►
From YouTube: Kubernetes SIG Testing 2018-03-06
A
A
Cola's
possible
because
you
might
come
through
there,
so
the
only
two
things
we
have
an
agent
today
is
a
question
from
Tim
about
the
current
status
of
the
released
blocking
jobs
and
then
a
question
for
me
about
where
we're
at
with
the
type-check
job
type
check
job
and
what
did
that
cut?
Enabled
to
mungus
your
foot.
C
So
it
looks
like
in
the
past,
they've
actually
been
using.
Three
distinct
builds
for
every
run,
I'm
digging
through
that
and
trying
to
sort
it
out.
So
hopefully
we
can
hit
that
and
get
it
down
to
at
least
two
I'm
hoping
to
have
things
green
again,
but
I
don't
really
know
and
I'm,
not
sure
exactly
what
was
failing
before
these
issues.
C
B
Was
only
a
small
number
of
of
actual
issues
and
I
thought
they
were
flakes
from
what
I
saw.
I
didn't
see
anything
major
that
caused
me
consternation,
at
least
at
this
point
we
are
running
separate
tests
right
now
and
our
role
and
set
up
to
verify
it
will
have
data
back
to
compare
once
what's
the
test
suite
even
runs
so
great.
C
B
The
I'm
mr.
no
one
really
owns
it,
I
think
that's
kind
of
the
problem.
It
was
created
by
a
couple
of
folks
who
don't
really
own
it
just
kind
of
had
to
pack
something
together,
but
now
it's
become
pretty
important
for
the
release.
So
until
we
have
a
replacement
for
it,
we
have
to
at
least
get
by
yeah.
C
B
A
C
Running
it
reports,
it's
not
blocking
it.
I
was
going
to
PR
that
I
wanted
to
check
and
make
sure
that
just
definitely
sure
that
we
continue
to
run
across
for
the
older
branches.
Then
we
won't
have
any
problems
and
that
everyone's
okay
with
the
fact
that
we
won't
be
running
it
in
batches
anymore,
not
type
check
but
cross.
We
don't
actually
have
support
for
conditionally
running
things
and
bachelors
other
than
branches,
I
believe
so
right
now,
we're
actually
just
saying
always
run
cross,
which
is
not
great.
C
D
D
A
C
A
Cool
and
I
guess
the
last
thing,
but
I
kinda
wanted
to
bring
up
I.
Just
everyone
saw
it.
There
was
an
issue
open
against
esta
for
yesterday,
I
believe
asking
if
it
would
be
possible
to
start
blacklisting
specific
statuses
on
pull
requests
in
order
for
tide
to
ignore
them
kind
of
a
thorny
long-simmering
discussion.
So
I
don't
know
if
it's
I.
D
So
the
main
idea
be
against
this.
Is
that
a
tide
kind
of
wants
all
the
statuses
to
be
actually
important,
I
guess
and
if
they're
they
should
be
green,
otherwise
they're,
not
an
important
status.
That
being
said,
I
think
that's
a
little
too
optimistic
and
not
all
statuses
are
going
to
follow
that
across
all
repos.
D
A
C
It's
pretty
well
understood:
it's.
We
restricted
the
specific
cases
like
reviewable
that
the
Rico
is
just
ignoring
that
and
that
they're
using
LG
TM
and
approve
instead
I
wish
they'd
turn
off
the
status,
but
I
I,
don't
think
we
get
enforced,
that
we
should
discourage
it
being
used
for
actual
tests
and
we're
pretty.
A
D
Kind
of
need
them
to
be
required
to
avoid
a
very
unlikely
race
condition
if
they're
not
required
and
tide
is
just
checking
to
make
sure
that
everything
that
exists
is
green.
Then,
if
the
PR
just
immediately
is
picked
up
by
tide
before
anything
can
report
I,
don't
know
about
any
of
those
things
we'll
think
everything
is
green.