-
Notifications
You must be signed in to change notification settings - Fork 34
Adding a prow
script to test a basic deployment.
#353
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ybettan The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
✅ Deploy Preview for kubernetes-sigs-kmm ready!
To edit notification comments on pull requests, go to your Netlify site settings. |
Codecov ReportPatch and project coverage have no change.
Additional details and impacted files@@ Coverage Diff @@
## main #353 +/- ##
=======================================
Coverage 82.92% 82.92%
=======================================
Files 27 27
Lines 2811 2811
=======================================
Hits 2331 2331
Misses 390 390
Partials 90 90 Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here. ☔ View full report in Codecov by Sentry. |
This test will make sure that steps added to the `e2e` workflow are not braking our deployment flow mentioned in kernel-module-management#getting-started or by using `make deploy` which are basically the same. A good example for it is to add a validation web-hook that requires the installation of `cert-manager` which should also be installed outside of the CI environment. Signed-off-by: Yoni Bettan <[email protected]>
/lgtm |
This reverts commit 91e4bca.
Improve push/pull secret handling in signing Re-work secret handling for pulling and pushing images Add support for dockerconfigjson and dockercfg style secrets Add support for multiple keys in a single secret (useful for pulling and pushing to different registries) This also sets the stage for allowing service account secrets We do this by mounting secrets in their own directories then reading all the files (keys) in that dir
This test will make sure that steps added to the
e2e
workflow are notbraking our deployment flow mentioned in
kernel-module-management#getting-started or by using
make deploy
whichare basically the same.
A good example for it is to add a validation web-hook that requires the
installation of
cert-manager
which should also be installed outside ofthe CI environment.