-
Notifications
You must be signed in to change notification settings - Fork 16.4k
Keep consistency with the previous PR #60677
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
|
@Miretpl To ensure the fallback logic works properly with the standard has check, I believe we should remove the default enabled: false in values.yaml (leaving it unset/nil). Otherwise, the default value overrides the old configuration in tests. WDYT?" |
|
@henry3260, the change in chart behaviour is by intent (there was a discussion in #59730), so currently, we want to make sure that the behaviour will be the same for every Behaviour same as in already moved configs means:
For simple examples for the above points, you can take a look at (also in terms of what is changed, how and where): If you have further questions, feel free to ask! |
Miretpl
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As I was here, I've made a quick review of the current state to not be late like last time :D
| {{- end }} | ||
| {{- end }} | ||
| {{- $kerberosInitContainerEnabled := or (.Values.workers.celery.kerberosInitContainer).enabled (.Values.workers.kerberosInitContainer).enabled }} | ||
| {{- $kerberosInitContainerEnabled := or (.Values.workers.celery.kerberosInitContainer).enabled (and (not (has (.Values.workers.celery.kerberosInitContainer).enabled (list true false))) (.Values.workers.kerberosInitContainer).enabled) }} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| {{- $kerberosInitContainerEnabled := or (.Values.workers.celery.kerberosInitContainer).enabled (and (not (has (.Values.workers.celery.kerberosInitContainer).enabled (list true false))) (.Values.workers.kerberosInitContainer).enabled) }} | |
| {{- $kerberosInitContainerEnabled := or .Values.workers.celery.kerberosInitContainer.enabled (and (not (has .Values.workers.celery.kerberosInitContainer.enabled (list true false))) .Values.workers.kerberosInitContainer.enabled) }} |
| securityContext: {{- toYaml .Values.workers.kerberosInitContainer.securityContexts.container | nindent 12 }} | ||
| lifecycle: {{- toYaml .Values.workers.kerberosInitContainer.containerLifecycleHooks | nindent 12 }} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We will need to add additional test cases for these options
Many thanks for your kind guidance!!! |
Okay! So we should update the tests by explicitly setting workers.celery.kerberosInitContainer to nil if we want to verify workers.kerberosInitContainer, assuming I understand correctly. |
Depends where. If you are testing the |
|
Hi @henry3260, can I finish this section? I need it for #60420, which I would like to finish and properly tested today |
Feel free |
Do you need my help to add additional test cases for securityContext and lifecycle? |
|
In my PR, I will leave |
|
I think that we came to conclustion in the mentioned PR, so for this one, you would need only add missing support for:
under + of course test cases for each. Will that be good? |
looks good! |
Keep consistency with the previous PR like #60238
Was generative AI tooling used to co-author this PR?
{pr_number}.significant.rstor{issue_number}.significant.rst, in airflow-core/newsfragments.