-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
update kube-webhook-certgen to v1.5.1 #9557
update kube-webhook-certgen to v1.5.1 #9557
Conversation
|
This issue is currently awaiting triage. If Ingress contributors determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Welcome @arikgrahl! |
Hi @arikgrahl. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
We have our own fork of kube web certgen. Please check images/ folder |
Thanks for pointing out the fork.
In the latest version of the ingress-nginx helm chart, the image The endpoint https://registry.k8s.io/v2/ingress-nginx/kube-webhook-certgen/tags/list lists the newer tag |
@arikgrahl Please rebase your PR and sign the CLA. thank you for your work on this. Tracking and keeping all of our images up to date is not an easy task so we appreciate this work. -James |
3d2d773
to
9f3b5a0
Compare
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: arikgrahl The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
9f3b5a0
to
eeae93d
Compare
eeae93d
to
5dbaa8d
Compare
5dbaa8d
to
0c5151c
Compare
I have rebased my PR. In that course I also fixed the email address in the commit so that the CLA check for the previously signed CLA passed as well. Thank you for pointing this out! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/ok-to-test
/hold
There may be a reason for this image not being updated. I will think about the reason
@tao12345666333, any updates on this? To me it is unclear which exact upstream version is behind the tag This being said, the decision of accepting this PR will not be easier in the future without further background information about the image tags mentioned above. Thank you in advance! |
I'm working on a 1.6.5 release this week, and I just upgraded all the images to golang 1.20 and alpine 3.17.2 So there be an even newer version of the cert image. We can close this issue in anticipation of the new release. Thank you, /close |
@strongjz: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@strongjz, thank you for this upcoming release, i am looking forward to it! However, the upcoming release will update components in the images folder, among others.
If I am not missing something, this means that the helm chart, for which this PR is aiming, will remain with the old version. Please reconsider including this minor update if I am not wrong. Thank you again for your work! |
@arikgrahl when a new kube-webhook-certen image is built by cloudbuild, it will be promoted to be published from the prod registry and the manifests that refer to the kube-webhook-certgen image will get a update on the tag and the digest. |
@longwuyuan, thank you for clarifying.
[
"sha256-2188def723c8fcb2635fbe54607ac3b4efba581c4fcc3d2279ec9c57da1b2f6f.sig",
"sha256-39c5b2e3310dc4264d638ad28d9d1d96c4cbb2b2dcfb52368fe4e3c63f61e10f.sig",
"sha256-4d99688e557396f5baa150e019ff7d5b7334f9b9f9a8dab64038c5c2a006f6b5.sig",
"sha256-549e71a6ca248c5abd51cdb73dbc3083df62cf92ed5e6147c780e30f7e007a47.sig",
"sha256-ccdb2382b53ed42fd76bfbff90a5b8a5815af0b3b8c6dfb9118a34770d9cac11.sig",
"v1.0",
"v1.1",
"v1.1.1",
"v1.2.0",
"v1.3.0",
"v20220916-gd32f8c343",
"v20221219-controller-v1.5.1-49-ge3e0d9c1f",
"v20221220-controller-v1.5.1-58-g787ea74b6"
] Still it remains unclear, where the actual images come from and which exact (upstream) version is behind the respective image tags. |
The explaining is long and complicated. For practical ends, be assured that regardless of tags you see, a documented & recommended will always get you the kube-webhook-certgen code bits that you need. There used to be a upstream. Now there is no upstream. We painfully forked and also carefully maintain the fork. Docs and users are user-facing but kube-webook-certgen is the woodworks, hence not much is needed except for it to work as expected. Latest is as James said. He will trigger build of a new kube-webhook-certgen and code will be updated to the new tag and digest. |
@longwuyuan, thank you so much for shedding light on this and patiently answering my questions! Thank you for the great work in this project, I appreciate it very much. |
🙏 community |
What this PR does / why we need it:
Types of changes
Which issue/s this PR fixes
–
How Has This Been Tested?
Checklist:
Does my pull request need a release note?