-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add variable expansion for ImagePullPolicy in Tasks. See #3423 #3488
Conversation
|
Hi @rinckm. Thanks for your PR. I'm waiting for a tektoncd member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Apologies for being late to the party but I'm a bit confused about why we need this - gonna go over to #3423 and comment there |
Thanks for answering my questions over in #3423! Meanwhile in this PR my only thought is I wonder if it would make sense to include an example, or end to end test (e.g. add the expansion to an existing test in https://github.com/tektoncd/pipeline/tree/master/test or add a new test) or to a "reconciler" test (e.g. it looks like the test at pipeline/pkg/reconciler/taskrun/taskrun_test.go Line 1089 in 05d67e4
nbd tho if that feels like overkill! /ok-to-test |
I was added to the contributors list now. Can you please retrigger this check. |
Closes tektoncd#3423 Add variable expansion in Tasks for fields: - `spec.steps[].imagePullPolicy` - `spec.sidecar[].imagePullPolicy`
Example added: |
/test pull-tekton-pipeline-integration-tests |
I just pulled down this branch to check what happens when an invalid imagePullPolicy is injected in this way from a param to the pod field. The TaskRun failed when creating the pod:
👍 thanks @rinckm . Are you working on the EasyCLA authorization on your side? /approve |
Yes, hope I'll get this done in the next days. |
Force CLA check |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: sbwsg, vdemeester The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Changes
Add variable expansion in Tasks for fields:
spec.steps[].imagePullPolicy
spec.sidecar[].imagePullPolicy
Closes #3423
/kind feature
Submitter Checklist
These are the criteria that every PR should meet, please check them off as you
review them:
See the contribution guide for more details.
Double check this list of stuff that's easy to miss:
cmd
dir, please updatethe release Task to build and release this image.
Reviewer Notes
If API changes are included, additive changes must be approved by at least two OWNERS and backwards incompatible changes must be approved by more than 50% of the OWNERS, and they must first be added in a backwards compatible way.
Release Notes