Skip to content

Conversation

@deads2k
Copy link
Contributor

@deads2k deads2k commented Aug 8, 2017

Separate pull that uses a daemonset in a template to run the TSB.

@openshift-merge-robot openshift-merge-robot added the size/L Denotes a PR that changes 100-499 lines, ignoring generated files. label Aug 8, 2017
@openshift-merge-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: deads2k

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these OWNERS Files:

You can indicate your approval by writing /approve in a comment
You can cancel your approval by writing /approve cancel in a comment

@openshift-merge-robot openshift-merge-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Aug 8, 2017
@deads2k
Copy link
Contributor Author

deads2k commented Aug 8, 2017

/test integration

@deads2k
Copy link
Contributor Author

deads2k commented Aug 8, 2017

/test extended_conformance_gce

@deads2k
Copy link
Contributor Author

deads2k commented Aug 8, 2017

@bparees @jim-minter rather than try to make this template perfect now, I'd like to start with "not offensive" and work out from there. I'm happy to explain any args if they look weird.

@jim-minter
Copy link
Contributor

ah, ok - I ended up commenting on the template bits at #15677 before reading this.

@deads2k
Copy link
Contributor Author

deads2k commented Aug 8, 2017

ah, ok - I ended up commenting on the template bits at #15677 before reading this.

no problem. The comments are fair (I responded there). I can open issues if you're willing to take it as a valid starting point.

@jim-minter
Copy link
Contributor

think my only question is around location (test/testdata or examples) which can be changed easily, lgtm

@deads2k
Copy link
Contributor Author

deads2k commented Aug 8, 2017

Opened #15681 and #15682 to address the functional problems in the template. I'll work on those in parallel as we work out our ansible story.

@deads2k deads2k added the lgtm Indicates that a PR is ready to be merged. label Aug 8, 2017
@deads2k
Copy link
Contributor Author

deads2k commented Aug 8, 2017

/test extended_conformance_install_update

@openshift-merge-robot
Copy link
Contributor

Automatic merge from submit-queue

@openshift-merge-robot openshift-merge-robot merged commit 80dd9e6 into openshift:master Aug 8, 2017
examples/service-catalog/... \
pkg/image/admission/imagepolicy/api/v1/...
pkg/image/admission/imagepolicy/api/v1/... \
test/testdata/templateservicebroker/...
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

is testdata really the final home for this? is this just for testing? I was under the impression it was more fundamental.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

is testdata really the final home for this? is this just for testing? I was under the impression it was more fundamental.

I'm still working it out with @sdodson. The first use-case is test/initial cluster-up cases.

objects:

# to create the tsb server
- apiVersion: extensions/v1beta1
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

do we have other GA product features built on top of beta apis? are we comfortable w/ the migration implications?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

do we have other GA product features built on top of beta apis? are we comfortable w/ the migration implications?

I'm trying to get up with @smarterclayton about why service catalog is a daemonset. Seems wrong and @pmorie isn't sure. I'd choose a deploymentconfig.

spec:
serviceAccountName: apiserver
containers:
- name: c
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

surely we can name this better :)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

surely we can name this better :)

If you wish.

containers:
- name: c
image: ${IMAGE}
imagePullPolicy: Never
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

IfNotPresent?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

IfNotPresent?

once we have an image, I can switch it. For now, doing that breaks my local images.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why/how? if you have a local origin image you've built it should just use that, right?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why/how? if you have a local origin image you've built it should just use that, right?

If you use a tag of :latest, the pull policy is forced to always when running with some admission plugins. Since we now have images in latest that can work, I've updated it in #15707 for you.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I thought that pull policy was only forced if it wasn't explicitly declared otherwise. Are you telling me it will only force it to always if the value is not set to "never"? that's insane.

kind: ServiceAccount
metadata:
namespace: ${NAMESPACE}
name: apiserver
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

is there no ordering issue w/ creating the daemonset referencing the SA before the SA exists/has the right permissions?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

is there no ordering issue w/ creating the daemonset referencing the SA before the SA exists/has the right permissions?

correct.

namespace: ${NAMESPACE}
name: apiserver
annotations:
service.alpha.openshift.io/serving-cert-secret-name: apiserver-serving-cert
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

relying on alpha features makes me even less happy than relying on beta features. sounds like a migration headache in the making. (unless this really is for testing purposes only, but i was under the impression this was the template cluster up and ansible will use to deploy the TSB)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Using the service serving cert signer really seems like the right thing to do here. @smarterclayton how would you like to generate our serving cert for the TSB service?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i don't disagree that it looks like the right solution for the immediate problem, but i'm trying to head off migration pain in the future so i want to make sure we have a (not horrible) path.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i don't disagree that it looks like the right solution for the immediate problem, but i'm trying to head off migration pain in the future so i want to make sure we have a (not horrible) path.

Imagine the migration path. We introduce the beta annotation. Because this API appears largely right (there's just not that many ways to do it), the secret with the exact same name is generated. A later apply places both annotations on the service, the secret doesn't change in meaning (might get regenerated) and the pods never know the difference.

@deads2k deads2k deleted the tsb-template branch January 24, 2018 14:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged. retest-not-required size/L Denotes a PR that changes 100-499 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants