Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove deprecated podSpec field in favor of podTemplate 🛄 #1299

Merged

Conversation

vdemeester
Copy link
Member

Changes

We introduced podTemplate in last release to specify podSpec specific
field, and deprecated nodeSelector, tolerations and affinity.

This removes those deprecated fields.

Signed-off-by: Vincent Demeester vdemeest@redhat.com

Submitter Checklist

These are the criteria that every PR should meet, please check them off as you
review them:

See the contribution guide for more details.

Double check this list of stuff that's easy to miss:

Reviewer Notes

If API changes
are included, additive changes
must be approved by at least two OWNERS
and backwards incompatible changes
must be approved by more than 50% of the OWNERS,
and they must first be added
in a backwards compatible way.

Release Notes

Remove deprecated podSpec (nodeSelector, affinity and tolerations) fields in favor of podTemplate

@tekton-robot tekton-robot requested review from bobcatfish and a user September 11, 2019 15:09
@googlebot googlebot added the cla: yes Trying to make the CLA bot happy with ppl from different companies work on one commit label Sep 11, 2019
@tekton-robot
Copy link
Collaborator

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: vdemeester

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@tekton-robot tekton-robot added approved Indicates a PR has been approved by an approver from all required OWNERS files. size/L Denotes a PR that changes 100-499 lines, ignoring generated files. labels Sep 11, 2019
@vdemeester vdemeester added this to the Pipelines 0.7 🐱 milestone Sep 11, 2019
@tekton-robot
Copy link
Collaborator

The following is the coverage report on pkg/.
Say /test pull-tekton-pipeline-go-coverage to re-run this coverage report

File Old Coverage New Coverage Delta
pkg/reconciler/taskrun/resources/pod.go 89.0% 89.0% -0.1

@ghost
Copy link

ghost commented Sep 11, 2019

/lgtm

not sure why the tests are having a hard time with it

@vdemeester
Copy link
Member Author

@sbwsg I think I missed something 😅

We introduced `podTemplate` in last release to specify podSpec specific
field, and deprecated `nodeSelector`, `tolerations` and `affinity`.

This removes those deprecated fields.

Signed-off-by: Vincent Demeester <vdemeest@redhat.com>
@vdemeester vdemeester force-pushed the 1070-remove-deprecated-podspec-fields branch from 7268b02 to 9445a45 Compare September 12, 2019 07:52
@tekton-robot
Copy link
Collaborator

The following is the coverage report on pkg/.
Say /test pull-tekton-pipeline-go-coverage to re-run this coverage report

File Old Coverage New Coverage Delta
pkg/reconciler/pipelinerun/pipelinerun.go 82.2% 82.1% -0.1
pkg/reconciler/taskrun/resources/pod.go 89.0% 89.0% -0.1

@ghost
Copy link

ghost commented Sep 12, 2019

/lgtm

@tekton-robot tekton-robot assigned ghost Sep 12, 2019
@tekton-robot tekton-robot added the lgtm Indicates that a PR is ready to be merged. label Sep 12, 2019
@tekton-robot tekton-robot merged commit 5bb204e into tektoncd:master Sep 12, 2019
@vdemeester vdemeester deleted the 1070-remove-deprecated-podspec-fields branch September 12, 2019 15:04
@bobcatfish
Copy link
Collaborator

Fixes #1070

imjasonh added a commit to imjasonh/pipeline that referenced this pull request Feb 23, 2022
This picks up go-containerregistry PRs tektoncd#1299 and tektoncd#1300, which fix bugs
in auth config handling introduced since k8schain previously depended on
Kubenetes credentialprovider code.

These breakags affect auth configs where the registry string included
the URL scheme ("https://", "http://"), and when the string included the
registry path component ("/v1/" or "/v2/") -- these should be ignored,
and the broken code did not ignore them.
tekton-robot pushed a commit that referenced this pull request Feb 24, 2022
This picks up go-containerregistry PRs #1299 and #1300, which fix bugs
in auth config handling introduced since k8schain previously depended on
Kubenetes credentialprovider code.

These breakags affect auth configs where the registry string included
the URL scheme ("https://", "http://"), and when the string included the
registry path component ("/v1/" or "/v2/") -- these should be ignored,
and the broken code did not ignore them.
afrittoli pushed a commit to afrittoli/pipeline that referenced this pull request Feb 25, 2022
This picks up go-containerregistry PRs tektoncd#1299 and tektoncd#1300, which fix bugs
in auth config handling introduced since k8schain previously depended on
Kubenetes credentialprovider code.

These breakags affect auth configs where the registry string included
the URL scheme ("https://", "http://"), and when the string included the
registry path component ("/v1/" or "/v2/") -- these should be ignored,
and the broken code did not ignore them.
tekton-robot pushed a commit that referenced this pull request Feb 25, 2022
This picks up go-containerregistry PRs #1299 and #1300, which fix bugs
in auth config handling introduced since k8schain previously depended on
Kubenetes credentialprovider code.

These breakags affect auth configs where the registry string included
the URL scheme ("https://", "http://"), and when the string included the
registry path component ("/v1/" or "/v2/") -- these should be ignored,
and the broken code did not ignore them.
khrm pushed a commit to openshift/tektoncd-pipeline that referenced this pull request May 19, 2022
This picks up go-containerregistry PRs tektoncd#1299 and tektoncd#1300, which fix bugs
in auth config handling introduced since k8schain previously depended on
Kubenetes credentialprovider code.

These breakags affect auth configs where the registry string included
the URL scheme ("https://", "http://"), and when the string included the
registry path component ("/v1/" or "/v2/") -- these should be ignored,
and the broken code did not ignore them.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cla: yes Trying to make the CLA bot happy with ppl from different companies work on one commit lgtm Indicates that a PR is ready to be merged. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants