-
Notifications
You must be signed in to change notification settings - Fork 128
rook-ceph: Pin rook ceph image to v1.16.6 #1420
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Using the `master` tag for rook can led to changes breaking the deployment of ceph in kubevirtci Such as the recent rbac issues: kubevirt#1416 Pin the rook image to v1.16.6 and use the image that is mirrored to the kubevirtci quay repo Signed-off-by: Brian Carey <[email protected]>
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@@ -600,7 +600,7 @@ spec: | |||
serviceAccountName: rook-ceph-system | |||
containers: | |||
- name: rook-ceph-operator | |||
image: docker.io/rook/ceph:master | |||
image: quay.io/kubevirtci/rook-ceph:v1.16.6 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
will this not create problems whenever people are updating to newer versions - meaning they have to be aware that we are actually mirroring the image to our own registry?
maybe we could try something as patching the yaml with kustomize? This way we could just replace the original yaml with the newer one and the customization would be taken care of when applying it?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This would not be straight forward as gocli applies the yamls - I am not sure we should add an extra step with kustomize.
I could probably change the image using some regex in gocli but then the actual image that is used is hidden away in gocli - having the image here in the manifests is clear for anyone who needs to find it.
@brianmcarey: The following test failed, say
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
@sourcery-ai review |
Reviewer's Guide by SourceryThis PR pins the Rook Ceph operator image to version v1.16.6 from the quay.io/kubevirtci repository to ensure a stable deployment and prevent breakages caused by using the No diagrams generated as the changes look simple and do not need a visual representation. File-Level Changes
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey @brianmcarey - I've reviewed your changes - here's some feedback:
Overall Comments:
- Consider adding a comment in the code explaining why the rook ceph image is pinned.
Here's what I looked at during the review
- 🟢 General issues: all looks good
- 🟢 Security: all looks good
- 🟢 Testing: all looks good
- 🟢 Complexity: all looks good
- 🟢 Documentation: all looks good
Help me be more useful! Please click 👍 or 👎 on each comment and I'll use the feedback to improve your reviews.
@sourcery-ai dismiss |
Pull requests that are marked with After that period the bot marks them with the label /label needs-approver-review |
What this PR does / why we need it:
Using the
master
tag for rook can led to changes breaking the deployment of ceph in kubevirtciSuch as the recent rbac issues:
#1416
Pin the rook image to v1.16.6 and use the image that is mirrored to the kubevirtci quay repo
Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes #
Special notes for your reviewer:
/cc @akalenyu @dhiller
Checklist
This checklist is not enforcing, but it's a reminder of items that could be relevant to every PR.
Approvers are expected to review this list.
Release note: