Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug 1801415: Migrate extensions/v1beta1 -> networking.k8s.io/v1beta1 #83

Merged

Conversation

ironcladlou
Copy link
Contributor

@openshift-ci-robot
Copy link
Contributor

@ironcladlou: This pull request references Bugzilla bug 1801415, which is valid. The bug has been moved to the POST state. The bug has been updated to refer to the pull request using the external bug tracker.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target release (4.5.0) matches configured target release for branch (4.5.0)
  • bug is in the state NEW, which is one of the valid states (NEW, ASSIGNED, ON_DEV, POST, POST)

In response to this:

Bug 1801415: Migrate extensions/v1beta1 -> networking.k8s.io/v1beta1

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci-robot openshift-ci-robot added the bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. label Mar 30, 2020
@Miciah
Copy link
Contributor

Miciah commented Mar 31, 2020

Do we need to convert objects using the old API, as kubernetes/ingress-nginx@84102ee#diff-ece58b3bebec02a6d3173c8d8099d298R904-R939 does?

@ironcladlou
Copy link
Contributor Author

cc @deads2k @sttts @mfojtik can you help us understand what else we might need to do here (#83 (comment))?

@@ -514,7 +514,7 @@ func newRouteForIngress(
Labels: ingress.Labels,
Annotations: ingress.Annotations,
OwnerReferences: []metav1.OwnerReference{
{APIVersion: "extensions/v1beta1", Kind: "Ingress", Controller: &t, Name: ingress.Name, UID: ingress.UID},
{APIVersion: "networking.k8s.io/v1beta1", Kind: "Ingress", Controller: &t, Name: ingress.Name, UID: ingress.UID},
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

what about existing objects with this owner ref?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

what about existing objects with this owner ref?

They will still be fine until the old API is gone entirely, so you just have to scan for and update them.

@deads2k
Copy link
Contributor

deads2k commented Apr 1, 2020

Do we need to convert objects using the old API, as kubernetes/ingress-nginx@84102ee#diff-ece58b3bebec02a6d3173c8d8099d298R904-R939 does?

In repos that you own, yes you do. kubectl convert may be able to do it for you.

@ironcladlou
Copy link
Contributor Author

@deads2k

Do we need to convert objects using the old API, as kubernetes/ingress-nginx@84102ee#diff-ece58b3bebec02a6d3173c8d8099d298R904-R939 does?

In repos that you own, yes you do. kubectl convert may be able to do it for you.

I'm not sure I asked my question very clearly. When the extensions API group finally "goes away", what exactly happens to the existing persisted resources in etcd? Must this controller (or some operator) be actively migrating the extensions API resources to the new API group to ensure that when the old API is gone forever there's nothing persisted in etcd with the old group?

@ironcladlou
Copy link
Contributor Author

@deads2k @sttts thoughts on #83 (comment)?

@sttts
Copy link
Contributor

sttts commented Apr 16, 2020

I'm not sure I asked my question very clearly. When the extensions API group finally "goes away", what exactly happens to the existing persisted resources in etcd? Must this controller (or some operator) be actively migrating the extensions API resources to the new API group to ensure that when the old API is gone forever there's nothing persisted in etcd with the old group?

Nothing to do for operators or other consumers about the persisted api version. The persisted objects will be migrated through kube-storage-version-migrator (which we have an operator for now due to etcd encryption). This must be done before kube-apiserver stops being able to read the old api group. I trust @soltysh to remind us when this must be done.

@ironcladlou
Copy link
Contributor Author

Looks like this is ready to go then as far as I can tell. cc @openshift/sig-network-edge

@frobware
Copy link

/lgtm

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Apr 17, 2020
@@ -8,8 +8,8 @@ import (

"k8s.io/klog"

"k8s.io/api/core/v1"
extensionsv1beta1 "k8s.io/api/extensions/v1beta1"
v1 "k8s.io/api/core/v1"

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Either drop v1 or rename to corev1.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fixed

@openshift-ci-robot openshift-ci-robot removed the lgtm Indicates that a PR is ready to be merged. label Apr 17, 2020
@Miciah
Copy link
Contributor

Miciah commented Apr 17, 2020

/lgtm

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Apr 17, 2020
@danehans
Copy link

imagestreams.image.openshift.io "pipeline" is forbidden: User "system:serviceaccount:ci:ci-operator" cannot get resource "imagestreams" in API group "image.openshift.io" in the namespace "ci-op-pb6fb9h4"

CI flake?

/retest

Copy link
Member

@soltysh soltysh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/approve
/retest

@openshift-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: frobware, ironcladlou, Miciah, soltysh

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci-robot openshift-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Apr 20, 2020
@openshift-merge-robot openshift-merge-robot merged commit 2090a08 into openshift:master Apr 20, 2020
@openshift-ci-robot
Copy link
Contributor

@ironcladlou: All pull requests linked via external trackers have merged: openshift/openshift-controller-manager#83. Bugzilla bug 1801415 has been moved to the MODIFIED state.

In response to this:

Bug 1801415: Migrate extensions/v1beta1 -> networking.k8s.io/v1beta1

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

9 participants