You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We have patches against upstream components including Kubernetes, It would be good to adopt some of the CI signals used by k8s release teams as well. I see we do run conformance tests, but those are do not cover the range of functionality and possibilities of things that could go wrong.
Upstream release team uses the following jobs for most of the time:
Not sure if we do these any of these, but filing to start the conversation! We don't have to do all of these either, we can pick and choose / prioritize, may be do the easy ones first? :)
thanks,
Dims
The text was updated successfully, but these errors were encountered:
Love this, thanks for filing! We've been working on improving our test framework and looking to expand our coverage, so this fits nicely into that work.
We have patches against upstream components including Kubernetes, It would be good to adopt some of the CI signals used by k8s release teams as well. I see we do run conformance tests, but those are do not cover the range of functionality and possibilities of things that could go wrong.
Upstream release team uses the following jobs for most of the time:
Around the time when a branch is cut, they copy over the jobs like this:
There some some kubelet related tests that are also important (they run the tests marked with [NodeConformance]:
(this exercises the containerd/runc/kubelet trio)
Not sure if we do these any of these, but filing to start the conversation! We don't have to do all of these either, we can pick and choose / prioritize, may be do the easy ones first? :)
thanks,
Dims
The text was updated successfully, but these errors were encountered: