Skip to content
This repository was archived by the owner on Feb 22, 2022. It is now read-only.

cert-manager: fast-forward to upstream 3945595b#7644

Merged
k8s-ci-robot merged 2 commits intohelm:masterfrom
munnerz:cm-0.5-chart-draft
Sep 13, 2018
Merged

cert-manager: fast-forward to upstream 3945595b#7644
k8s-ci-robot merged 2 commits intohelm:masterfrom
munnerz:cm-0.5-chart-draft

Conversation

@munnerz
Copy link
Copy Markdown
Collaborator

@munnerz munnerz commented Sep 10, 2018

What this PR does / why we need it:

This PR should not be merged yet

This is a draft PR to update the Helm chart for the v0.5 cert-manager release.

I am opening it now ahead of time, as it involves a few larger changes than usual and I'd like to get review feedback ahead of cutting a release to ensure the PR can be accepted in its current form.

A breakdown of what is is included and corresponding PRs:

/hold
/cc @unguiculus

@k8s-ci-robot k8s-ci-robot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Sep 10, 2018
@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Sep 10, 2018
Copy link
Copy Markdown
Collaborator Author

@munnerz munnerz left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added a few comments to help with review!

Copy link
Copy Markdown
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These will both be bumped to v0.5

Copy link
Copy Markdown
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This change will be reverted and updated to v0.5.0 accordingly

Copy link
Copy Markdown
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This file is only created when generating static deployment manifests, and the updates here are to keep it in line with default Helm 2.10 behaviour (and the second one is to help with the webhook deployment, and is effectively a no-op as we also match on the 'name' label)

Copy link
Copy Markdown
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I noticed issues when adding the helm.sh/hook: crd-install hook with versions of Tiller that do not support the hook.

Copy link
Copy Markdown
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This means we drop support for cert-manager v0.2.0-v0.2.2 (iirc). In general, our rule is v0.4.x of the chart is compatible with v0.4.y of cert-manager (i.e. we do not pin the patch version of appVersion and version, but we do pin minor versions).

Copy link
Copy Markdown
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Will be updated to v0.5.0 and IfNotPresent

Copy link
Copy Markdown
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We disable the new webhook chart by default

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

can you add a test to validate when the webhook is true?

@cpanato
Copy link
Copy Markdown
Member

cpanato commented Sep 10, 2018

@munnerz please sign the DCO and

  • since you are introducing some new things please bump the minor version or move to 1.0.0, since this chart is in the stable folder and was discussed in the helm chart meeting last week that all charts in stable should be at least 1.0.0 and not 0.x.y

side question: why use a dev image?

@munnerz
Copy link
Copy Markdown
Collaborator Author

munnerz commented Sep 10, 2018

Hey @cpanato,

re: DCO - will do. I am just putting a few changes together for this PR (i.e. the image tags). As I say, still WIP 😄

... in the helm chart meeting last week that all charts in stable should be at least 1.0.0 and not 0.x.y

This goes against our own versioning strategy - as explained here #7644 (comment), to make user's lives easier, we pin our minor versions to each other so they can be sure that v0.4.x of the Helm chart works with (and deploys) v0.4.y of cert-manager. This makes users rolling back/forward far easier, and helps when users understand when they can and cannot use a simple helm upgrade cert-manager ... --set image.tag=v0.4.y.

We'd really like to not have to modify this behaviour, as I think it hurts usability and will generally just not help users at all.

As such, I'd like to request we can continue to use a v0.x.y format until cert-manager itself reaches (v1.0.0) (which will hopefully be within the next few months).

edit:

if not, I think it's best this chart is moved to incubator, or otherwise removed from stable so we can host it ourselves until cert-manager does reach 1.0

@cpanato
Copy link
Copy Markdown
Member

cpanato commented Sep 10, 2018

thanks so much for the clarification.

Can you set the title if the PR to say that is in WIP? like [WIP] cert-manager: fast-forward to upstream 3945595b

@munnerz munnerz changed the title cert-manager: fast-forward to upstream 3945595b WIP: cert-manager: fast-forward to upstream 3945595b Sep 10, 2018
* Update version numbers for v0.5.0 (cert-manager/cert-manager#885)
* added affinity and tolerations (cert-manager/cert-manager#869)
* Add validating webhook and webhook tls autoconfiguration (cert-manager/cert-manager#478)
* chart: annotate all CRDs with "crd-install" hook (cert-manager/cert-manager#823)
* helm chart: remove endpoints from rbac resources (cert-manager/cert-manager#769)

Signed-off-by: James Munnelly <james@munnelly.eu>
@munnerz
Copy link
Copy Markdown
Collaborator Author

munnerz commented Sep 10, 2018

I've updated the version numbers as mentioned in my above comments.

It'd be great if someone can verify the use of a subchart here is correct 😄

@munnerz munnerz changed the title WIP: cert-manager: fast-forward to upstream 3945595b cert-manager: fast-forward to upstream 3945595b Sep 10, 2018
@munnerz
Copy link
Copy Markdown
Collaborator Author

munnerz commented Sep 10, 2018

Removed the WIP designation - if someone could take a look, I can then go ahead and release v0.5 on our end 😄

@@ -0,0 +1,5 @@
apiVersion: v1
appVersion: "v0.5.0"
description: A Helm chart for Kubernetes
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

maybe add a better description of what that is.

restartPolicy: OnFailure
containers:
- name: ca-helper
image: quay.io/munnerz/apiextensions-ca-helper:canary
Copy link
Copy Markdown
Member

@cpanato cpanato Sep 10, 2018

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this image correct?

Copy link
Copy Markdown
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Updating to v0.1.0

Signed-off-by: James Munnelly <james@munnelly.eu>
@munnerz
Copy link
Copy Markdown
Collaborator Author

munnerz commented Sep 10, 2018

Addressed comments @cpanato

@mattfarina mattfarina added the Contribution Allowed If the contributor has signed the DCO or the CNCF CLA (prior to the move to a DCO). label Sep 11, 2018
@cpanato
Copy link
Copy Markdown
Member

cpanato commented Sep 11, 2018

@munnerz test failed because the image does not exist in quay

@munnerz
Copy link
Copy Markdown
Collaborator Author

munnerz commented Sep 12, 2018

I've now cut the v0.5.0 release, so docker images should be available now!

This should be good to go 😄

/retest
/hold cancel

@k8s-ci-robot k8s-ci-robot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Sep 12, 2018
@munnerz
Copy link
Copy Markdown
Collaborator Author

munnerz commented Sep 12, 2018

@mattfarina looks like the dco-labeler is not working - could you give it a kick? I am not too sure what events you have configured the labeler bot to listen for so not sure how to trigger it myself!

@cpanato
Copy link
Copy Markdown
Member

cpanato commented Sep 13, 2018

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Sep 13, 2018
@k8s-ci-robot
Copy link
Copy Markdown
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: cpanato, munnerz

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@cpanato
Copy link
Copy Markdown
Member

cpanato commented Sep 13, 2018

/check-cla

@cpanato
Copy link
Copy Markdown
Member

cpanato commented Sep 13, 2018

/check-dco

@ey-bot ey-bot added the Contribution Allowed If the contributor has signed the DCO or the CNCF CLA (prior to the move to a DCO). label Sep 13, 2018
@munnerz
Copy link
Copy Markdown
Collaborator Author

munnerz commented Sep 13, 2018

Thanks @cpanato! I will remember the incantation for next time 😄

@cpanato
Copy link
Copy Markdown
Member

cpanato commented Sep 13, 2018

/retest

@cpanato
Copy link
Copy Markdown
Member

cpanato commented Sep 13, 2018

saw this error

Error: customresourcedefinitions.apiextensions.k8s.io "certificates.certmanager.k8s.io" already exists

should we provide a test input to change that? how was it done in the past?

@mattfarina

@cpanato
Copy link
Copy Markdown
Member

cpanato commented Sep 13, 2018

@munnerz maybe you can add a test values.yaml to set the createCustomResource: true to false

@munnerz
Copy link
Copy Markdown
Collaborator Author

munnerz commented Sep 13, 2018

I think that'd work in this instance, but is surely a temporary workaround?

I see two reasons for that error:

  1. cert-manager is being used in the test cluster for some other purpose already, meaning the CRD exists (seems unlikely)
  2. a previous helm install half succeeded (i.e. created the CRD resource), but eventually failed, meaning helm delete was not run (thus leaving the CRD installed).

Perhaps I am wrong 😄 setting createCustomResource: false would work, until that test cluster is rebuilt and the CRD is removed.

I've not run into this problem before, which leads me to think this is caused by (2) 😄

@cpanato
Copy link
Copy Markdown
Member

cpanato commented Sep 13, 2018

lets try a retest again 😄

/retest

@cpanato
Copy link
Copy Markdown
Member

cpanato commented Sep 13, 2018

Then if the delete failed or did not run for any reason, we will need someone from the inside to make some cleanup

@mattfarina
Copy link
Copy Markdown
Contributor

/retest

@k8s-ci-robot k8s-ci-robot merged commit e0505bb into helm:master Sep 13, 2018
@mattfarina
Copy link
Copy Markdown
Contributor

The issue is that the CRDs were not cleaned up, for some reason, in the test cluster on a previous run.

@cpanato
Copy link
Copy Markdown
Member

cpanato commented Sep 13, 2018

@mattfarina thanks for fixing/cleaning

@Antiarchitect
Copy link
Copy Markdown
Contributor

Antiarchitect commented Sep 17, 2018

I have an issue that CRD's are not created at all.
Upgrading from 0.3.1 to 0.5.0 and having latest Tiller:

Client: &version.Version{SemVer:"v2.10.0", GitCommit:"9ad53aac42165a5fadc6c87be0dea6b115f93090", GitTreeState:"clean"}
Server: &version.Version{SemVer:"v2.10.0", GitCommit:"9ad53aac42165a5fadc6c87be0dea6b115f93090", GitTreeState:"clean"}

I have this while deploying:

Error: UPGRADE FAILED: unable to recognize "": no matches for kind "ClusterIssuer" in version "certmanager.k8s.io/v1alpha1"

@munnerz

jicowan pushed a commit to jicowan/charts that referenced this pull request Oct 2, 2018
* cert-manager: fast-forward to upstream bcffc635

* Update version numbers for v0.5.0 (cert-manager/cert-manager#885)
* added affinity and tolerations (cert-manager/cert-manager#869)
* Add validating webhook and webhook tls autoconfiguration (cert-manager/cert-manager#478)
* chart: annotate all CRDs with "crd-install" hook (cert-manager/cert-manager#823)
* helm chart: remove endpoints from rbac resources (cert-manager/cert-manager#769)

Signed-off-by: James Munnelly <james@munnelly.eu>

* Update image tag and add description

Signed-off-by: James Munnelly <james@munnelly.eu>
Signed-off-by: jenkin-x <jicowan@hotmail.com>
Jnig pushed a commit to Jnig/charts that referenced this pull request Nov 13, 2018
* cert-manager: fast-forward to upstream bcffc635

* Update version numbers for v0.5.0 (cert-manager/cert-manager#885)
* added affinity and tolerations (cert-manager/cert-manager#869)
* Add validating webhook and webhook tls autoconfiguration (cert-manager/cert-manager#478)
* chart: annotate all CRDs with "crd-install" hook (cert-manager/cert-manager#823)
* helm chart: remove endpoints from rbac resources (cert-manager/cert-manager#769)

Signed-off-by: James Munnelly <james@munnelly.eu>

* Update image tag and add description

Signed-off-by: James Munnelly <james@munnelly.eu>
Signed-off-by: Jakob Niggel <info@jakobniggel.de>
@eldondevat
Copy link
Copy Markdown

@Antiarchitect are you still encountering this bug, I believe I am, too. Did you ever find a workaround?

wgiddens pushed a commit to wgiddens/charts that referenced this pull request Jan 18, 2019
* cert-manager: fast-forward to upstream bcffc635

* Update version numbers for v0.5.0 (cert-manager/cert-manager#885)
* added affinity and tolerations (cert-manager/cert-manager#869)
* Add validating webhook and webhook tls autoconfiguration (cert-manager/cert-manager#478)
* chart: annotate all CRDs with "crd-install" hook (cert-manager/cert-manager#823)
* helm chart: remove endpoints from rbac resources (cert-manager/cert-manager#769)

Signed-off-by: James Munnelly <james@munnelly.eu>

* Update image tag and add description

Signed-off-by: James Munnelly <james@munnelly.eu>
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. Contribution Allowed If the contributor has signed the DCO or the CNCF CLA (prior to the move to a DCO). lgtm Indicates that a PR is ready to be merged.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants