Skip to content

Adding a prow script to test a basic deployment. #353

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Mar 27, 2023

Conversation

ybettan
Copy link
Contributor

@ybettan ybettan commented Mar 26, 2023

This test will make sure that steps added to the e2e workflow are not
braking our deployment flow mentioned in
kernel-module-management#getting-started or by using make deploy which
are basically the same.

A good example for it is to add a validation web-hook that requires the
installation of cert-manager which should also be installed outside of
the CI environment.

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: ybettan

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. approved Indicates a PR has been approved by an approver from all required OWNERS files. labels Mar 26, 2023
@netlify
Copy link

netlify bot commented Mar 26, 2023

Deploy Preview for kubernetes-sigs-kmm ready!

Name Link
🔨 Latest commit 42ad9eb
🔍 Latest deploy log https://app.netlify.com/sites/kubernetes-sigs-kmm/deploys/6421a901c5e4b90007cf1952
😎 Deploy Preview https://deploy-preview-353--kubernetes-sigs-kmm.netlify.app/
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site settings.

@k8s-ci-robot k8s-ci-robot added the size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. label Mar 26, 2023
@codecov-commenter
Copy link

Codecov Report

Patch and project coverage have no change.

Comparison is base (a50f1a8) 82.92% compared to head (8e21976) 82.92%.

Additional details and impacted files
@@           Coverage Diff           @@
##             main     #353   +/-   ##
=======================================
  Coverage   82.92%   82.92%           
=======================================
  Files          27       27           
  Lines        2811     2811           
=======================================
  Hits         2331     2331           
  Misses        390      390           
  Partials       90       90           

Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here.

☔ View full report in Codecov by Sentry.
📢 Do you have feedback about the report comment? Let us know in this issue.

This test will make sure that steps added to the `e2e` workflow are not
braking our deployment flow mentioned in
kernel-module-management#getting-started or by using `make deploy` which
are basically the same.

A good example for it is to add a validation web-hook that requires the
installation of `cert-manager` which should also be installed outside of
the CI environment.

Signed-off-by: Yoni Bettan <[email protected]>
@yevgeny-shnaidman
Copy link
Contributor

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Mar 27, 2023
@k8s-ci-robot k8s-ci-robot merged commit 91e4bca into kubernetes-sigs:main Mar 27, 2023
@ybettan ybettan deleted the test-deploy branch March 27, 2023 16:03
ybettan referenced this pull request in ybettan/kernel-module-management Mar 28, 2023
qbarrand pushed a commit to qbarrand/kernel-module-management that referenced this pull request Jun 2, 2023
Improve push/pull secret handling in signing

Re-work secret handling for pulling and pushing images
Add support for dockerconfigjson and dockercfg style secrets
Add support for multiple keys in a single secret (useful for pulling and pushing to different registries)

This also sets the stage for allowing service account secrets

We do this by mounting secrets in their own directories then reading all the files (keys) in that dir
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants