k8s.io/test-infra@v0.0.0-20240520184403-27c6b4c223d8/config/jobs/kubernetes-sigs/cluster-api-provider-vsphere/cluster-api-provider-vsphere-main-periodics.yaml (about) 1 # Code generated by cluster-api's prowjob-gen. DO NOT EDIT. 2 periodics: 3 - name: periodic-cluster-api-provider-vsphere-test-main 4 cluster: eks-prow-build-cluster 5 interval: 1h 6 decorate: true 7 rerun_auth_config: 8 github_team_slugs: 9 - org: kubernetes-sigs 10 slug: cluster-api-provider-vsphere-maintainers 11 extra_refs: 12 - org: kubernetes-sigs 13 repo: cluster-api-provider-vsphere 14 base_ref: main 15 path_alias: sigs.k8s.io/cluster-api-provider-vsphere 16 spec: 17 containers: 18 - image: gcr.io/k8s-staging-test-infra/kubekins-e2e:v20240515-17c6d50e24-1.29 19 resources: 20 limits: 21 cpu: 2 22 memory: 4Gi 23 requests: 24 cpu: 2 25 memory: 4Gi 26 command: 27 - runner.sh 28 args: 29 - make 30 - test-junit 31 annotations: 32 testgrid-dashboards: vmware-cluster-api-provider-vsphere, sig-cluster-lifecycle-cluster-api-provider-vsphere 33 testgrid-tab-name: periodic-test-main 34 testgrid-alert-email: sig-cluster-lifecycle-cluster-api-vsphere-alerts@kubernetes.io 35 testgrid-num-failures-to-alert: "4" 36 description: Runs unit tests 37 38 - name: periodic-cluster-api-provider-vsphere-e2e-govmomi-main 39 labels: 40 preset-dind-enabled: "true" 41 preset-cluster-api-provider-vsphere-e2e-config: "true" 42 preset-kind-volume-mounts: "true" 43 cron: '0 0 * * *' 44 decorate: true 45 decoration_config: 46 timeout: 180m 47 rerun_auth_config: 48 github_team_slugs: 49 - org: kubernetes-sigs 50 slug: cluster-api-provider-vsphere-maintainers 51 extra_refs: 52 - org: kubernetes-sigs 53 repo: cluster-api-provider-vsphere 54 base_ref: main 55 path_alias: sigs.k8s.io/cluster-api-provider-vsphere 56 spec: 57 containers: 58 - image: gcr.io/k8s-staging-test-infra/kubekins-e2e:v20240515-17c6d50e24-1.29 59 command: 60 - runner.sh 61 args: 62 - ./hack/e2e.sh 63 env: 64 - name: GINKGO_SKIP 65 value: "\\[Conformance\\] \\[specialized-infra\\]" 66 # we need privileged mode in order to do docker in docker 67 securityContext: 68 privileged: true 69 capabilities: 70 add: ["NET_ADMIN"] 71 resources: 72 requests: 73 cpu: "4000m" 74 memory: "6Gi" 75 annotations: 76 testgrid-dashboards: vmware-cluster-api-provider-vsphere, sig-cluster-lifecycle-cluster-api-provider-vsphere 77 testgrid-tab-name: periodic-e2e-govmomi-main 78 testgrid-alert-email: sig-cluster-lifecycle-cluster-api-vsphere-alerts@kubernetes.io 79 testgrid-num-failures-to-alert: "4" 80 description: Runs all e2e tests 81 82 - name: periodic-cluster-api-provider-vsphere-e2e-vcsim-govmomi-main 83 cluster: eks-prow-build-cluster 84 labels: 85 preset-dind-enabled: "true" 86 preset-kind-volume-mounts: "true" 87 cron: '0 0 * * *' 88 decorate: true 89 decoration_config: 90 timeout: 180m 91 rerun_auth_config: 92 github_team_slugs: 93 - org: kubernetes-sigs 94 slug: cluster-api-provider-vsphere-maintainers 95 extra_refs: 96 - org: kubernetes-sigs 97 repo: cluster-api-provider-vsphere 98 base_ref: main 99 path_alias: sigs.k8s.io/cluster-api-provider-vsphere 100 spec: 101 containers: 102 - image: gcr.io/k8s-staging-test-infra/kubekins-e2e:v20240515-17c6d50e24-1.29 103 command: 104 - runner.sh 105 args: 106 - ./hack/e2e.sh 107 env: 108 - name: GINKGO_FOCUS 109 value: "\\[vcsim\\]" 110 # we need privileged mode in order to do docker in docker 111 securityContext: 112 privileged: true 113 capabilities: 114 add: ["NET_ADMIN"] 115 resources: 116 requests: 117 cpu: "4000m" 118 memory: "3Gi" 119 limits: 120 cpu: "4000m" 121 memory: "3Gi" 122 annotations: 123 testgrid-dashboards: vmware-cluster-api-provider-vsphere, sig-cluster-lifecycle-cluster-api-provider-vsphere 124 testgrid-tab-name: periodic-e2e-vcsim-govmomi-main 125 testgrid-alert-email: sig-cluster-lifecycle-cluster-api-vsphere-alerts@kubernetes.io 126 testgrid-num-failures-to-alert: "4" 127 description: Runs all e2e tests 128 129 - name: periodic-cluster-api-provider-vsphere-e2e-govmomi-conformance-main 130 labels: 131 preset-dind-enabled: "true" 132 preset-cluster-api-provider-vsphere-e2e-config: "true" 133 preset-kind-volume-mounts: "true" 134 cron: '0 0 * * *' 135 decorate: true 136 rerun_auth_config: 137 github_team_slugs: 138 - org: kubernetes-sigs 139 slug: cluster-api-provider-vsphere-maintainers 140 extra_refs: 141 - org: kubernetes-sigs 142 repo: cluster-api-provider-vsphere 143 base_ref: main 144 path_alias: sigs.k8s.io/cluster-api-provider-vsphere 145 spec: 146 containers: 147 - image: gcr.io/k8s-staging-test-infra/kubekins-e2e:v20240515-17c6d50e24-1.29 148 command: 149 - runner.sh 150 args: 151 - ./hack/e2e.sh 152 env: 153 - name: GINKGO_FOCUS 154 value: "\\[Conformance\\] \\[K8s-Install\\]" 155 # we need privileged mode in order to do docker in docker 156 securityContext: 157 privileged: true 158 capabilities: 159 add: ["NET_ADMIN"] 160 resources: 161 requests: 162 cpu: "4000m" 163 memory: "6Gi" 164 annotations: 165 testgrid-dashboards: vmware-cluster-api-provider-vsphere, sig-cluster-lifecycle-cluster-api-provider-vsphere 166 testgrid-tab-name: periodic-e2e-govmomi-conformance-main 167 testgrid-alert-email: sig-cluster-lifecycle-cluster-api-vsphere-alerts@kubernetes.io 168 testgrid-num-failures-to-alert: "4" 169 description: Runs conformance tests for CAPV 170 171 - name: periodic-cluster-api-provider-vsphere-e2e-govmomi-conformance-ci-latest-main 172 labels: 173 preset-dind-enabled: "true" 174 preset-cluster-api-provider-vsphere-e2e-config: "true" 175 preset-kind-volume-mounts: "true" 176 cron: '0 0 * * *' 177 decorate: true 178 rerun_auth_config: 179 github_team_slugs: 180 - org: kubernetes-sigs 181 slug: cluster-api-provider-vsphere-maintainers 182 extra_refs: 183 - org: kubernetes-sigs 184 repo: cluster-api-provider-vsphere 185 base_ref: main 186 path_alias: sigs.k8s.io/cluster-api-provider-vsphere 187 spec: 188 containers: 189 - image: gcr.io/k8s-staging-test-infra/kubekins-e2e:v20240515-17c6d50e24-1.29 190 command: 191 - runner.sh 192 args: 193 - ./hack/e2e.sh 194 env: 195 - name: GINKGO_FOCUS 196 value: "\\[Conformance\\] \\[K8s-Install-ci-latest\\]" 197 # we need privileged mode in order to do docker in docker 198 securityContext: 199 privileged: true 200 capabilities: 201 add: ["NET_ADMIN"] 202 resources: 203 requests: 204 cpu: "4000m" 205 memory: "6Gi" 206 annotations: 207 testgrid-dashboards: vmware-cluster-api-provider-vsphere, sig-cluster-lifecycle-cluster-api-provider-vsphere 208 testgrid-tab-name: periodic-e2e-govmomi-conformance-ci-latest-main 209 testgrid-alert-email: sig-cluster-lifecycle-cluster-api-vsphere-alerts@kubernetes.io 210 testgrid-num-failures-to-alert: "4" 211 description: Runs conformance tests with K8S ci latest for CAPV 212 213 - name: periodic-cluster-api-provider-vsphere-e2e-supervisor-main 214 labels: 215 preset-dind-enabled: "true" 216 preset-cluster-api-provider-vsphere-e2e-config: "true" 217 preset-kind-volume-mounts: "true" 218 cron: '0 3 * * *' 219 decorate: true 220 decoration_config: 221 timeout: 180m 222 rerun_auth_config: 223 github_team_slugs: 224 - org: kubernetes-sigs 225 slug: cluster-api-provider-vsphere-maintainers 226 extra_refs: 227 - org: kubernetes-sigs 228 repo: cluster-api-provider-vsphere 229 base_ref: main 230 path_alias: sigs.k8s.io/cluster-api-provider-vsphere 231 spec: 232 containers: 233 - image: gcr.io/k8s-staging-test-infra/kubekins-e2e:v20240515-17c6d50e24-1.29 234 command: 235 - runner.sh 236 args: 237 - ./hack/e2e.sh 238 env: 239 - name: GINKGO_FOCUS 240 value: "\\[supervisor\\]" 241 - name: GINKGO_SKIP 242 value: "\\[Conformance\\] \\[specialized-infra\\]" 243 # we need privileged mode in order to do docker in docker 244 securityContext: 245 privileged: true 246 capabilities: 247 add: ["NET_ADMIN"] 248 resources: 249 requests: 250 cpu: "4000m" 251 memory: "6Gi" 252 annotations: 253 testgrid-dashboards: vmware-cluster-api-provider-vsphere, sig-cluster-lifecycle-cluster-api-provider-vsphere 254 testgrid-tab-name: periodic-e2e-supervisor-main 255 testgrid-alert-email: sig-cluster-lifecycle-cluster-api-vsphere-alerts@kubernetes.io 256 testgrid-num-failures-to-alert: "4" 257 description: Runs all e2e tests 258 259 - name: periodic-cluster-api-provider-vsphere-e2e-vcsim-supervisor-main 260 cluster: eks-prow-build-cluster 261 labels: 262 preset-dind-enabled: "true" 263 preset-kind-volume-mounts: "true" 264 cron: '0 3 * * *' 265 decorate: true 266 decoration_config: 267 timeout: 180m 268 rerun_auth_config: 269 github_team_slugs: 270 - org: kubernetes-sigs 271 slug: cluster-api-provider-vsphere-maintainers 272 extra_refs: 273 - org: kubernetes-sigs 274 repo: cluster-api-provider-vsphere 275 base_ref: main 276 path_alias: sigs.k8s.io/cluster-api-provider-vsphere 277 spec: 278 containers: 279 - image: gcr.io/k8s-staging-test-infra/kubekins-e2e:v20240515-17c6d50e24-1.29 280 command: 281 - runner.sh 282 args: 283 - ./hack/e2e.sh 284 env: 285 - name: GINKGO_FOCUS 286 value: "\\[vcsim\\] \\[supervisor\\]" 287 # we need privileged mode in order to do docker in docker 288 securityContext: 289 privileged: true 290 capabilities: 291 add: ["NET_ADMIN"] 292 resources: 293 requests: 294 cpu: "4000m" 295 memory: "3Gi" 296 limits: 297 cpu: "4000m" 298 memory: "3Gi" 299 annotations: 300 testgrid-dashboards: vmware-cluster-api-provider-vsphere, sig-cluster-lifecycle-cluster-api-provider-vsphere 301 testgrid-tab-name: periodic-e2e-vcsim-supervisor-main 302 testgrid-alert-email: sig-cluster-lifecycle-cluster-api-vsphere-alerts@kubernetes.io 303 testgrid-num-failures-to-alert: "4" 304 description: Runs all e2e tests 305 306 - name: periodic-cluster-api-provider-vsphere-e2e-supervisor-conformance-main 307 labels: 308 preset-dind-enabled: "true" 309 preset-cluster-api-provider-vsphere-e2e-config: "true" 310 preset-kind-volume-mounts: "true" 311 cron: '0 3 * * *' 312 decorate: true 313 rerun_auth_config: 314 github_team_slugs: 315 - org: kubernetes-sigs 316 slug: cluster-api-provider-vsphere-maintainers 317 extra_refs: 318 - org: kubernetes-sigs 319 repo: cluster-api-provider-vsphere 320 base_ref: main 321 path_alias: sigs.k8s.io/cluster-api-provider-vsphere 322 spec: 323 containers: 324 - image: gcr.io/k8s-staging-test-infra/kubekins-e2e:v20240515-17c6d50e24-1.29 325 command: 326 - runner.sh 327 args: 328 - ./hack/e2e.sh 329 env: 330 - name: GINKGO_FOCUS 331 value: "\\[supervisor\\] \\[Conformance\\] \\[K8s-Install\\]" 332 # we need privileged mode in order to do docker in docker 333 securityContext: 334 privileged: true 335 capabilities: 336 add: ["NET_ADMIN"] 337 resources: 338 requests: 339 cpu: "4000m" 340 memory: "6Gi" 341 annotations: 342 testgrid-dashboards: vmware-cluster-api-provider-vsphere, sig-cluster-lifecycle-cluster-api-provider-vsphere 343 testgrid-tab-name: periodic-e2e-supervisor-conformance-main 344 testgrid-alert-email: sig-cluster-lifecycle-cluster-api-vsphere-alerts@kubernetes.io 345 testgrid-num-failures-to-alert: "4" 346 description: Runs conformance tests for CAPV 347 348 - name: periodic-cluster-api-provider-vsphere-e2e-supervisor-conformance-ci-latest-main 349 labels: 350 preset-dind-enabled: "true" 351 preset-cluster-api-provider-vsphere-e2e-config: "true" 352 preset-kind-volume-mounts: "true" 353 cron: '0 3 * * *' 354 decorate: true 355 rerun_auth_config: 356 github_team_slugs: 357 - org: kubernetes-sigs 358 slug: cluster-api-provider-vsphere-maintainers 359 extra_refs: 360 - org: kubernetes-sigs 361 repo: cluster-api-provider-vsphere 362 base_ref: main 363 path_alias: sigs.k8s.io/cluster-api-provider-vsphere 364 spec: 365 containers: 366 - image: gcr.io/k8s-staging-test-infra/kubekins-e2e:v20240515-17c6d50e24-1.29 367 command: 368 - runner.sh 369 args: 370 - ./hack/e2e.sh 371 env: 372 - name: GINKGO_FOCUS 373 value: "\\[supervisor\\] \\[Conformance\\] \\[K8s-Install-ci-latest\\]" 374 # we need privileged mode in order to do docker in docker 375 securityContext: 376 privileged: true 377 capabilities: 378 add: ["NET_ADMIN"] 379 resources: 380 requests: 381 cpu: "4000m" 382 memory: "6Gi" 383 annotations: 384 testgrid-dashboards: vmware-cluster-api-provider-vsphere, sig-cluster-lifecycle-cluster-api-provider-vsphere 385 testgrid-tab-name: periodic-e2e-supervisor-conformance-ci-latest-main 386 testgrid-alert-email: sig-cluster-lifecycle-cluster-api-vsphere-alerts@kubernetes.io 387 testgrid-num-failures-to-alert: "4" 388 description: Runs conformance tests with K8S ci latest for CAPV 389 390 - name: periodic-cluster-api-provider-vsphere-coverage-main 391 cluster: eks-prow-build-cluster 392 interval: 24h 393 decorate: true 394 rerun_auth_config: 395 github_team_slugs: 396 - org: kubernetes-sigs 397 slug: cluster-api-provider-vsphere-maintainers 398 extra_refs: 399 - org: kubernetes-sigs 400 repo: cluster-api-provider-vsphere 401 base_ref: main 402 path_alias: sigs.k8s.io/cluster-api-provider-vsphere 403 - org: kubernetes 404 repo: test-infra 405 base_ref: master 406 path_alias: k8s.io/test-infra 407 spec: 408 containers: 409 - image: gcr.io/k8s-staging-test-infra/kubekins-e2e:v20240515-17c6d50e24-1.29 410 command: 411 - runner.sh 412 - bash 413 args: 414 - -c 415 - | 416 result=0 417 ./hack/ci-test-coverage.sh || result=$? 418 cp coverage.* ${ARTIFACTS} 419 cd ../../k8s.io/test-infra/gopherage 420 GO111MODULE=on go build . 421 ./gopherage filter --exclude-path="zz_generated,generated\.go" "${ARTIFACTS}/coverage.out" > "${ARTIFACTS}/filtered.cov" || result=$? 422 ./gopherage html "${ARTIFACTS}/filtered.cov" > "${ARTIFACTS}/coverage.html" || result=$? 423 ./gopherage junit --threshold 0 "${ARTIFACTS}/filtered.cov" > "${ARTIFACTS}/junit_coverage.xml" || result=$? 424 exit $result 425 securityContext: 426 privileged: true 427 capabilities: 428 add: ["NET_ADMIN"] 429 resources: 430 requests: 431 cpu: "4000m" 432 memory: "4Gi" 433 limits: 434 cpu: "4000m" 435 memory: "4Gi" 436 annotations: 437 testgrid-dashboards: vmware-cluster-api-provider-vsphere, sig-cluster-lifecycle-cluster-api-provider-vsphere 438 testgrid-tab-name: periodic-test-coverage-main 439 testgrid-alert-email: sig-cluster-lifecycle-cluster-api-vsphere-alerts@kubernetes.io 440 testgrid-num-failures-to-alert: "4" 441 description: Shows test coverage for CAPV 442 443 - name: periodic-cluster-api-provider-vsphere-janitor 444 labels: 445 preset-dind-enabled: "true" 446 preset-cluster-api-provider-vsphere-e2e-config: "true" 447 interval: 12h 448 decorate: true 449 rerun_auth_config: 450 github_team_slugs: 451 - org: kubernetes-sigs 452 slug: cluster-api-provider-vsphere-maintainers 453 extra_refs: 454 - org: kubernetes-sigs 455 repo: cluster-api-provider-vsphere 456 base_ref: main 457 path_alias: sigs.k8s.io/cluster-api-provider-vsphere 458 spec: 459 containers: 460 - image: gcr.io/k8s-staging-test-infra/kubekins-e2e:v20240515-17c6d50e24-1.29 461 command: 462 - runner.sh 463 args: 464 - ./hack/clean-ci.sh 465 # we need privileged mode in order to do docker in docker 466 securityContext: 467 privileged: true 468 capabilities: 469 add: ["NET_ADMIN"] 470 resources: 471 requests: 472 cpu: "2000m" 473 memory: "4Gi" 474 annotations: 475 testgrid-dashboards: vmware-cluster-api-provider-vsphere, sig-cluster-lifecycle-cluster-api-provider-vsphere 476 testgrid-tab-name: periodic-e2e-janitor 477 testgrid-alert-email: sig-cluster-lifecycle-cluster-api-vsphere-alerts@kubernetes.io 478 testgrid-num-failures-to-alert: "4" 479 description: Runs the janitor to cleanup orphaned objects in CI