Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

upgrade default node image #334

Merged

Conversation

BenTheElder
Copy link
Member

picks up #331
/hold

@k8s-ci-robot k8s-ci-robot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Feb 23, 2019
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: BenTheElder

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Feb 23, 2019
@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels Feb 23, 2019
@@ -18,4 +18,4 @@ limitations under the License.
package defaults

// Image is the default for the Config.Image field, aka the default node image.
const Image = "kindest/node:v1.13.3@sha256:d1af504f20f3450ccb7aed63b67ec61c156f9ed3e8b0d973b3dee3c95991753c"
const Image = "kindest/node:v1.13.3"
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm extremely on the fence about pinning the image fully or not.

It's still possible to use a pinned image via --image, otoh being reproducible-ish out of the box is nice.
Any change we push to these images is arguably breaking, pinning avoids that 🤔

OTOH this allows us to push things like docker security fixes.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i don't think pinning the image to the k8s patch release cycle is a good idea.

complex version schemas is a solution for that:
kindest/node:v1.13.3-0.1.0

where 0.1.0 is the kind version.
thus with a kind bump the image can be bumped too on security fixes.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

kindest/node:v1.13.3-0.1.0 is no different (in fact more complex and weaker) than putting the hash

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

at this point IMO users should not depend on the specific contents of the node image, and kind itself handles this kind of image change fine.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

it's defenitely weaker than the hash but stronger than having the k8s release only.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes, it does. but we are bound to the k8s release cycle.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

AFAICT the stable-1 is not bound though, it's looked up from the published releases?
that would be like if we used kindest/node:stable-1

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i'm going to add the hash for now and we can revisit this at the meeting or something. I think it's worth considering futher before we get too many releases in.

Copy link
Member

@neolit123 neolit123 Feb 23, 2019

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

AFAICT the stable-1 is not bound though, it's looked up from the published releases?

it tends to resolve to latest stable - e.g. currently 1.13.x

not binding to the k8s release allows you to push immediate fixes and not wait on a upstream PATCH bump, to bump an image for a docker fix. but either way is fine, as PATCH releases get pushed relatively often.

/lgtm

@BenTheElder
Copy link
Member Author

/hold cancel
added the sha

@k8s-ci-robot k8s-ci-robot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Feb 23, 2019
@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 23, 2019
@k8s-ci-robot k8s-ci-robot merged commit 6f430d3 into kubernetes-sigs:master Feb 23, 2019
@BenTheElder BenTheElder deleted the upgraded-node-image branch February 23, 2019 04:26
stg-0 pushed a commit to stg-0/kind that referenced this pull request Nov 20, 2023
* Bump version to 0.3.3

* Add snapshot versions

* Add dependencies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants