Skip to content

Commit 36d9111

Browse files
committed
replace … with ....
1 parent bf12804 commit 36d9111

File tree

11 files changed

+47
-47
lines changed

11 files changed

+47
-47
lines changed

hack/ci/build-image.sh

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ set -euo pipefail
1818

1919
# make git available
2020
if ! [ -x "$(command -v git)" ]; then
21-
echo "Installing git"
21+
echo "Installing git..."
2222
dnf install -y git
2323
fi
2424

@@ -27,7 +27,7 @@ if [ -n "${DOCKER_REGISTRY_MIRROR_ADDR:-}" ]; then
2727
# remove "http://" or "https://" prefix
2828
mirror="$(echo "$DOCKER_REGISTRY_MIRROR_ADDR" | awk -F// '{print $NF}')"
2929

30-
echo "Configuring registry mirror for docker.io"
30+
echo "Configuring registry mirror for docker.io..."
3131

3232
cat <<EOF > /etc/containers/registries.conf.d/mirror.conf
3333
[[registry]]
@@ -65,13 +65,13 @@ if [ -z "$version" ]; then
6565
fi
6666

6767
image="$repository:$version"
68-
echo "Building container image $image"
68+
echo "Building container image $image..."
6969

7070
# build image for all architectures
7171
for arch in $architectures; do
7272
fullTag="$image-$arch"
7373

74-
echo "Building $version-$arch"
74+
echo "Building $version-$arch..."
7575
buildah build-using-dockerfile \
7676
--file Dockerfile \
7777
--tag "$fullTag" \
@@ -94,7 +94,7 @@ function create_manifest() {
9494
buildah manifest create "$name"
9595
}
9696

97-
echo "Creating manifest $image"
97+
echo "Creating manifest $image..."
9898
create_manifest "$image"
9999
for arch in $architectures; do
100100
buildah manifest add "$image" "$image-$arch"
@@ -107,7 +107,7 @@ done
107107
if [ -n "$branchName" ]; then
108108
branchImage="$repository:$branchName"
109109

110-
echo "Creating manifest $branchImage"
110+
echo "Creating manifest $branchImage..."
111111
create_manifest "$branchImage"
112112
for arch in $architectures; do
113113
buildah manifest add "$branchImage" "$image-$arch"
@@ -116,10 +116,10 @@ fi
116116

117117
# push manifest, except in presubmits
118118
if [ -z "${DRY_RUN:-}" ]; then
119-
echo "Logging into GHCR"
119+
echo "Logging into GHCR..."
120120
buildah login --username "$KCP_GHCR_USERNAME" --password "$KCP_GHCR_PASSWORD" ghcr.io
121121

122-
echo "Pushing manifest and images"
122+
echo "Pushing manifest and images..."
123123
buildah manifest push --all "$image" "docker://$image"
124124

125125
if [ -n "${branchImage:-}" ]; then

hack/ci/run-e2e-tests.sh

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ set -euo pipefail
2121
if [ -n "${KCP_TAG:-}" ]; then
2222
# resolve what looks like branch names
2323
if [[ "$KCP_TAG" == main ]] || [[ "$KCP_TAG" =~ ^release- ]]; then
24-
echo "Resolving kcp $KCP_TAG "
24+
echo "Resolving kcp $KCP_TAG ..."
2525

2626
tmpdir="$(mktemp -d)"
2727
here="$(pwd)"
@@ -46,7 +46,7 @@ fi
4646
# build the image(s)
4747
export IMAGE_TAG=local
4848

49-
echo "Building container images"
49+
echo "Building container images..."
5050
ARCHITECTURES=arm64 DRY_RUN=yes ./hack/ci/build-image.sh
5151

5252
# start docker so we can run kind
@@ -55,11 +55,11 @@ start-docker.sh
5555
# create a local kind cluster
5656
KIND_CLUSTER_NAME=e2e
5757

58-
echo "Preloading the kindest/node image"
58+
echo "Preloading the kindest/node image..."
5959
docker load --input /kindest.tar
6060

6161
export KUBECONFIG=$(mktemp)
62-
echo "Creating kind cluster $KIND_CLUSTER_NAME"
62+
echo "Creating kind cluster $KIND_CLUSTER_NAME..."
6363
kind create cluster --name "$KIND_CLUSTER_NAME"
6464
chmod 600 "$KUBECONFIG"
6565

@@ -74,18 +74,18 @@ make helm
7474
image="ghcr.io/kcp-dev/kcp-operator:$IMAGE_TAG"
7575
archive=operator.tar
7676

77-
echo "Loading operator image into kind"
77+
echo "Loading operator image into kind..."
7878
buildah manifest push --all "$image" "oci-archive:$archive:$image"
7979
kind load image-archive "$archive" --name "$KIND_CLUSTER_NAME"
8080

8181
# deploy the operator
82-
echo "Deploying operator"
82+
echo "Deploying operator..."
8383
kubectl kustomize hack/ci/testdata | kubectl apply --filename -
8484
kubectl --namespace kcp-operator-system wait deployment kcp-operator-controller-manager --for condition=Available
8585
kubectl --namespace kcp-operator-system wait pod --all --for condition=Ready
8686

8787
# deploying cert-manager
88-
echo "Deploying cert-manager"
88+
echo "Deploying cert-manager..."
8989

9090
_tools/helm repo add jetstack https://charts.jetstack.io --force-update
9191
_tools/helm repo update
@@ -100,7 +100,7 @@ _tools/helm upgrade \
100100

101101
kubectl apply --filename hack/ci/testdata/clusterissuer.yaml
102102

103-
echo "Running e2e tests"
103+
echo "Running e2e tests..."
104104

105105
export HELM_BINARY="$(realpath _tools/helm)"
106106
export ETCD_HELM_CHART="$(realpath hack/ci/testdata/etcd)"

hack/download-tool.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ fi
4646
mkdir -p tmp
4747
cd tmp
4848

49-
echo "Downloading $BINARY version $VERSION " >&2
49+
echo "Downloading $BINARY version $VERSION ..." >&2
5050

5151
if $GO_MODULE; then
5252
GOBIN=$(realpath .) go install "$URL@$VERSION"

hack/run-e2e-tests.sh

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -30,19 +30,19 @@ DATA_DIR="$(realpath "$DATA_DIR")"
3030
# create a local kind cluster
3131

3232
export KUBECONFIG="$DATA_DIR/kind.kubeconfig"
33-
echo "Creating kind cluster $KIND_CLUSTER_NAME"
33+
echo "Creating kind cluster $KIND_CLUSTER_NAME..."
3434
kind create cluster --name "$KIND_CLUSTER_NAME"
3535
chmod 600 "$KUBECONFIG"
3636

3737
teardown_kind() {
3838
if [[ $OPERATOR_PID -gt 0 ]]; then
39-
echo "Stopping kcp-operator"
39+
echo "Stopping kcp-operator..."
4040
kill -TERM $OPERATOR_PID
4141
wait $OPERATOR_PID
4242
fi
4343

4444
if [[ $PROTOKOL_PID -gt 0 ]]; then
45-
echo "Stopping protokol"
45+
echo "Stopping protokol..."
4646
kill -TERM $PROTOKOL_PID
4747
# no wait because protokol ends quickly and wait would fail
4848
fi
@@ -59,11 +59,11 @@ fi
5959
echo "Kubeconfig is in $KUBECONFIG."
6060

6161
# deploying operator CRDs
62-
echo "Deploying operator CRDs"
62+
echo "Deploying operator CRDs..."
6363
kubectl apply --kustomize config/crd
6464

6565
# deploying cert-manager
66-
echo "Deploying cert-manager"
66+
echo "Deploying cert-manager..."
6767

6868
_tools/helm repo add jetstack https://charts.jetstack.io --force-update
6969
_tools/helm repo update
@@ -80,7 +80,7 @@ _tools/helm upgrade \
8080
kubectl apply --filename hack/ci/testdata/clusterissuer.yaml
8181

8282
# start the operator locally
83-
echo "Starting kcp-operator"
83+
echo "Starting kcp-operator..."
8484
_build/manager \
8585
-kubeconfig "$KUBECONFIG" \
8686
-zap-log-level debug \
@@ -98,7 +98,7 @@ else
9898
echo "collect logs from the kind cluster."
9999
fi
100100

101-
echo "Running e2e tests"
101+
echo "Running e2e tests..."
102102

103103
export HELM_BINARY="$(realpath _tools/helm)"
104104
export ETCD_HELM_CHART="$(realpath hack/ci/testdata/etcd)"

test/e2e/frontproxies/frontproxies_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -73,14 +73,14 @@ func TestCreateFrontProxy(t *testing.T) {
7373
Groups: []string{"system:masters"},
7474
}
7575

76-
t.Log("Creating kubeconfig for FrontProxy")
76+
t.Log("Creating kubeconfig for FrontProxy...")
7777
if err := client.Create(ctx, &fpConfig); err != nil {
7878
t.Fatal(err)
7979
}
8080
utils.WaitForObject(t, ctx, client, &corev1.Secret{}, types.NamespacedName{Namespace: fpConfig.Namespace, Name: fpConfig.Spec.SecretRef.Name})
8181

8282
// verify that we can use frontproxy kubeconfig to access rootshard workspaces
83-
t.Log("Connecting to FrontProxy")
83+
t.Log("Connecting to FrontProxy...")
8484
kcpClient := utils.ConnectWithKubeconfig(t, ctx, client, namespace.Name, fpConfig.Name)
8585
// proof of life: list something every logicalcluster in kcp has
8686
t.Log("Should be able to list Secrets.")

test/e2e/rootshards/proxy_test.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -80,22 +80,22 @@ func TestRootShardProxy(t *testing.T) {
8080
Groups: []string{"system:kcp:admin"},
8181
}
8282

83-
t.Log("Creating kubeconfig for RootShard")
83+
t.Log("Creating kubeconfig for RootShard...")
8484
if err := client.Create(ctx, &rsConfig); err != nil {
8585
t.Fatal(err)
8686
}
8787
utils.WaitForObject(t, ctx, client, &corev1.Secret{}, types.NamespacedName{Namespace: rsConfig.Namespace, Name: rsConfig.Spec.SecretRef.Name})
8888

89-
t.Log("Connecting to RootShard")
89+
t.Log("Connecting to RootShard...")
9090
rootShardClient := utils.ConnectWithKubeconfig(t, ctx, client, namespace.Name, rsConfig.Name)
9191

9292
// wait until the 2nd shard has registered itself successfully at the root shard
9393
shardKey := types.NamespacedName{Name: shardName}
94-
t.Log("Waiting for Shard to register itself on the RootShard")
94+
t.Log("Waiting for Shard to register itself on the RootShard...")
9595
utils.WaitForObject(t, ctx, rootShardClient, &kcpcorev1alpha1.Shard{}, shardKey)
9696

9797
// create workspace that we want to have scheduled onto the 2nd shard
98-
t.Log("Creating workspace with its logicalcluster on the 2nd Shard")
98+
t.Log("Creating workspace with its logicalcluster on the 2nd Shard...")
9999
workspace := &kcptenancyv1alpha1.Workspace{
100100
ObjectMeta: metav1.ObjectMeta{
101101
Name: "test",

test/e2e/rootshards/rootshards_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,13 +63,13 @@ func TestCreateRootShard(t *testing.T) {
6363
Groups: []string{"system:masters"},
6464
}
6565

66-
t.Log("Creating kubeconfig for RootShard")
66+
t.Log("Creating kubeconfig for RootShard...")
6767
if err := client.Create(ctx, &rsConfig); err != nil {
6868
t.Fatal(err)
6969
}
7070
utils.WaitForObject(t, ctx, client, &corev1.Secret{}, types.NamespacedName{Namespace: rsConfig.Namespace, Name: rsConfig.Spec.SecretRef.Name})
7171

72-
t.Log("Connecting to RootShard")
72+
t.Log("Connecting to RootShard...")
7373
kcpClient := utils.ConnectWithKubeconfig(t, ctx, client, namespace.Name, rsConfig.Name)
7474

7575
// proof of life: list something every logicalcluster in kcp has

test/e2e/shards/shards_test.go

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -73,18 +73,18 @@ func TestCreateShard(t *testing.T) {
7373
Groups: []string{"system:masters"},
7474
}
7575

76-
t.Log("Creating kubeconfig for RootShard")
76+
t.Log("Creating kubeconfig for RootShard...")
7777
if err := client.Create(ctx, &rsConfig); err != nil {
7878
t.Fatal(err)
7979
}
8080
utils.WaitForObject(t, ctx, client, &corev1.Secret{}, types.NamespacedName{Namespace: rsConfig.Namespace, Name: rsConfig.Spec.SecretRef.Name})
8181

82-
t.Log("Connecting to RootShard")
82+
t.Log("Connecting to RootShard...")
8383
rootShardClient := utils.ConnectWithKubeconfig(t, ctx, client, namespace.Name, rsConfig.Name)
8484

8585
// wait until the 2nd shard has registered itself successfully at the root shard
8686
shardKey := types.NamespacedName{Name: shardName}
87-
t.Log("Waiting for Shard to register itself on the RootShard")
87+
t.Log("Waiting for Shard to register itself on the RootShard...")
8888
utils.WaitForObject(t, ctx, rootShardClient, &kcpcorev1alpha1.Shard{}, shardKey)
8989

9090
// create a kubeconfig to access the shard
@@ -108,13 +108,13 @@ func TestCreateShard(t *testing.T) {
108108
Groups: []string{"system:masters"},
109109
}
110110

111-
t.Log("Creating kubeconfig for Shard")
111+
t.Log("Creating kubeconfig for Shard...")
112112
if err := client.Create(ctx, &shardConfig); err != nil {
113113
t.Fatal(err)
114114
}
115115
utils.WaitForObject(t, ctx, client, &corev1.Secret{}, types.NamespacedName{Namespace: shardConfig.Namespace, Name: shardConfig.Spec.SecretRef.Name})
116116

117-
t.Log("Connecting to Shard")
117+
t.Log("Connecting to Shard...")
118118
kcpClient := utils.ConnectWithKubeconfig(t, ctx, client, namespace.Name, shardConfig.Name)
119119

120120
// proof of life: list something every logicalcluster in kcp has

test/utils/deploy.go

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ func DeployEtcd(t *testing.T, name, namespace string) string {
3434

3535
helmChart := os.Getenv("ETCD_HELM_CHART")
3636

37-
t.Logf("Installing etcd %q into %s", name, namespace)
37+
t.Logf("Installing etcd %q into %s...", name, namespace)
3838
args := []string{"install", "--namespace", namespace, "--atomic", name, helmChart}
3939

4040
helmCommand := os.Getenv("HELM_BINARY")
@@ -46,7 +46,7 @@ func DeployEtcd(t *testing.T, name, namespace string) string {
4646
t.Fatalf("Failed to deploy etcd: %v", err)
4747
}
4848

49-
t.Log("Waiting for etcd to get ready")
49+
t.Log("Waiting for etcd to get ready...")
5050
args = []string{
5151
"wait",
5252
"pods",
@@ -108,7 +108,7 @@ func DeployShard(ctx context.Context, t *testing.T, client ctrlruntimeclient.Cli
108108
patch(&shard)
109109
}
110110

111-
t.Logf("Creating Shard %s", shard.Name)
111+
t.Logf("Creating Shard %s...", shard.Name)
112112
if err := client.Create(ctx, &shard); err != nil {
113113
t.Fatal(err)
114114
}
@@ -180,7 +180,7 @@ func DeployRootShard(ctx context.Context, t *testing.T, client ctrlruntimeclient
180180
patch(&rootShard)
181181
}
182182

183-
t.Logf("Creating RootShard %s", rootShard.Name)
183+
t.Logf("Creating RootShard %s...", rootShard.Name)
184184
if err := client.Create(ctx, &rootShard); err != nil {
185185
t.Fatal(err)
186186
}
@@ -233,7 +233,7 @@ func DeployFrontProxy(ctx context.Context, t *testing.T, client ctrlruntimeclien
233233
patch(&frontProxy)
234234
}
235235

236-
t.Logf("Creating FrontProxy %s", frontProxy.Name)
236+
t.Logf("Creating FrontProxy %s...", frontProxy.Name)
237237
if err := client.Create(ctx, &frontProxy); err != nil {
238238
t.Fatal(err)
239239
}

test/utils/utils.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -105,13 +105,13 @@ func CreateSelfDestructingNamespace(t *testing.T, ctx context.Context, client ct
105105
ns := corev1.Namespace{}
106106
ns.Name = fmt.Sprintf("e2e-%s", name)
107107

108-
t.Logf("Creating namespace %s", name)
108+
t.Logf("Creating namespace %s...", name)
109109
if err := client.Create(ctx, &ns); err != nil {
110110
t.Fatal(err)
111111
}
112112

113113
t.Cleanup(func() {
114-
t.Logf("Deleting namespace %s", name)
114+
t.Logf("Deleting namespace %s...", name)
115115
if err := client.Delete(ctx, &ns); err != nil {
116116
t.Fatal(err)
117117
}
@@ -137,7 +137,7 @@ func SelfDestuctingPortForward(
137137
fmt.Sprintf("%d:%d", localPort, targetPort),
138138
}
139139

140-
t.Logf("Exposing %s:%d on port %d", target, targetPort, localPort)
140+
t.Logf("Exposing %s:%d on port %d...", target, targetPort, localPort)
141141

142142
localCtx, cancel := context.WithCancel(ctx)
143143

0 commit comments

Comments
 (0)