Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Skip Get-WindowsFeature goss spec for windows-2025 #1619

Merged
merged 1 commit into from
Oct 24, 2024

Conversation

mboersma
Copy link
Contributor

Change description

Tries the Get-WindowsFeature goss test spec twice to work around an issue with windows-2025. Also restores the Azure windows-2025 build to CI runs.

Related issues

Additional context

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels Oct 22, 2024
@mboersma
Copy link
Contributor Author

/cc @jsturtevant @TinaMor

@k8s-ci-robot
Copy link
Contributor

@mboersma: GitHub didn't allow me to request PR reviews from the following users: TinaMor.

Note that only kubernetes-sigs members and repo collaborators can review this PR, and authors cannot review their own PRs.

In response to this:

/cc @jsturtevant @TinaMor

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@mboersma mboersma added the sig/windows Categorizes an issue or PR as relevant to SIG Windows. label Oct 22, 2024
@mboersma
Copy link
Contributor Author

/test pull-azure-sigs

# PowerShell command to Get Windows Features.
{{ if eq .Vars.OS "windows"}} # Windows
# Workaround until windows features are added to goss
command:
{{range $name, $vers := index .Vars .Vars.OS "common-windows-features"}}
"Windows Feature - {{ $name }}":
exec: powershell -command "(Get-WindowsFeature {{ $name }} | select *)"
exec: powershell -command "(for ($i = 0; $i -lt 2; $i++) {Get-WindowsFeature {{ $name }} | select *})"
Copy link
Contributor

@TinaMor TinaMor Oct 22, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@mboersma Not sure if this will work in the 30sec. Instead, we are using goss to retry. If it fails in 30sec, we retry until the max time out in goss-args.json

cc. @jsturtevant

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ah, so you're retrying the whole goss suite until timeout? That should be more robust. Sorry, I didn't know you were addressing this in #1576. I'm curious to see how this fails, but I'll close it afterward.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I had also previously tried adding some ansible debug statements right after we enable the features, using community.windows.win_feature_info. It showed both features were installed correctly, but it also seemed to have the side effect of making the existing goss test pass. 🤷🏻

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

adding some ansible debug statements right after we enable the features,

Interesting. This may work. The issue is with Get-WindowsFeature cmdlet. It fails on the first try on a fresh install, but passes the when executed again. Perhaps community.windows.win_feature_info already calls the cmdlet so when the test is run by Goss, it doesn't fail. Will investigate.

Should we skip the test for 2025 for now?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We are skipping the windows-2025 SIG test in CI currently as of #1604.

As for the debug statement side effect, I only ran it twice so I'm not that confident, but it did fail 100% of the time before that.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We could add back the WS2025 CI. The issues with 2025 are gMSA (addressed by #1576) and timeout when querying Windows features (investigating).

If we skip the Windows feature test, the tests should run successfully.

Copy link
Contributor Author

@mboersma mboersma Oct 22, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I redid this PR just to skip the Get-WindowsFeature test on windows-2025 for now, and to turn the windows-2025 sig build back on in CI.

@mboersma
Copy link
Contributor Author

/retitle Skip Get-WindowsFeature goss spec for windows-2025

@k8s-ci-robot k8s-ci-robot changed the title Try Get-WindowsFeature goss spec twice for windows-2025 Skip Get-WindowsFeature goss spec for windows-2025 Oct 22, 2024
@mboersma
Copy link
Contributor Author

mboersma commented Oct 22, 2024

/test pull-azure-sigs

Edit: sig-windows-2025-containerd: SUCCESS

@jsturtevant
Copy link
Contributor

Unfortunate that the powershell command doesn't work properly on Windows 2025.

/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Oct 24, 2024
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: jsturtevant

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Oct 24, 2024
@k8s-ci-robot k8s-ci-robot merged commit 5101ee6 into kubernetes-sigs:main Oct 24, 2024
11 checks passed
@mboersma mboersma deleted the fix-windows-2025 branch October 24, 2024 16:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. sig/windows Categorizes an issue or PR as relevant to SIG Windows. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.
Projects
Status: Done
Development

Successfully merging this pull request may close these issues.

Azure windows-2025 builds failing: timeout during goss tests
4 participants