Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: Support Kubernetes v1.24. Fixes #8320 #9620

Merged
merged 18 commits into from
Oct 19, 2022
Merged

fix: Support Kubernetes v1.24. Fixes #8320 #9620

merged 18 commits into from
Oct 19, 2022

Conversation

alexec
Copy link
Contributor

@alexec alexec commented Sep 19, 2022

Signed-off-by: Alex Collins [email protected]

Fixes #8320

Changes:

  • Update Github Actions to use a good looking action for K3S, running latest K3S.
  • Reduced build time by 3m.
  • Added diagnostics to builds.

@terrytangyuan
Copy link
Member

Will continue the work in #9680

@terrytangyuan terrytangyuan deleted the fix-8320 branch September 25, 2022 00:43
@alexec alexec restored the fix-8320 branch October 11, 2022 01:14
@alexec alexec deleted the fix-8320 branch October 11, 2022 01:14
@alexec alexec restored the fix-8320 branch October 11, 2022 14:43
@alexec alexec reopened this Oct 11, 2022
@alexec
Copy link
Contributor Author

alexec commented Oct 14, 2022

We're getting close!

@alexec alexec marked this pull request as ready for review October 15, 2022 15:27
@alexec alexec enabled auto-merge (squash) October 15, 2022 15:27
@alexec
Copy link
Contributor Author

alexec commented Oct 15, 2022

Phew. That was epic.

Copy link
Member

@terrytangyuan terrytangyuan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks! LGTM overall. Just a couple of small comments. We should also test this to make sure it still works in older versions of k8s.

docs/manually-create-secrets.md Outdated Show resolved Hide resolved
.github/workflows/ci-build.yaml Outdated Show resolved Hide resolved
Signed-off-by: Alex Collins <[email protected]>
Signed-off-by: Alex Collins <[email protected]>
Signed-off-by: Alex Collins <[email protected]>
Signed-off-by: Alex Collins <[email protected]>
Signed-off-by: Alex Collins <[email protected]>
Signed-off-by: Alex Collins <[email protected]>
Signed-off-by: Alex Collins <[email protected]>
@@ -59,7 +59,7 @@ jobs:
name: E2E Tests
runs-on: ubuntu-latest
timeout-minutes: 25
needs: [ tests, argoexec-image ]
needs: [ argoexec-image ]
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

argoexec-image is 3m faster than tests, so this speeds up the build by 3m


port=$1

lsof -s TCP:LISTEN -i ":$port" | grep -v PID | awk '{print $2}' | xargs -L 1 kill || true
pids=$(lsof -t -s TCP:LISTEN -i ":$port" || true)
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this wrote a lot of errors on linux

alexec and others added 7 commits October 16, 2022 09:07
M  .github/workflows/ci-build.yaml
M  hack/free-port.sh

Signed-off-by: Alex Collins <[email protected]>
Signed-off-by: Alex Collins <[email protected]>
Signed-off-by: Alex Collins <[email protected]>
Signed-off-by: Alex Collins <[email protected]>
Signed-off-by: Alex Collins <[email protected]>
Signed-off-by: Alex Collins <[email protected]>
@alexec
Copy link
Contributor Author

alexec commented Oct 17, 2022

@terrytangyuan green!

@terrytangyuan
Copy link
Member

Actually just one last failing test!

@@ -86,7 +86,19 @@ jobs:
profile: minimal
- test: test-python-sdk
profile: minimal
- test: test-executor
install_k3s_version: v1.21.2+k3s1
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hmm this is not right?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is the version were running

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We should be testing 1.24

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It defaults to latest (v1.25 ATM). These are for testing backwards compatibility.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I see. Can we rename these tests to differentiate them from the existing ones? It might be better to explicitly set the version so that we know what change breaks the tests?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes/no. I wast trying to avoid forcing all the required checks to be changed. That impacts all PRs, which would need to be synced with master.

Using latest reduces maintenance, we don’t need to update it.


This option is simpler than option 2, as you can combine creating the secret with making it discoverable by name.

## Option 2 - Discovery By Annotation
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

are we going to support both options? I didn't code for it. Will k8s automatically support this?

Copy link
Contributor Author

@alexec alexec Oct 18, 2022

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is only if there are long service account names, or secret already exists.

Copy link
Member

@terrytangyuan terrytangyuan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. @sarabala1979 Take another look?

@alexec alexec merged commit 36646ef into master Oct 19, 2022
@alexec alexec deleted the fix-8320 branch October 19, 2022 01:05
juchaosong pushed a commit to juchaosong/argo-workflows that referenced this pull request Nov 3, 2022
Signed-off-by: Alex Collins <[email protected]>
Signed-off-by: Alex Collins <[email protected]>
Signed-off-by: juchao <[email protected]>
@agilgur5 agilgur5 added area/api Argo Server API area/server area/controller Controller issues, panics area/sso-rbac labels Jul 13, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/api Argo Server API area/controller Controller issues, panics area/server area/sso-rbac
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Kubernetes 1.24: Token-handling code assumes auto-created service account token secrets
5 participants