Skip to content

fix: enable multiple container hooks#9965

Open
mleddy-NS1 wants to merge 1 commit intoGoogleContainerTools:mainfrom
mleddy-NS1:fix-enable-multiple-container-hooks
Open

fix: enable multiple container hooks#9965
mleddy-NS1 wants to merge 1 commit intoGoogleContainerTools:mainfrom
mleddy-NS1:fix-enable-multiple-container-hooks

Conversation

@mleddy-NS1
Copy link

@mleddy-NS1 mleddy-NS1 commented Feb 1, 2026

Fixes: #8356
Related: #9076

Description

Currently container deploy hooks only execute the first element from the list of post deploy hooks

This fix adds an index to the loop over the range of hooks so that all container post hooks can be uniquely added to the range of hooks to be run.

Updating filterContainersSelector to accept this index, allowing for the expansion of the key format to include the hook index.

Updated applicable unit test case for the fixed behavior.

Updating filterContainersSelector to accept this index, allowing for the expansion of the key format to include the hook index.
@mleddy-NS1 mleddy-NS1 requested a review from a team as a code owner February 1, 2026 17:16
@gemini-code-assist
Copy link
Contributor

Summary of Changes

Hello @mleddy-NS1, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request introduces a crucial change to how Skaffold handles multiple container hooks during deployment. By adding an index to the hook iteration and incorporating it into the container filtering mechanism, the system can now uniquely identify and process each hook. This resolves an issue where identical container hooks might have been incorrectly skipped or mishandled, leading to more robust and predictable hook execution.

Highlights

  • Hook Indexing: The loop iterating over deployment hooks now includes an index, allowing for better differentiation between multiple hooks.
  • Container Selector Key Expansion: The filterContainersSelector function has been updated to accept and incorporate the new hook index into its key generation, preventing conflicts when multiple container hooks are present.
  • Test Coverage: A new test case has been added to deploy_test.go to validate the correct behavior of multiple container hooks, ensuring the fix works as expected.

🧠 New Feature in Public Preview: You can now enable Memory to help Gemini Code Assist learn from your team's feedback. This makes future code reviews more consistent and personalized to your project's style. Click here to enable Memory in your admin console.

Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

@mleddy-NS1 mleddy-NS1 changed the title fix: Adding index to the loop over the range of hooks. fix: enable multiple container hooks Feb 1, 2026
Copy link
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request correctly fixes an issue where only the first of multiple container hooks on the same container would be executed in subsequent dev loops by including the hook's index in the tracking key. However, I've identified a potential issue where hooks could still be skipped if pods in different namespaces share the same name. I've suggested a small change to include the namespace in the key to ensure its uniqueness across the cluster.

func filterContainersSelector(visitedContainers *sync.Map, phase phase, hookIndex int, selector containerSelector) containerSelector {
return func(p corev1.Pod, c corev1.Container) (bool, error) {
key := fmt.Sprintf("%s:%s:%s", phase, p.GetName(), c.Name)
key := fmt.Sprintf("%s:%d:%s:%s", phase, hookIndex, p.GetName(), c.Name)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

high

The key for visitedContainers should include the pod's namespace to be truly unique. Without the namespace, if two pods in different namespaces have the same name, they would generate the same key for the same hook. This could lead to one of the hooks being incorrectly skipped in subsequent runs. The original code also had this issue, but since this line is being modified, it's a good opportunity to make the key more robust.

Suggested change
key := fmt.Sprintf("%s:%d:%s:%s", phase, hookIndex, p.GetName(), c.Name)
key := fmt.Sprintf("%s:%d:%s:%s:%s", phase, hookIndex, p.Namespace, p.GetName(), c.Name)

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm happy to either fix this as part of this PR. Or alternatively create a separate PR for the above suggestion to limit the size and keep to two smaller PRs.

Could someone from the Skaffold review team comment on what is preferred?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

After-deploy hooks: Only the first container hook executes

1 participant