Skip to content

[tests-only][full-ci] run tests on kubernetes #11152

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

nirajacharya2
Copy link
Contributor

Description

Related Issue

Motivation and Context

How Has This Been Tested?

  • test environment:
  • test case 1:
  • test case 2:
  • ...

Screenshots (if appropriate):

Types of changes

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to change)
  • Technical debt
  • Tests only (no source changes)

Checklist:

  • Code changes
  • Unit tests added
  • Acceptance tests added
  • Documentation ticket raised:

@nirajacharya2 nirajacharya2 self-assigned this Mar 20, 2025
@nirajacharya2 nirajacharya2 force-pushed the run-test-on-kubernetes branch 6 times, most recently from 4610431 to 3a5adb8 Compare March 20, 2025 07:24
@nirajacharya2 nirajacharya2 force-pushed the run-test-on-kubernetes branch 2 times, most recently from 8b8e271 to 0136bee Compare April 1, 2025 06:39
@nirajacharya2 nirajacharya2 force-pushed the run-test-on-kubernetes branch 5 times, most recently from 7cac7bc to dded2bd Compare April 11, 2025 06:03
@nirajacharya2 nirajacharya2 force-pushed the run-test-on-kubernetes branch from dded2bd to 21e530f Compare April 11, 2025 06:04
"services": [
{
"name": "k3d",
"image": "ghcr.io/k3d-io/k3d:5-dind",
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
"image": "ghcr.io/k3d-io/k3d:5-dind",
"image": "ghcr.io/k3d-io/k3d:5-dind",
"privileged": True,

Doesn't the privileged flag need to go to service configuration?
See working example from ocis-charts repo: https://github.com/owncloud/ocis-charts/blob/main/.drone.star#L158-L170

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yeah, true

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Updated the privileged config but still same error:
https://drone.owncloud.com/owncloud/ocis/45082

linter: untrusted repositories cannot enable privileged mode

Copy link
Member

@saw-jan saw-jan Apr 16, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I believe this is something DevOps can enable.

Drone privileged mode: https://docs.drone.io/pipeline/docker/syntax/steps/#:~:text=Privileged%20Mode,access%20to%20your%20host%20machine.

Possible solution: https://docs.drone.io/cli/repo/drone-repo-update/

Privilege mode comes with the risk though.

@saw-jan
Copy link
Member

saw-jan commented Apr 15, 2025

Updated the privileged config but still same error:
https://drone.owncloud.com/owncloud/ocis/45082

linter: untrusted repositories cannot enable privileged mode

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants