-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Dependabot/go modules/GitHub.com/hashicorp/go sockaddr 1.0.2 #1811
Dependabot/go modules/GitHub.com/hashicorp/go sockaddr 1.0.2 #1811
Conversation
Bumps [github.com/hashicorp/go-sockaddr](https://github.com/hashicorp/go-sockaddr) from 1.0.0 to 1.0.2. - [Release notes](https://github.com/hashicorp/go-sockaddr/releases) - [Commits](hashicorp/go-sockaddr@v1.0.0...v1.0.2) Signed-off-by: dependabot[bot] <[email protected]>
Signed-off-by: Simon Pasquier <[email protected]>
3733712
to
bf43f5b
Compare
I'm in favor of this, but my main concerns (which should always be concerns) is the flakiness of some of our tests, and the e2e prometheus operator test that we rely on when cutting releases being external (I believe that's what @mxinden has referenced, not sure of the correct name for it). I've never seen the e2e test, but would it be possible to include this (or something like it)? Some of the work done in the api acceptance test could potentially be expanded to include a small webhook receiver to make sure the notifications are correctly sent, instead of spinning up the whole e2e environment. What does "success" look like in the operator e2e test? Is it using a webhook and verifying a notification is received? Also, a thought: Is prometheus using the swagger-generated alertmanager client to send alerts? |
@simonpasquier do I understand it correctly, that
@stuartnelson3 I am not quite sure how your comment relates to these changes. Are you saying that our already high flakiness would increase more with continuously introducing changes in regards to our dependencies? The Prometheus Operator test suite contains the following Alertmanager tests:
You can find the tests here: https://github.com/coreos/prometheus-operator/blob/master/test/e2e/alertmanager_test.go We could add a Kubernetes end-to-end test suite via minikube running on the travis nodes as a single node cluster, but I would rather like to invest into our current bare-metal test setup, as it is not bound to particular orchestrator.
Not yet :( |
I am happy moving forward with this, but I think we'll still have to manually run tests to make sure everything is "ok". I'm imagining a bright and shiny future where this can be fully automated.
This sounds good to me. Some form of "client sends an alert, alertmanager processes it, verify that a webhook outputs the alert to stdout". We could probably reuse https://github.com/prometheus/alertmanager/blob/master/examples/webhook/echo.go. But, this would be for another ticket. |
I agree with your concerns and I'm also be in favor of extending the test suite of AlertManager in this repository. That being said and as @mxinden already said, they seem a bit orthogonal to this work. Also regarding e2e testing from alert to webhook, isn't it already covered by the acceptance tests or did you mean something different?
Yes.
No, this is somehow related to prometheus/prometheus#5167. I'm quite sure that |
No worries, I'm just making comments that are unnecessary for this PR. I'm a 👍 |
Sorry for dropping the ball here @simonpasquier. |
@mxinden @stuartnelson3 I'm working on automating dependency updates with dependabot and this PR is a first try. See also prometheus/prometheus#5265 for more context.
I have basically written some glue code that updates the dependabot PRs in case they don't pass the CI (eg
vendor/
directory not synced) and push automatically to the upstream once the CI is green. It will also check that the PR is mergeable and ask dependabot to recreate a new PR if not.