-
Notifications
You must be signed in to change notification settings - Fork 1.8k
container: add support for kubelet read only port #11272
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
558b2ac
to
7249061
Compare
Hello! I am a robot. Tests will require approval from a repository maintainer to run. @trodge, a repository maintainer, has been assigned to review your changes. If you have not received review feedback within 2 business days, please leave a comment on this PR asking them to take a look. You can help make sure that review is quick by doing a self-review and by running impacted tests locally. |
f77ab3c
to
bae9e06
Compare
mmv1/third_party/terraform/services/container/resource_container_cluster_test.go.erb
Outdated
Show resolved
Hide resolved
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are.
Missing test reportYour PR includes resource fields which are not covered by any test. Resource: resource "google_container_cluster" "primary" {
node_config {
kubelet_config {
insecure_kubelet_readonly_port_enabled = # value needed
}
}
}
Resource: resource "google_container_node_pool" "primary" {
node_config {
kubelet_config {
insecure_kubelet_readonly_port_enabled = # value needed
}
}
}
|
This comment was marked as outdated.
This comment was marked as outdated.
Would be great to get this fixed asap depends on notification from GCP a lot of user will need this. |
Just a note that it will be at least a week before I can dig into it much more, and it may be a tricky one to finish / get working. So if anyone has time to take it on, or if anyone from the team that works on this project wants to take over, I will not be at all unhappy. |
Do we have any updates here? We have already next week without any progress... |
bae9e06
to
916d6b8
Compare
@trodge I know this is in draft still, but any chance you could take a look at what I've got so far? I think there is still some code missing, but I want to make sure I'm going in the right direction (it at least seems to build and work to do a basic plan off of) Also curious if there are any docs on how, e.g., Also, I think the |
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
This comment was marked as outdated.
They do not interact at the moment. The
I believe the missing test detection is failing because the provider isn't building, and the provider isn't building because of this error:
The files and line numbers here refer to the generated code in the downstream. |
Hi, thanks for responding.
Thanks -- this is all super helpful information. Are there any (non-Google / Hashicorp internal) docs that explain this at high level? Do the tests run against both sets, and is there anything I can / should do to help make sure they stay in sync while I'm working on stuff?
Huh, it was building for me locally, though maybe the test code doesn't get generated / built when you run [edit: I can reproduce the failure with Side note: with some recent change, I don't seem to be able to run the magic modules build on OS X without doing |
916d6b8
to
0f37d88
Compare
The updated version should fix the basic problem (at least those tests build now locally), though there may still be some issues with the provider code and / or tests. |
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, just a couple minor changes to docs.
mmv1/third_party/terraform/website/docs/r/container_cluster.html.markdown
Outdated
Show resolved
Hide resolved
mmv1/third_party/terraform/website/docs/r/container_cluster.html.markdown
Outdated
Show resolved
Hide resolved
mmv1/third_party/terraform/services/container/node_config.go.erb
Outdated
Show resolved
Hide resolved
mmv1/third_party/terraform/services/container/resource_container_cluster_test.go.erb
Show resolved
Hide resolved
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are.
|
Tests analyticsTotal tests: 203 Click here to see the affected service packages
View the build log |
Also, @melinath: you or someone will cherry-pick this back into 5.x, correct? |
We may see some issues related to hashicorp/terraform-provider-google#15767 once people start using this setting -- I believe |
@wyardley Thanks for sticking with it! Yes, we're planning to backport this into 5.X. |
There's a soft tab instead of a hard tab I missed in one spot, not sure if it's worth fixing, especially if they'll get fixed with the move to go templates at some point? I can make a tiny PR to update it if you'd like though. |
don't worry about it at this point. Thanks! |
…m#11272) Co-authored-by: Stephen Lewis (Burrows) <[email protected]>
no_enable_insecure_kubelet_readonly_port
to google_container_clusterinsecure_kubelet_readonly_port_enabled
forcontainer_node_pool
and friendshttps://cloud.google.com/kubernetes-engine/docs/how-to/disable-kubelet-readonly-port
Fixes hashicorp/terraform-provider-google#15208
Note: @trodge: may be good to get some feedback internally from Google folks about what the right default behavior should be and if this will change over time. I'm trying to do this in the least breaking (for the provider) way, but from my very quick reading of the announcements, it's possible that default behavior may change in the future (and that this may depend on new vs. existing clusters and / or based on cluster version).
Release Note Template for Downstream PRs (will be copied)