-
Notifications
You must be signed in to change notification settings - Fork 808
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cleanup and refactor helm chart #1006
Conversation
Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please follow instructions at https://git.k8s.io/community/CLA.md#the-contributor-license-agreement to sign the CLA. It may take a couple minutes for the CLA signature to be fully registered; after that, please reply here with a new comment and we'll verify. Thanks.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Welcome @AtkinsChang! |
Hi @AtkinsChang. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: AtkinsChang The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
I signed it |
f6e6023
to
4f865ab
Compare
I am not very familiar with kustomize but I believe the files can be renamed as long as the Please, unless one of the owners says that they don't want the templates reorganized, split this into two PRs. One for the template rename/reorg and another for the resource renaming/adding additional functionality/image version updates. |
@krmichel
Some RBAC are used by the external-attacher, external-provisioner, external-resizer, external-snapshotter. I known this is a big PR and will split this. But I'd like to hear which to do and which not so I open a draft PR. Thanks for advice. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The majority of what you are adding as new options has no default values and since you are using with
blocks I don't think you will need any if to prevent them from doing anything undesirable in the kustomize manifests. You will need to make sure that the templates that you are adding API checks to have --api-versions 'snapshot.storage.k8s.io/v1'
added in the makefile to ensure the manifests are generated correctly. Let me know if you need anything else before splitting this PR.
resources: {} | ||
resizer: | ||
env: [] | ||
image: | ||
repository: k8s.gcr.io/sig-storage/csi-resizer | ||
tag: "v1.0.0" | ||
tag: v1.2.0 | ||
pullPolicy: IfNotPresent |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This was set to always
before so that is probably what I would set the default to.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think Always
is wrong value with fixed image version, and taking the risk of Docker Hub API rate limiting
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't believe that k8s.gcr.io
is docker hub. I think it is google cloud. Also, I believe, if there is already a local copy of the image and the digest for the image hasn't changed it won't pull but instead reuse the local cached images since it hasn't changed.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ok if you think it is reasonable to have csi-resizer
using Always
as default image pull policy and all other containers using IfNotPresent
then I will do it
env: | ||
- name: CSI_ENDPOINT | ||
value: unix:/csi/csi.sock | ||
value: unix:///var/lib/csi/sockets/pluginproxy/csi.sock |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Are these paths different on different nodes? Should this be configurable?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This can be set to any path, but this and the volume mount path should be same.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What I mean is that on one windows system could this be a different path than on another? Should the user be able to specify/override this value?
charts/aws-ebs-csi-driver/templates/node/daemonset-windows.yaml
Outdated
Show resolved
Hide resolved
Signed-off-by: Atkins Chang <atkinschang@gmail.com>
Signed-off-by: Atkins Chang <atkinschang@gmail.com>
Signed-off-by: Atkins Chang <atkinschang@gmail.com>
Signed-off-by: Atkins Chang <atkinschang@gmail.com>
Signed-off-by: Atkins Chang <atkinschang@gmail.com>
Signed-off-by: Atkins Chang <atkinschang@gmail.com>
Signed-off-by: Atkins Chang <atkinschang@gmail.com>
… priorityClassName Signed-off-by: Atkins Chang <atkinschang@gmail.com>
Signed-off-by: Atkins Chang <atkinschang@gmail.com>
Signed-off-by: Atkins Chang <atkinschang@gmail.com>
Signed-off-by: Atkins Chang <atkinschang@gmail.com>
Signed-off-by: Atkins Chang <atkinschang@gmail.com>
Signed-off-by: Atkins Chang <atkinschang@gmail.com>
Signed-off-by: Atkins Chang <atkinschang@gmail.com>
Signed-off-by: Atkins Chang <atkinschang@gmail.com>
I would split the PR before making any more updates. |
#1013 is what you talk about |
Sort of. I was wanting to split the renaming of the resources inside of the templates from moving/renaming the templates files themselves. Doing them together, based on git figuring out what is a rename based on content similarity, causes some of the files to appear to be deleted and then new files added since the resource renaming, inside the templates, causes them to no longer be similar enough to be a rename. The first PR would just be moving/renaming files and then fixing the paths in the Makefile to ensure git tracks all the renames. |
@AtkinsChang: PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
What is this PR about? / Why do we need it?
base on #1013
default "foo" .Value.foo
vs.Value.foo | default "foo"
)socket-dir
mount pathController
controller.podSecurityContext
controller.securityContext
system-cluster-critical
as default value ofpriorityClassName
Node
node.podSecurityContext
node.securityContext
node.additionalArgs
(this option is already in controller)ImagePullPolicy
according toimage.pullPolicy
Sidecar
sidecars.<name>.image.pullPolicy
option for images@krmichel is it ok to rename any resource under
deploy/kubernetes
?