-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove deprecated podSpec field in favor of podTemplate 🛄 #1299
Remove deprecated podSpec field in favor of podTemplate 🛄 #1299
Conversation
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: vdemeester The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
The following is the coverage report on pkg/.
|
/lgtm not sure why the tests are having a hard time with it |
@sbwsg I think I missed something 😅 |
We introduced `podTemplate` in last release to specify podSpec specific field, and deprecated `nodeSelector`, `tolerations` and `affinity`. This removes those deprecated fields. Signed-off-by: Vincent Demeester <[email protected]>
7268b02
to
9445a45
Compare
The following is the coverage report on pkg/.
|
/lgtm |
Fixes #1070 |
This picks up go-containerregistry PRs tektoncd#1299 and tektoncd#1300, which fix bugs in auth config handling introduced since k8schain previously depended on Kubenetes credentialprovider code. These breakags affect auth configs where the registry string included the URL scheme ("https://", "http://"), and when the string included the registry path component ("/v1/" or "/v2/") -- these should be ignored, and the broken code did not ignore them.
This picks up go-containerregistry PRs #1299 and #1300, which fix bugs in auth config handling introduced since k8schain previously depended on Kubenetes credentialprovider code. These breakags affect auth configs where the registry string included the URL scheme ("https://", "http://"), and when the string included the registry path component ("/v1/" or "/v2/") -- these should be ignored, and the broken code did not ignore them.
This picks up go-containerregistry PRs tektoncd#1299 and tektoncd#1300, which fix bugs in auth config handling introduced since k8schain previously depended on Kubenetes credentialprovider code. These breakags affect auth configs where the registry string included the URL scheme ("https://", "http://"), and when the string included the registry path component ("/v1/" or "/v2/") -- these should be ignored, and the broken code did not ignore them.
This picks up go-containerregistry PRs #1299 and #1300, which fix bugs in auth config handling introduced since k8schain previously depended on Kubenetes credentialprovider code. These breakags affect auth configs where the registry string included the URL scheme ("https://", "http://"), and when the string included the registry path component ("/v1/" or "/v2/") -- these should be ignored, and the broken code did not ignore them.
This picks up go-containerregistry PRs tektoncd#1299 and tektoncd#1300, which fix bugs in auth config handling introduced since k8schain previously depended on Kubenetes credentialprovider code. These breakags affect auth configs where the registry string included the URL scheme ("https://", "http://"), and when the string included the registry path component ("/v1/" or "/v2/") -- these should be ignored, and the broken code did not ignore them.
Changes
We introduced
podTemplate
in last release to specify podSpec specificfield, and deprecated
nodeSelector
,tolerations
andaffinity
.This removes those deprecated fields.
Signed-off-by: Vincent Demeester [email protected]
Submitter Checklist
These are the criteria that every PR should meet, please check them off as you
review them:
See the contribution guide for more details.
Double check this list of stuff that's easy to miss:
cmd
dir, please updatethe release Task and TaskRun to build and release this image
Reviewer Notes
If API changes
are included, additive changes
must be approved by at least two OWNERS
and backwards incompatible changes
must be approved by more than 50% of the OWNERS,
and they must first be added
in a backwards compatible way.
Release Notes