Skip to content

cert-manager apiversion to v1 #2189

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged

Conversation

cw-sakamoto
Copy link
Contributor

Signed-off-by: cw-sakamoto [email protected]

Issue

Description

I recreate PR for aws/eks-charts#579.

Checklist

  • Added tests that cover your change (if possible)
  • Added/modified documentation as required (such as the README.md, or the docs directory)
  • Manually tested
  • Made sure the title of the PR is a good description that can go into the release notes

BONUS POINTS checklist: complete for good vibes and maybe prizes?! 🤯

  • Backfilled missing tests for code in same general area 🎉
  • Refactored something and made the world a better place 🌟

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Aug 22, 2021
@k8s-ci-robot
Copy link
Contributor

Hi @cw-sakamoto. Thanks for your PR.

I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Aug 22, 2021
@k8s-ci-robot k8s-ci-robot added the size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. label Aug 22, 2021
@codecov-commenter
Copy link

codecov-commenter commented Aug 22, 2021

Codecov Report

Merging #2189 (1ef574c) into main (1eb373b) will not change coverage.
The diff coverage is n/a.

Impacted file tree graph

@@           Coverage Diff           @@
##             main    #2189   +/-   ##
=======================================
  Coverage   53.55%   53.55%           
=======================================
  Files         136      136           
  Lines        7607     7607           
=======================================
  Hits         4074     4074           
  Misses       3217     3217           
  Partials      316      316           

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 1eb373b...1ef574c. Read the comment docs.

Copy link
Collaborator

@kishorj kishorj left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We'd also need to modify the installation guide to install the correct version of the cert-manager. Also need to change config/certmanager/certificate.yaml

@kishorj
Copy link
Collaborator

kishorj commented Aug 25, 2021

/ok-to-test

@k8s-ci-robot k8s-ci-robot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. size/S Denotes a PR that changes 10-29 lines, ignoring generated files. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels Aug 25, 2021
@cw-sakamoto cw-sakamoto force-pushed the change_cert-manager_apiversion branch from cb5891e to 34f7c26 Compare August 27, 2021 03:37
@cw-sakamoto
Copy link
Contributor Author

@kishorj
I have modified the files related to cert-manager, please check them.

Copy link
Collaborator

@kishorj kishorj left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have a concern regarding setups with existing cert-manager installation. If we can address the issue I've commented below, I feel comfortable to include the changes as part of next release.

@@ -142,7 +142,7 @@ data:
tls.crt: {{ $tls.clientCert }}
tls.key: {{ $tls.clientKey }}
{{- else }}
apiVersion: cert-manager.io/v1alpha2
apiVersion: cert-manager.io/v1
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Customers with old cert-manager setup will not be able to upgrade to the new load balancer controller chart since the old setup doesn't recognize v1 version. This will confuse the end users.

Is it possible to use .Capabilities.APIVersions.Has to use v1 only if support is available?

Copy link
Contributor Author

@cw-sakamoto cw-sakamoto Sep 8, 2021

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It can be done as follows, but --validate is required if we want to use CRD apiversion for .Capabilities.APIVersions.Has.

ef83d66

helm template aws-load-balancer-controller ./aws-load-balancer-controller -f settings.yaml -n kube-system --validate

@kishorj kishorj added the tide/merge-method-squash Denotes a PR that should be squashed by tide when it merges. label Sep 8, 2021
@k8s-ci-robot k8s-ci-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Sep 29, 2021
@k8s-ci-robot k8s-ci-robot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Sep 29, 2021
@kishorj
Copy link
Collaborator

kishorj commented Oct 4, 2021

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Oct 4, 2021
@kishorj
Copy link
Collaborator

kishorj commented Oct 4, 2021

/approve

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: cw-sakamoto, kishorj

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Oct 4, 2021
@k8s-ci-robot k8s-ci-robot merged commit 1167abe into kubernetes-sigs:main Oct 5, 2021
@cw-sakamoto cw-sakamoto deleted the change_cert-manager_apiversion branch October 5, 2021 02:37
Timothy-Dougherty pushed a commit to adammw/aws-load-balancer-controller that referenced this pull request Nov 9, 2023
* cert-manager apiversion to v1

Signed-off-by: cw-sakamoto <[email protected]>

* Add .Capabilities.APIVersions.Has for cert-manager template

Signed-off-by: cw-sakamoto <[email protected]>

* modify for cert-manager helm template

Signed-off-by: cw-sakamoto <[email protected]>

Co-authored-by: Kishor Joshi <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. size/S Denotes a PR that changes 10-29 lines, ignoring generated files. tide/merge-method-squash Denotes a PR that should be squashed by tide when it merges.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants