Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We鈥檒l occasionally send you account related emails.

Already on GitHub? Sign in to your account

馃尡 adopt manifests for kustomize v5 #1353

Merged
merged 1 commit into from Sep 15, 2023

Conversation

LittleChimera
Copy link
Contributor

@LittleChimera LittleChimera commented Sep 7, 2023

What this PR does / why we need it:

building kustomize layers with kustomize v5 outputs warnings of deprecation

$ kustomize build default/ > render/capm3.yaml 
# Warning: 'bases' is deprecated. Please use 'resources' instead. Run 'kustomize edit fix' to update your Kustomization automatically.
# Warning: 'patchesStrategicMerge' is deprecated. Please use 'patches' instead. Run 'kustomize edit fix' to update your Kustomization automatically.
# Warning: 'vars' is deprecated. Please use 'replacements' instead. [EXPERIMENTAL] Run 'kustomize edit fix' to update your Kustomization automatically.
# Warning: 'patchesStrategicMerge' is deprecated. Please use 'patches' instead. Run 'kustomize edit fix' to update your Kustomization automatically.

@metal3-io-bot metal3-io-bot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Sep 7, 2023
@metal3-io-bot
Copy link
Contributor

Hi @LittleChimera. Thanks for your PR.

I'm waiting for a metal3-io member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@metal3-io-bot metal3-io-bot added the size/L Denotes a PR that changes 100-499 lines, ignoring generated files. label Sep 7, 2023
@tuminoid
Copy link
Member

tuminoid commented Sep 8, 2023

/ok-to-test

@metal3-io-bot metal3-io-bot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Sep 8, 2023
@tuminoid
Copy link
Member

tuminoid commented Sep 8, 2023

Possibly related: #1304
/cc @lentzi90

Copy link
Member

@lentzi90 lentzi90 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for working on this!
I have been working upstream with kustomize and kubebuilder in kubernetes-sigs/kustomize#5049 and kubernetes-sigs/kubebuilder#3539 to get this fixed at the source. I believe we will end up removing the CA injection patches and just rely on replacements to set the annotations. However, I'm happy to take this in while still figuring out the details upstream. (We don't have the issue of multiple patches in one file, since we have the mutating webhook patch commented out.) When we reach a conclusion upstream I will also try to propagate it here to keep things consistent.

/lgtm


# [CERTMANAGER] To enable cert-manager, uncomment all sections with 'CERTMANAGER'.
# Uncomment 'CERTMANAGER' sections in crd/kustomization.yaml to enable the CA injection in the admission webhooks.
# 'CERTMANAGER' needs to be enabled to use ca injection
- webhookcainjection_patch.yaml
- path: webhookcainjection_patch.yaml
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A note for the future: This one will work as it is, but if we at some point want to enable to mutating webhook (which is now in the same file but commented out) then it will break as long as kubernetes-sigs/kustomize#5049 is unresolved.
It is easy to fix though so no need to worry about it. Just split the patch into two files.

@metal3-io-bot metal3-io-bot added the lgtm Indicates that a PR is ready to be merged. label Sep 8, 2023
@lentzi90
Copy link
Member

lentzi90 commented Sep 8, 2023

/test-centos-e2e-integration-main
/test-ubuntu-integration-main

@LittleChimera
Copy link
Contributor Author

@lentzi90 seems like you also solved the same issue in your PR. If you're close to merging, it's probably easier to just close this one. Thanks for the quick response 馃檹

@lentzi90
Copy link
Member

lentzi90 commented Sep 8, 2023

No no I'm happy to take this. This will make it easier for me to progress with what I was actually trying to do, i.e. reorganize and add Kustomize Components 馃檪

@LittleChimera
Copy link
Contributor Author

Can we merge this?

@lentzi90
Copy link
Member

Yes let's get an approver to look at it!
/assign @kashifest

@kashifest
Copy link
Member

/approve

@metal3-io-bot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: kashifest

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@metal3-io-bot metal3-io-bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Sep 15, 2023
@metal3-io-bot metal3-io-bot merged commit d922077 into metal3-io:main Sep 15, 2023
10 checks passed
@kashifest kashifest changed the title 鈿狅笍 adopt manifests for kustomize v5 馃尡 adopt manifests for kustomize v5 Sep 28, 2023
@LittleChimera LittleChimera deleted the kustomize-manifests-v5 branch October 28, 2023 21:16
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants