Skip to content

Commit a39fc2d

Browse files
authored
Disable test for unified image, since the unified image doesn't have a check for this (#2323)
1 parent ae527ce commit a39fc2d

File tree

3 files changed

+12
-4
lines changed

3 files changed

+12
-4
lines changed

e2e/Makefile

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -192,12 +192,12 @@ endif
192192
--dump-operator-state=$(DUMP_OPERATOR_STATE) \
193193
--cluster-name=$(CLUSTER_NAME) \
194194
--storage-engine=$(STORAGE_ENGINE) \
195-
--fdb-version-tag-mapping=$(FDB_VERSION_TAG_MAPPING) \
195+
--fdb-version-tag-mapping="$(FDB_VERSION_TAG_MAPPING)" \
196196
--unified-fdb-image=$(UNIFIED_FDB_IMAGE) \
197197
--feature-unified-image=$(FEATURE_UNIFIED_IMAGE) \
198198
--feature-server-side-apply=$(FEATURE_SERVER_SIDE_APPLY) \
199199
--feature-synchronization-mode=$(FEATURE_SYNCHRONIZATION_MODE) \
200200
--node-selector="$(NODE_SELECTOR)" \
201201
--default-unavailable-threshold=$(DEFAULT_UNAVAILABLE_THRESHOLD) \
202-
--seaweedfs-image=$(SEAWEEDFS_IMAGE) $(FEATURE_LOCALITIES_FLAG) $(FEATURE_DNS) \
202+
--seaweedfs-image=$(SEAWEEDFS_IMAGE) $(FEATURE_LOCALITIES_FLAG) $(FEATURE_DNS_FLAG) \
203203
| grep -v 'constructing many client instances from the same exec auth config can cause performance problems during cert rotation' &> $(BASE_DIR)/../logs/$<.log

e2e/fixtures/factory.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -887,7 +887,7 @@ func (fdbCluster *FdbCluster) UpdateNode(node *corev1.Node) {
887887

888888
// GetNode return Node with the given name
889889
func (fdbCluster *FdbCluster) GetNode(name string) *corev1.Node {
890-
// Retry if for some reasons an error is returned
890+
// Retry if for some reason an error is returned
891891
node := &corev1.Node{}
892892
gomega.Eventually(func() error {
893893
return fdbCluster.getClient().

e2e/test_operator_upgrades_with_chaos/operator_upgrades_with_chaos_test.go

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -375,6 +375,14 @@ var _ = Describe("Operator Upgrades with chaos-mesh", Label("e2e", "pr"), func()
375375
Skip("this test only affects version incompatible upgrades")
376376
}
377377

378+
// Right now the operator doesn't check the binaries during a version incompatible upgrade. When the
379+
// sidecar was updated and is running, the operator assumes that the process is ready to be restarted.
380+
// In the future we can add some additional signals, so that the operator is able to check if the binary
381+
// is present. This requires some changes in the fdb-kubernetes-monitor.
382+
if factory.UseUnifiedImage() {
383+
Skip("in the unified image setup the operator doesn't validate the binary")
384+
}
385+
378386
clusterSetup(beforeVersion)
379387

380388
// Update the cluster version.
@@ -388,7 +396,7 @@ var _ = Describe("Operator Upgrades with chaos-mesh", Label("e2e", "pr"), func()
388396

389397
// We have to update the sidecar before the operator is doing it. If we don't do this here the operator
390398
// will update the sidecar and then the sidecar will copy the binaries at start-up. So we prepare the faulty Pod to already
391-
// be using the new sidecar image and then we delete he new fdbserver binary.
399+
// be using the new sidecar image and then we delete the new fdbserver binary.
392400
sidecarImage := fdbCluster.GetSidecarImageForVersion(targetVersion)
393401
fdbCluster.UpdateContainerImage(
394402
&faultyPod,

0 commit comments

Comments
 (0)