Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: add enableWindows as helm values for Windows DaemonSet creation #388

Merged
merged 1 commit into from
Jul 22, 2023

Conversation

jennwah
Copy link
Contributor

@jennwah jennwah commented Jul 5, 2023

What type of PR is this?
/kind feature

What this PR does / why we need it:
feat: add enableWindows as helm values for Windows DaemonSet creation
Add feature for enabling Windows DaemonSet if specified. By default its false.

Which issue(s) this PR fixes:
Fixes #381

Special notes for your reviewer:

Release note:

feat: add enableWindows helm chart value to control the deployment of Windows manifests

@k8s-ci-robot k8s-ci-robot added the kind/feature Categorizes issue or PR as related to a new feature. label Jul 5, 2023
@linux-foundation-easycla
Copy link

linux-foundation-easycla bot commented Jul 5, 2023

CLA Signed

The committers listed above are authorized under a signed CLA.

  • ✅ login: jennwah / name: Jenn Wah (384652a)

@k8s-ci-robot k8s-ci-robot added the cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. label Jul 5, 2023
@k8s-ci-robot
Copy link
Contributor

Welcome @jennwah!

It looks like this is your first PR to kubernetes-sigs/sig-storage-local-static-provisioner 🎉. Please refer to our pull request process documentation to help your PR have a smooth ride to approval.

You will be prompted by a bot to use commands during the review process. Do not be afraid to follow the prompts! It is okay to experiment. Here is the bot commands documentation.

You can also check if kubernetes-sigs/sig-storage-local-static-provisioner has its own contribution guidelines.

You may want to refer to our testing guide if you run into trouble with your tests not passing.

If you are having difficulty getting your pull request seen, please follow the recommended escalation practices. Also, for tips and tricks in the contribution process you may want to read the Kubernetes contributor cheat sheet. We want to make sure your contribution gets all the attention it needs!

Thank you, and welcome to Kubernetes. 😃

@k8s-ci-robot k8s-ci-robot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Jul 5, 2023
@k8s-ci-robot
Copy link
Contributor

Hi @jennwah. Thanks for your PR.

I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. and removed cncf-cla: no Indicates the PR's author has not signed the CNCF CLA. labels Jul 5, 2023
@jennwah
Copy link
Contributor Author

jennwah commented Jul 5, 2023

/cc @mauriciopoppe perhaps you can help with moving this easy feature PR forward from issues #381 . Thank you!

@jennwah
Copy link
Contributor Author

jennwah commented Jul 5, 2023

/cc @mauriciopoppe

@mauriciopoppe
Copy link
Member

/ok-to-test

Please squash your changes into 1 commit

@k8s-ci-robot k8s-ci-robot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Jul 5, 2023
@jennwah
Copy link
Contributor Author

jennwah commented Jul 5, 2023

Hi @mauriciopoppe , looks like all the tests have passed, can we get a lgtm and approval? Also, I have squashed the changes into 1 single commit with beautiful commit message. Thank you!

#
# Indicates if Windows DaemonSet should be created (by default: true)
#
enableWindows: true
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe the default value should be false to make Windows deployment an opt-in, unfortunately the chart was already released so I'd argue this'd be a breaking change.

@msau42 @andyzhangx thoughts? I don't know how many people are relying on the helm chart to install the Windows component, as far as I know it was only Microsoft that's using it, maybe we can make this change in a minor patch (e.g. release 1.1.0 of the helm chart).

Copy link
Contributor Author

@jennwah jennwah Jul 6, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It looks like perhaps enabling windows deployment by default makes most sense here, for obvious reasons (not introducing breaking changes etc)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@msau42 @andyzhangx @mauriciopoppe What do you think guys? Is this feature necessary, considering there're users asking for disabling windows deployment for its redundancy.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yeah I think we can add it however we need to be ok whether it should be enabled by default

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@andyzhangx @msau42 please give your valuable opinions here for this feature addition.

Anything would happen if we don't enableWindows by default? How many users would be affected?

Or maybe perhaps we add the feature to disableWindows. But it is counterintuitive in nature....considering all features in helm values are addition add-ons, rather than removals...

Dilemma here.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we can make it enableWindows: false by default but we'd need to bump the Helm Chart to v2 because there might be people who already rely on this manifest being installed by default. The more we wait the harder it's going to make this switch.

@andyzhangx are you installing LVP through the Helm chart?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@mauriciopoppe Alright lets change to enableWindows: false by default. I have changed the necessary and also added into documentation as well.

Copy link
Member

@mauriciopoppe mauriciopoppe left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looking better, a few comments:

@k8s-ci-robot k8s-ci-robot added size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. and removed size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels Jul 11, 2023
@jennwah
Copy link
Contributor Author

jennwah commented Jul 11, 2023

Ran the generated scripts for generated examples and also bumped it to v2 for helm chart.

@mauriciopoppe
Copy link
Member

We flattened a few values in #393 so please update your copy adding the enableWindows flat as a top level value

@k8s-ci-robot k8s-ci-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jul 21, 2023
@k8s-ci-robot k8s-ci-robot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jul 22, 2023
@mauriciopoppe
Copy link
Member

Thanks a lot for your patience @jennwah!

/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Jul 22, 2023
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: jennwah, mauriciopoppe

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jul 22, 2023
@k8s-ci-robot k8s-ci-robot merged commit e0ad13e into kubernetes-sigs:master Jul 22, 2023
6 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/feature Categorizes issue or PR as related to a new feature. lgtm "Looks good to me", indicates that a PR is ready to be merged. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Add the ability to disable the Windows daemonset
3 participants