Skip to content

Commit

Permalink
image pushing: more Kubernetes-CSI repos and branches, separate dashb…
Browse files Browse the repository at this point in the history
…oard

As discussed in kubernetes#17741
it's fine to enable jobs that will not succeed.

A separate dashboard gets added because it's easier than trying to
determine per repo where the job is meant to be shown and because it
might be useful to check all of those jobs at one glance.
  • Loading branch information
pohly authored and chizhg committed Jun 6, 2020
1 parent 9ceb194 commit ce6f118
Show file tree
Hide file tree
Showing 3 changed files with 215 additions and 63 deletions.
19 changes: 12 additions & 7 deletions config/jobs/image-pushing/k8s-staging-csi-gen.sh
Original file line number Diff line number Diff line change
Expand Up @@ -16,8 +16,13 @@
output="$(dirname $0)/k8s-staging-csi.yaml"
repos="
csi-driver-host-path
csi-driver-iscsi
csi-driver-nfs
csi-driver-smb
csi-proxy
csi-test
external-attacher
external-health-monitor
external-provisioner
external-resizer
external-snapshotter
Expand All @@ -37,16 +42,16 @@ for repo in $repos; do
- name: post-$repo-push-images
cluster: k8s-infra-prow-build-trusted
annotations:
testgrid-dashboards: sig-storage-csi-$repo
testgrid-dashboards: sig-storage-image-build
decorate: true
branches:
# For publishing canary images. Publishing canary images for release branches can
# be added later, but then will depend on which release branches in each repo have
# the necessary cloud build files.
# For publishing canary images.
- ^master$
# This is a regex for semver, from https://semver.org/#is-there-a-suggested-regular-expression-regex-to-check-a-semver-string.
# This is okay for upcoming releases, but old releases will not have the necessary cloud build
# files and thus the job will fail.
- ^release-
# For publishing tagged images. Those will only get built once, i.e.
# existing images are not getting overwritten. A new tag must be set to
# trigger another image build. Images are only built for tags that follow
# the semver format (regex from https://semver.org/#is-there-a-suggested-regular-expression-regex-to-check-a-semver-string).
- ^v(0|[1-9]\d*)\.(0|[1-9]\d*)\.(0|[1-9]\d*)(?:-((?:0|[1-9]\d*|\d*[a-zA-Z-][0-9a-zA-Z-]*)(?:\.(?:0|[1-9]\d*|\d*[a-zA-Z-][0-9a-zA-Z-]*))*))?(?:\+([0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?$
spec:
serviceAccountName: gcb-builder
Expand Down
Loading

0 comments on commit ce6f118

Please sign in to comment.