Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: allow to don't use helm hooks for CSIDriver creation #1074

Merged
merged 1 commit into from
Sep 24, 2024

Conversation

woehrl01
Copy link
Contributor

@woehrl01 woehrl01 commented Jul 26, 2023

Is this a bug fix or adding new feature?

Fixes #765
Fixes #325

What is this PR about? / Why do we need it?

According to how external tools are executing the hooks, there can be a possibility that the CSIDriver gets deleted but never created. This PR adds a flag, so that the CSIDriver can be added without using helm hooks. This has the benefit that the Csidriver doesn't gets constantly recreated on each update of the chart (which doesn't make scene, imho)

Adds a flag useHelmHooksForCSIDriver to Values, which can be used to disable usage of hooks.

Currently, does not change the default behaviour to not impact existing users.

What testing is done?

Verified that the sources does not show up as deleted

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Jul 26, 2023
@k8s-ci-robot
Copy link
Contributor

Welcome @woehrl01!

It looks like this is your first PR to kubernetes-sigs/aws-efs-csi-driver 🎉. Please refer to our pull request process documentation to help your PR have a smooth ride to approval.

You will be prompted by a bot to use commands during the review process. Do not be afraid to follow the prompts! It is okay to experiment. Here is the bot commands documentation.

You can also check if kubernetes-sigs/aws-efs-csi-driver has its own contribution guidelines.

You may want to refer to our testing guide if you run into trouble with your tests not passing.

If you are having difficulty getting your pull request seen, please follow the recommended escalation practices. Also, for tips and tricks in the contribution process you may want to read the Kubernetes contributor cheat sheet. We want to make sure your contribution gets all the attention it needs!

Thank you, and welcome to Kubernetes. 😃

@k8s-ci-robot
Copy link
Contributor

Hi @woehrl01. Thanks for your PR.

I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added the size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. label Jul 26, 2023
@clarifai-fmarceau
Copy link

clarifai-fmarceau commented Aug 3, 2023

We're affected by this issue as well, thank you @woehrl01 for making a PR. @justinsb @mskanth972 is there any chance that one of you can review this soon !?

@Ashley-wenyizha
Copy link
Contributor

/ok-to-test

@k8s-ci-robot k8s-ci-robot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Aug 18, 2023
@yuriydzobak
Copy link

Hi @mskanth972 @jqmichael
Please, Could you review/approve the PR?
Thank you in advance

@yuriydzobak
Copy link

Hi @mskanth972 @jqmichael Please, Could you review/approve the PR? Thank you in advance

ping

@k8s-triage-robot
Copy link

The Kubernetes project currently lacks enough contributors to adequately respond to all PRs.

This bot triages PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the PR is closed

You can:

  • Mark this PR as fresh with /remove-lifecycle stale
  • Close this PR with /close
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Jan 21, 2024
@woehrl01
Copy link
Contributor Author

/remove-lifecycle stale

@k8s-ci-robot k8s-ci-robot removed the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Jan 22, 2024
@k8s-triage-robot
Copy link

The Kubernetes project currently lacks enough contributors to adequately respond to all PRs.

This bot triages PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the PR is closed

You can:

  • Mark this PR as fresh with /remove-lifecycle stale
  • Close this PR with /close
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Apr 21, 2024
@woehrl01
Copy link
Contributor Author

/remove-lifecycle

@k8s-triage-robot
Copy link

The Kubernetes project currently lacks enough active contributors to adequately respond to all PRs.

This bot triages PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the PR is closed

You can:

  • Mark this PR as fresh with /remove-lifecycle rotten
  • Close this PR with /close
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/lifecycle rotten

@k8s-ci-robot k8s-ci-robot added lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels May 21, 2024
@z0rc
Copy link

z0rc commented Jun 8, 2024

/remove-lifecycle rotten

@k8s-ci-robot k8s-ci-robot removed the lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. label Jun 8, 2024
@josh-ferrell
Copy link

@nckturner Do you know if this can be assigned to someone to take a look at it?

@chrissnell
Copy link

Can somebody take a look at this? This issue caused a huge outage for us and we need this feature.

@mskanth972
Copy link
Contributor

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Sep 11, 2024
@mskanth972
Copy link
Contributor

@woehrl01 can you get EasyCLA authorization?

@woehrl01
Copy link
Contributor Author

@mskanth972 sure, I just don't know which link to click, according to the wiki there should be one on the pr.

@chrissnell
Copy link

@mskanth972 looks like the EasyCLA bot is not running here

@k8s-ci-robot k8s-ci-robot removed the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Sep 11, 2024
@woehrl01
Copy link
Contributor Author

/check-cla

@woehrl01
Copy link
Contributor Author

@mskanth972 Looks like a rebase + checking the cla was enough, can you please have another look? Thanks!

@chrissnell
Copy link

chrissnell commented Sep 11, 2024

@mskanth972 tests are failing but they don't appear to be related to @woehrl01 's work:

43.19 	cargo is needed by amazon-efs-utils-2.0.4-2.amzn2.x86_64
43.19 	rust is needed by amazon-efs-utils-2.0.4-2.amzn2.x86_64

@mskanth972
Copy link
Contributor

We have the fix for it here(aws/efs-utils#237) which is merged but needs to release a new tag/release for efs-utils so that driver can pick the change. We have a plan of bundling one more feature request with this new release, so the reason for delay. The ECD for new driver version with this fix will be 09/20 and for Addons will be 09/27.

@chrissnell
Copy link

We have the fix for it here(aws/efs-utils#237) which is merged but needs to release a new tag/release for efs-utils so that driver can pick the change. We have a plan of bundling one more feature request with this new release, so the reason for delay. The ECD for new driver version with this fix will be 09/20 and for Addons will be 09/27.

Are you referring to the fix for the automated tests, or @woehrl01 's fix for the Helm chart hooks? The hooks issue is the big one for my company, obviously. Can we expect a fix for the hooks on 9/27?

@mskanth972
Copy link
Contributor

mskanth972 commented Sep 11, 2024

We have the fix for it here(aws/efs-utils#237) which is merged but needs to release a new tag/release for efs-utils so that driver can pick the change. We have a plan of bundling one more feature request with this new release, so the reason for delay. The ECD for new driver version with this fix will be 09/20 and for Addons will be 09/27.

Are you referring to the fix for the automated tests, or @woehrl01 's fix for the Helm chart hooks? The hooks issue is the big one for my company, obviously. Can we expect a fix for the hooks on 9/27?

The ECD is same for all the PRs which are waiting on release(build and hooks issue) i.e., 9/27 Addons.

@mskanth972
Copy link
Contributor

/retest

@woehrl01
Copy link
Contributor Author

Failing test is not related to my changes.

@jrakas-dev
Copy link
Contributor

@woehrl01, could you please rebase your PR to re-trigger the tests? The fix for build issue has been resolved.

@mskanth972
Copy link
Contributor

/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Sep 24, 2024
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: mskanth972, woehrl01

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Sep 24, 2024
@k8s-ci-robot k8s-ci-robot merged commit 1e9c794 into kubernetes-sigs:master Sep 24, 2024
6 checks passed
@jrakas-dev jrakas-dev mentioned this pull request Sep 26, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.
Projects
None yet