwards compatible with airlfow 2.3+?

if yes-> all is cool and we can release cncnf.kubernetes as is. If not, we should remove cncf.kubernetes from the release and fix it so that it is backwards compatible (and prepare rc2).

@potiuk
Copy link
Member

potiuk commented Apr 3, 2023

if yes-> all is cool and we can release cncnf.kubernetes as is. If not, we should remove cncf.kubernetes from the release and fix it so that it is backwards compatible (and prepare rc2).

BTW. Looking at the code, it seems it is backwards-compatible, but I would love if you can confirm it @ephraimbuddy. And if it is, there is absolutely no problem in including that change in this release and it is how it should be. Imagine someone installing 2.6.0 tomorrow with setup teardown. If there is no released version of cncf.kubernetes that is compatible with it released, then we would be in a big trouble - this actueally means that we HAVE TO release cncf.kubernetes with this change before Airflow 2.6 is released. There is no other way. If we don't release it before, it will not work properly when 2.6.0 is released.

@punx120
Copy link
Contributor

punx120 commented Apr 3, 2023

Tested #30190, works as expected

@romibuzi
Copy link
Contributor

romibuzi commented Apr 3, 2023

Tested #30162, works as expected

@ephraimbuddy
Copy link
Contributor

#30216 should not be included in a release yet. Is there a way this can be avoided @eladkal

Good catch, but I think this is a wrong question.

Part of the change is in cncf.kubernetes @ephraimbuddy -> this is what''s being released, so if it is not compatible with currently released airflow, it should be fixed. Generally the expectation is that if there is any change in a provider that require some changes to airflow core, one of the two things happen:

a) it is made in a backwards-compatble way that will be well handled in the older airflow version (by fallback, etc.) b) it limits min-airflow version to be the future airflow version in provider.yaml

In this case, I think a) case is the right approach, so my question is (and mostly to you @ephraimbuddy :)

Is it backwards compatible with airlfow 2.3+?

if yes-> all is cool and we can release cncnf.kubernetes as is. If not, we should remove cncf.kubernetes from the release and fix it so that it is backwards compatible (and prepare rc2).

Yeah. It’s backwards compatible. I discussed with @eladkal and he said the release doesn’t include the test files and it’s only in the test files that we made import that should have caused backwards incompatibility.

@potiuk
Copy link
Member

potiuk commented Apr 3, 2023

Yeah. It’s backwards compatible. I discussed with @eladkal and he said the release doesn’t include the test files and it’s only in the test files that we made import that should have caused backwards incompatibility.

Cool! Great you double checked it!

@phanikumv
Copy link
Contributor

Tested the below PR and they are working fine

#30147
#29801
#30248

image

@josh-fell
Copy link
Contributor

josh-fell commented Apr 4, 2023

#30031, #30099, #29863, and #30138 look good.

Thanks for organizing @eladkal!

@tnk-ysk
Copy link
Contributor

tnk-ysk commented Apr 4, 2023

@eladkal
Testing #29937, I found another bug related to this fix and opened PR #30441.
This bug was not caused by #29937, but due to that, I have not been able to confirm success of deferrable.
Other fix seem fine.

@eladkal
Copy link
Contributor Author

eladkal commented Apr 4, 2023

thank you @tnk-ysk
since this is not a regression I tend to continue release of the provider as is.
@potiuk WDYT ?

@potiuk
Copy link
Member

potiuk commented Apr 4, 2023

Yes. Not regression. But I also have some news about the "ads" - we have found with @cgadam that there are still some problems after vendoring in, and we iterate together on a fix and it might mean either a quickl rc2 (if we do it before the relese end) or 8.12.1 release very quickly.

@eladkal
Copy link
Contributor Author

eladkal commented Apr 4, 2023

Im in favor of 8.12.1 when we are ready with it.

@potiuk
Copy link
Member

potiuk commented Apr 4, 2023

Sure. No problem with that (and I agree) . BTW. we are VERY close I think :).

@vandonr-amz
Copy link
Contributor

good for the appflow changes for me

@o-nikolas
Copy link
Contributor

The enum changes are low impact and the ECS system test has been passing with the new code. Looks all clear to me 👍

@hussein-awala
Copy link
Member

I tested #29772 with S3TaskHandler and it works as expected.

Since it need an Airflow version >= 2.6.0, I had to create a subclass from S3TaskHandler with delete_local_copy=True and use it for task logs.

@syedahsn
Copy link
Contributor

syedahsn commented Apr 5, 2023

The EC2CreateInstanceOperator and EC2TerminateInstanceOperator are being used in our system tests, and have been passing.

@tnk-ysk
Copy link
Contributor

tnk-ysk commented Apr 5, 2023

Thank you @eladkal
I tested again using the GOOGLE_APPLICATION_CREDENTIALS environment.
#29937 looks good.

@pankajastro
Copy link
Member

#28850 #30132 #30091 looks good. thank you!

@eladkal
Copy link
Contributor Author

eladkal commented Apr 6, 2023

Thank you everyone.
Providers are released
I invite everyone to help improve providers for the next release, a list of open issues can be found here.

@eladkal eladkal closed this as completed Apr 6, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind:meta High-level information important to the community testing status Status of testing releases
Projects
None yet
Development

No branches or pull requests