-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for acadia profile #205
Conversation
/ok-to-test |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
please check my comments as well and test it
@@ -65,7 +69,8 @@ func getRequestedCapacity(capRange *csi.CapacityRange) (int64, error) { | |||
|
|||
// Limit is more than Required, but larger than Minimum. So we just set capcity to Minimum | |||
// Too small, default | |||
if capBytes < utils.MinimumVolumeSizeInBytes { | |||
// If profile is SDP profile then no need to check for minimum size as the RoundUpBytes will giving minimum value as 1 GiB | |||
if profileName != SDPProfile && capBytes < utils.MinimumVolumeSizeInBytes { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
pl reverse the condition
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done
expectedValue int64 | ||
expectedError error | ||
}{ | ||
{ | ||
testCaseName: "Check minimum size supported by volume provider in case of nil passed as input for sdp profile", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
please add negative tests as well
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added few cases covering nil but we cannot pass negative value to this parameter. IDeally this will come from the k8s parsing form PVC.It is not allowed
Signed-off-by: Sameer Shaikh <sameer.shaikh@ibm.com>
Signed-off-by: Sameer Shaikh <sameer.shaikh@ibm.com>
Signed-off-by: Sameer Shaikh <sameer.shaikh@ibm.com>
Signed-off-by: Sameer Shaikh <sameer.shaikh@ibm.com>
Signed-off-by: Sameer Shaikh <sameer.shaikh@ibm.com>
Signed-off-by: Sameer Shaikh <sameer.shaikh@ibm.com>
Signed-off-by: Sameer Shaikh <sameer.shaikh@ibm.com>
079865c
to
b13652b
Compare
Signed-off-by: Sameer Shaikh <sameer.shaikh@ibm.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can you verify changes and update the result
Signed-off-by: Sameer Shaikh <sameer.shaikh@ibm.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can you check my comments
for key, value := range req.GetParameters() { | ||
switch key { | ||
case Profile: | ||
if utils.ListContainsSubstr(SupportedProfile, value) { | ||
profileName = value |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
why we can't use volume.VPCVolume.Profile.Name
instead of creating new variable?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@arahamad I had initially used that only but wanted to avoid multiple nil checks. I have now put generic nil check to avoid this. Thanks for the comments.
Signed-off-by: Sameer Shaikh <sameer.shaikh@ibm.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
please verify also
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: arahamad, sameshai The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
No description provided.