Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

API Coverage: Missing coverage for EnvFrom #3481

Closed
dgerd opened this issue Mar 21, 2019 · 4 comments · Fixed by #3922
Closed

API Coverage: Missing coverage for EnvFrom #3481

dgerd opened this issue Mar 21, 2019 · 4 comments · Fixed by #3922
Assignees
Labels
kind/feature Well-understood/specified features, ready for coding. kind/spec Discussion of how a feature should be exposed to customers.
Milestone

Comments

@dgerd
Copy link

dgerd commented Mar 21, 2019

In what area(s)?

/area API

/area autoscale
/area build
/area monitoring
/area networking
/area test-and-release

Describe the feature

This issue is to add end to end test coverage the exercises the EnvFrom path and move the existing EnvPropagation conformance test to e2e tests as it requires the Kubernetes client to run. See comments below for more details.

@dgerd dgerd added kind/feature Well-understood/specified features, ready for coding. kind/good-first-issue kind/spec Discussion of how a feature should be exposed to customers. labels Mar 21, 2019
@dgerd dgerd changed the title API Conformance Coverage: Missing coverage for EnvFrom API Conformance Coverage: Missing coverage for EnvFrom/EnvVarSource Mar 21, 2019
@tzununbekov
Copy link
Member

wanted to work on this one, but isn't this covered in envvars and envpropagation tests?

@dgerd
Copy link
Author

dgerd commented Mar 29, 2019

I created this issue based on output from our API Coverage Webhook (https://prow.knative.dev/?job=ci-knative-serving-webhook-apicoverage)

Looking at this closer now,

  • There are 2 fields missing coverage from EnvVarSource, but these should have been blocked by the webhook when ConfigMaps and Secrets were enabled as they relate to exposing Pod concepts rather than ConfigMaps and Secrets. Disallowing the fieldRef and resourceFieldRef fields will be fixed as part of Copy Kubernetes objects in webhook #3424.

  • EnvPropagation is using the KubeClient as part of the Conformance test which needs to be fixed. This should also ideally be moved back into e2e tests rather than conformance.

I will update the title and description above, but what I think needs to be done here is:

  1. Move EnvPropagation to e2e test suite instead of conformance
  2. Create a new test that uses envFrom to populate environment variables in a container from a ConfigMap/Secret. (Note: This is a low priority as there is discussion on removing this functionality in the next iteration of our API due to inconsistent update behavior.)

@dgerd dgerd changed the title API Conformance Coverage: Missing coverage for EnvFrom/EnvVarSource API Conformance Coverage: Missing coverage for EnvFrom Mar 29, 2019
@dgerd dgerd changed the title API Conformance Coverage: Missing coverage for EnvFrom API Coverage: Missing coverage for EnvFrom Mar 29, 2019
mattmoor added a commit to mattmoor/serving that referenced this issue Apr 27, 2019
This refactors the current test coverage for projecting CM/S into
environment variables to enable us to more easily add a variant
covering the `envFrom` style of projection.

Fixes: knative#3481
@mattmoor mattmoor self-assigned this May 1, 2019
knative-prow-robot pushed a commit that referenced this issue May 2, 2019
This refactors the current test coverage for projecting CM/S into
environment variables to enable us to more easily add a variant
covering the `envFrom` style of projection.

Fixes: #3481
@eallred-google eallred-google reopened this May 3, 2019
@mattmoor mattmoor modified the milestones: Serving 0.6, Serving 0.7 May 3, 2019
@mattmoor
Copy link
Member

mattmoor commented May 3, 2019

Moving what's left here to 0.7.

I believe the compromise @dgerd and I arrived at was to make these tests set things up outside of the test itself. I'd recommend adding a secret / configmap to test/config, which gets ko apply'd.

@dgerd
Copy link
Author

dgerd commented May 3, 2019

I actually created two new issues here:

#3985
#3984

Lets go ahead and close this one and use the other two. I will add them to 0.7.

@dgerd dgerd closed this as completed May 3, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/feature Well-understood/specified features, ready for coding. kind/spec Discussion of how a feature should be exposed to customers.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants