-
-
Notifications
You must be signed in to change notification settings - Fork 8.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use enhanced InboundAgentRule
#7192
Conversation
This build failed with a stack trace unrelated to the one mentioned in this PR's description: it seems that in addition to the inbound agent launch being flaky, the test case itself is flaky once the inbound agent is launched. Will debug that issue separately. |
Please take a moment and address the merge conflicts of your pull request. Thanks! |
This PR is now ready for merge. We will merge it after approximately 24 hours if there is no negative feedback. |
* Add "Testing done" section to PR template (jenkinsci#7218) * Use enhanced `InboundAgentRule` (jenkinsci#7192) Co-authored-by: Basil Crow <[email protected]>
Security218Test
has flaked a few times with:Looking into the failure further, I suspect this because we aren't starting this with the
-Xmx
JVM option like we do everywhere else. So my theory is that JVM ergonomics kicks in and sizes the JVM incorrectly, which results in memory exhaustion.Whether or not that theory is correct, we are running this test inconsistently with other inbound agent tests. So I am introducing jenkinsci/jenkins-test-harness#493 to serve as a consistent way of running inbound agent tests and converting (the vast majority of) such tests in core to use the new functionality. If the consistent use of
-Xmx
in that method helps with the flakiness here, great. In the worst case, it cannot hurt to have a cleaner interface and more consistent test execution. If the common functionality being used here has flakiness bugs, we can fix them in one place and then the fixes will apply to all tests, something that isn't possible with the copypasta we have today.Proposed changelog entries
N/A
Proposed upgrade guidelines
N/A
Submitter checklist
Proposed changelog entries
section only if there are breaking changes or other changes which may require extra steps from users during the upgrade@Restricted
or have@since TODO
Javadoc, as appropriate.@Deprecated(since = "TODO")
or@Deprecated(forRemoval = true, since = "TODO")
if applicable.eval
to ease future introduction of Content-Security-Policy directives (see documentation on jenkins.io).Desired reviewers
@mention
Maintainer checklist
Before the changes are marked as
ready-for-merge
:Proposed changelog entries
are accurate, human-readable, and in the imperative moodupgrade-guide-needed
label is set and there is aProposed upgrade guidelines
section in the PR title. (example)lts-candidate
to be considered (see query).