Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Skip "Simple pod should support exec through kubectl proxy" test #51047

Merged
merged 1 commit into from
Aug 24, 2017

Conversation

apelisse
Copy link
Member

@apelisse apelisse commented Aug 21, 2017

As reported in #50466,
this test doesn't work in GKE because it uses a bearer token and the feature only works with client certs.

As the feature that is broken in GKE is new and didn't work before, it
is safe to juste ignore the test and consider the feature as "still not
working" in GKE.

What this PR does / why we need it: Fixes the broken test in https://k8s-testgrid.appspot.com/release-master-blocking#gke

Which issue this PR fixes (optional, in fixes #<issue number>(, fixes #<issue_number>, ...) format, will close that issue when PR gets merged): works-around #50466

Special notes for your reviewer:

Release note:

NONE

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Aug 21, 2017
@k8s-github-robot k8s-github-robot added size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. release-note-none Denotes a PR that doesn't merit a release note. labels Aug 21, 2017
@apelisse
Copy link
Member Author

cc @kubernetes/sig-cli-bugs @kubernetes/sig-api-machinery-bugs

@k8s-ci-robot k8s-ci-robot added sig/cli Categorizes an issue or PR as relevant to SIG CLI. kind/bug Categorizes issue or PR as related to a bug. sig/api-machinery Categorizes an issue or PR as relevant to SIG API Machinery. labels Aug 21, 2017
@apelisse
Copy link
Member Author

Some of the discussion is also in #50775

@apelisse
Copy link
Member Author

Let's make sure the test is skipped in GKE and everything goes well,

/test pull-kubernetes-e2e-gke

@apelisse
Copy link
Member Author

cc @liggitt

@mml
Copy link
Contributor

mml commented Aug 21, 2017

/unassign smarterclayton
/assign @cheftako

@apelisse
Copy link
Member Author

At least it didn't fail on that test.

/test pull-kubernetes-e2e-gke

This is disabling a feature added by @smarterclayton recently, I want to be sure he acknowledges that.

/assign smarterclayton

@ericchiang ericchiang added this to the v1.8 milestone Aug 21, 2017
@apelisse
Copy link
Member Author

/test pull-kubernetes-e2e-gke

@liggitt
Copy link
Member

liggitt commented Aug 22, 2017

As reported in #50466, this test doesn't work in GKE because the transport layer doesn't work
with dialing.

That's actually not the root cause. The root cause is that kubectl proxydoes not proxy upgrade requests in a way that adds in bearer token credentials. GKE is set up to run the e2e with a bearer token auth provider, not a client cert

@apelisse
Copy link
Member Author

apelisse commented Aug 22, 2017

@liggitt I updated the description

// TODO(kubernetes/kubernetes#50466): This test
// fails in GKE because of the Transport layer
// used.
framework.SkipIfProviderIs("gke")
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

it's not the provider that is the issue, it's the kubectl auth mechanism (bearer token auth will fail with the feature as it is implemented currently).

@apelisse
Copy link
Member Author

Right, but right now we want the test to pass.

@apelisse
Copy link
Member Author

I'll update the comment

As reported in kubernetes#50466,
this test doesn't work in GKE because the transport layer doesn't work
with dialing.

As the feature that is broken in GKE is new and didn't work before, it
is safe to juste ignore the test and consider the feature as "still not
working" in GKE.
@pwittrock
Copy link
Member

/approve

@pwittrock
Copy link
Member

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Aug 22, 2017
@pwittrock
Copy link
Member

@liggitt Good point. Lets disable this test, and reenable it once the underlying issue has been fixed.

@k8s-github-robot k8s-github-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Aug 22, 2017
@pwittrock
Copy link
Member

/approve #50466

@k8s-github-robot
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: apelisse, pwittrock

Associated issue: 50466

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these OWNERS Files:

You can indicate your approval by writing /approve in a comment
You can cancel your approval by writing /approve cancel in a comment

@pwittrock
Copy link
Member

/priority failing-test

@k8s-ci-robot k8s-ci-robot added the kind/failing-test Categorizes issue or PR as related to a consistently or frequently failing test. label Aug 22, 2017
@apelisse
Copy link
Member Author

/retest

@smarterclayton
Copy link
Contributor

Fix is in #51168 but will probably be a day or so to test.

@pwittrock
Copy link
Member

@smarterclayton SGTM. WDYT of reenabling this test in that PR.

@k8s-ci-robot
Copy link
Contributor

k8s-ci-robot commented Aug 23, 2017

@apelisse: The following test failed, say /retest to rerun them all:

Test name Commit Details Rerun command
pull-kubernetes-e2e-gke 486326f link /test pull-kubernetes-e2e-gke

Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@apelisse
Copy link
Member Author

/retest

@k8s-github-robot
Copy link

Automatic merge from submit-queue

@k8s-github-robot k8s-github-robot merged commit ea3a8a7 into kubernetes:master Aug 24, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/bug Categorizes issue or PR as related to a bug. kind/failing-test Categorizes issue or PR as related to a consistently or frequently failing test. lgtm "Looks good to me", indicates that a PR is ready to be merged. release-note-none Denotes a PR that doesn't merit a release note. sig/api-machinery Categorizes an issue or PR as relevant to SIG API Machinery. sig/cli Categorizes an issue or PR as relevant to SIG CLI. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

9 participants