-
Notifications
You must be signed in to change notification settings - Fork 6.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix: When creating a list of files and images with ./generate_list.sh, included ingress-nginx/kube-webhook-certgen image in the list. #11787
base: master
Are you sure you want to change the base?
Conversation
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: DearJey The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Hi @DearJey. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/ok-to-test
|
sha256: "{{ ingress_nginx_kube_webhook_certgen_digest_checksum | default(None) }}" | ||
groups: | ||
- kube_node | ||
when: ingress_nginx_webhook_enabled |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this should be enabled: "{{ ingress_nginx_webhook_enabled }}"
like the other in this file.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you for comments!
I fixed it as descibed below.
enabled: "{{ ingress_nginx_webhook_enabled }}"
Dose this address your cocmments?
commit: d47e051
groups: | ||
- kube_node |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This would download the webhook image on all nodes, this will slow down kubespray on large clusters.
This should be scoped to smaller subset of nodes 🤔
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've updated it as described below.
groups:
- kube_control_plane
- infra
Could you confirm if this task is correct?
commit: af5dd45
ingress_nginx_kube_webhook_certgen: | ||
repo: "{{ ingress_nginx_kube_webhook_certgen_image_repo }}" | ||
tag: "{{ ingress_nginx_kube_webhook_certgen_image_tag }}" | ||
sha256: "{{ ingress_nginx_kube_webhook_certgen_digest_checksum | default(None) }}" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'd drop the d(None). We should have valid checksums for our images.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I deleted default(None)
from this task.
sha256: "{{ ingress_nginx_kube_webhook_certgen_digest_checksum }}"
Adding label Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
What type of PR is this?
/kind bug
What this PR does / why we need it:
When list of files, images and local repogitry was created with ./generate_list.sh, ./manage-offline-files.sh and createing Kubernetes Cluster In offline construction with
ingress_nginx_webhook_enabled: true
,ingress-nginx-admission-*
Pod of the Job created when is ImagePullBackOff and does not become READY../generate_list.sh
creates an image list based on thedownloads:
section of/roles/kubespray-defaults/defaults/main/download.yml
.So, add the following to download.yml,
registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.1
was added to the image list, and the above phenomenon was resolved.Which issue(s) this PR fixes:
Fixes #11591
Special notes for your reviewer:
Does this PR introduce a user-facing change?: