-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
KEP-4639: update to most recent implementation state #4897
base: master
Are you sure you want to change the base?
Conversation
haircommander
commented
Oct 2, 2024
- One-line PR description: bump VolumeSource: OCI Artifact and/or Image #4639 to beta
- Issue link: VolumeSource: OCI Artifact and/or Image #4639
- Other comments: @saschagrunert is on leave this week and is the primary author of this KEP, I am opening this in his stead to get it on PRR radar, but it may change once he returns.
024f2c6
to
4e7aec4
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please remove references to OCI Artifacts from the KEP since those are explicitly not supported.
I would defer to @saschagrunert on that one. From my perspective, since the kubelet is specifying a registry path, there's no reason from kube's perspective we'd limit it to a just images. We currently don't support artifacts because neither containerd nor CRI-O support them with this. That could be subject to change (and as I understand it there are conversations happening to change it), but from the kubelet's perspective it's just a string that the runtimes interpret |
4e7aec4
to
f565c3a
Compare
There are no implementations that support Artifacts, and discussions for how they could be supported were pushed off so there's no way for them to be implemented. OCI Artifacts are implicitly listed as a non-goal in the KEP. But because of the title, we've been seeing people complaining to OCI about why our spec is wrong. |
@@ -779,6 +783,7 @@ https://storage.googleapis.com/k8s-triage/index.html | |||
--> | |||
|
|||
- <test>: <link to test coverage> | |||
SIG node does not typically write e2e tests |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
SIG node does not typically write e2e tests | |
SIG node does not typically write integration tests |
TBH I would probably expand on this. We don't write integration tests because we kubelet is covered by the e2e_node suite. We as a sig would love to write more integration tests but we are limiting in what we can do.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
SIG node does not typically write e2e tests | |
Integration tests for the kubelet are not existing yet and will be covered by extending the available e2e test suites. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sascha's look more correct, this is not about what one SIG does, is just because this feature does not require them or are covered with e2e ... if SIG node has to write any API object related feature must probably it must require integration tests.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've seen some KEPs stating that "integration tests don't add additional test coverage and thus are not used". I think that this can be true: unit tests can provide detailed regression testing by covering all lines and edge cases, while E2E tests exercise the integration (sic!) into a real cluster.
The actual integration tests then fall somewhere in the middle and may be useful to exercise scenarios that are too expensive to test with a full cluster, but I wouldn't say that they are required.
Also, e2e_node
is similar to what test/integration
is for other code: using a fake apiserver to walk through scenarios without needing a full cluster.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We as a sig would love to write more integration tests but we are limiting in what we can do.
Careful here: if lack of resources is the reason for not writing integration tests when they would be desirable for a feature, then development of that feature needs to slow down. Please don't skip testing to deliver features faster.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you for opening that PR, if we can agree on the scope (beta = subPath support) then I'm happy to move forward with that.
cc @carlory
@@ -779,6 +783,7 @@ https://storage.googleapis.com/k8s-triage/index.html | |||
--> | |||
|
|||
- <test>: <link to test coverage> | |||
SIG node does not typically write e2e tests |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
SIG node does not typically write e2e tests | |
Integration tests for the kubelet are not existing yet and will be covered by extending the available e2e test suites. |
6da15eb
to
6eef869
Compare
/unhold |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
/assign @mrunalp @dchen1107 We want to get the doc updates in but there was no exception so this will stay in alpha. |
bbaed9b
to
b5a59d5
Compare
b5a59d5
to
1bb828e
Compare
@mrunalp thank you for the review, I added your suggestions and squashed the commits together. |
Signed-off-by: Peter Hunt <[email protected]> Signed-off-by: Sascha Grunert <[email protected]>
1bb828e
to
54e8884
Compare
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: deads2k, haircommander, mikebrow The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/lgtm |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/LGTM
also good with the review updates