-
Notifications
You must be signed in to change notification settings - Fork 774
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add cluster-api-provider-digitalocean to image promoter #671
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I have two questions about the process.
@@ -0,0 +1,3 @@ | |||
- name: cluster-api-do-controller | |||
dmap: | |||
"sha256:": ["v0.3.0"] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What is the process to get the SHA256? Should I first cut the release, build the image locally, and then past the SHA256? Is there some other process?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You shouldn't actually need to list any images prior to having an image pushed to staging first.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
After you have a published staging image, you can get the sha either from the output of the job that is pushing the image, or you can look in the GCR registry through the console, for example the staging repo for cluster-api-provider-aws is viewable here: https://console.cloud.google.com/gcr/images/k8s-staging-cluster-api-aws/GLOBAL/cluster-api-aws-controller?project=k8s-staging-cluster-api-aws&gcrImageListsize=30 (may not be viewable if you are not in the group membership)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That makes sense! Thanks for the explanation! I've dropped this file from the PR.
settings: | ||
ReconcileMembers: "true" | ||
members: | ||
- mudrinic.mare@gmail.com |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Right now, I'm the only one maintainer of the CAPI-DO project (SCL mailing list post for more details). We will add two more maintainers after the lazy consensus passes on 3/25.
Is it okay that I'm the only member/owner for now? Should I wait for new maintainers to get promoted or add someone from SCL/Cluster-API?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A single owner/member here should be fine for now, I'm also more than happy to be a backup resource to assist if needed as well.
@xmudrii I think you'll need the image yaml file, just with an empty dmap dict |
@dims Done, PTAL. |
/hold cancel |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: dims, xmudrii The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/lgtm |
@@ -46,6 +46,7 @@ STAGING_PROJECTS=( | |||
cluster-api | |||
cluster-api-aws | |||
cluster-api-azure | |||
cluster-api-do |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@detiber Why are some "cluster-api" and others "capi" ? Is there a principle as to which to use?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it's related to the max length of the names, but I'm not sure if it's related to GCR names or GCS Bucket ones?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it's related to the max length of the names, but I'm not sure if it's related to GCR names or GCS Bucket ones?
Yes, I believe the same. cluster-api-do
is less than 18 characters, so I went with that name.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@bartsmykla is correct, the main reason for the bifurcation was due to character length. We'll work to unify the naming as we work on the proposal for nesting.
registries: | ||
- name: gcr.io/k8s-staging-cluster-api-do | ||
src: true | ||
- name: us.gcr.io/k8s-artifacts-prod/cluster-api-do |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@detiber Have you given thought to "nesting" of cluster-api in GCR-space?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@thockin It seems like there is some discussion ongoing here #658 (comment). However, I believe that is out of the scope of this PR and out of the scope for CAPI-DO maintainers.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Before we actuate this - I have questions on name.
@xmudrii once the bucket has been created it should be all ready for use now. Will reach out over slack to point you towards the automation of how we are building images and pushing to staging for other providers today. |
Add a staging GCR bucket for cluster-api-provider-digitalocean.