-
Notifications
You must be signed in to change notification settings - Fork 554
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
change targetpath permission to allow non-root access #430
Conversation
Signed-off-by: Madhu Rajanna <madhupr007@gmail.com>
@humblec @ShyamsundarR can we get this PR in for csiv1.0? |
@Madhu-1 can u check why the CI fail? |
Signed-off-by: Madhu Rajanna <madhupr007@gmail.com>
@humblec its a know issue with CI https://travis-ci.org/ceph/ceph-csi/jobs/545193245#L562 |
Signed-off-by: Madhu Rajanna <madhupr007@gmail.com>
We should get it in for v1.0, but version would be v1.0.1 when we decide to update the images in quay, right? The whole point of creating the final v1.0.0 was to retain it unchanging and provide the next .z version with the fixes, I would hence state we retain that premise. |
if we update it to v1.0.1 we need to update it in rook also. planning to update rook for v1.1.0 |
I understand the rook integration position, but as we have stated we will retain the 1.0.0 image as is, I would still push for 1.0.1 and update rook as well to the same. |
@humblec what's your thought on this? |
@ShyamsundarR without making release should we push v1.0.1 images? |
@ShyamsundarR as @Madhu-1 mentioned, this fix is important and the customer should get it without the changes in the tag. So, lets put it on 1.0.0 and we have to avoid any extra tagging or should not complicate the things. |
@ShyamsundarR @poornimag can you please approve this PR as this is needed urgently for some testing ? |
This breaks what we have committed to users with the 1.0.0 image versions, so what is special that the one customer cannot use a new image version? or test the 1.0-canary? If you just need the vote, then I will give it, but reasoning is missing. |
Is it because the image versions are baked into the manifests carried by Rook and that it would need a further PR for the user to use the updated image? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Barring the version discussion code changes are fine.
@ShyamsundarR can you point me the readme or document where we mentioned this ? |
#345 is a start. << Humble's edit below>> |
Rook has the following means of mentioning which CSI image versions to use, that should come in handy, rather than having the push a PR to Rook IMO,
Also, when a pod changes nodes, or is restarted on another node, it would pull the latest image, if it was never pulled before, so the statement "deployments NOT going to be disturbed" is not true. |
Node plugin is a deamonset. That means image is present on EVERY NODE!! so, no question/confusion on "pod changes nodes or is restarted on another node ....". In short that statement is correct :). The only possibility is when you scale up the cluster itself, not when pod is rescheduled. |
Agreed, I stand corrected.
But the above is a possibility, so still needs to be tackled, no? |
@humblec @ShyamsundarR ping |
The only last option, in terms of simplicity till we close out how we release updates, I want to provide is as follows,
The pod manifests if they change is what gets us in trouble as these are @humblec @Madhu-1 If this is still not acceptable, please roll out 1.0.0 by taking a |
@ShyamsundarR @humblec @Madhu-1 I wonder, when we can expect to have new images |
closing this one. this as been fixed in new release v1.1.0 |
change targetpath permission to allow non-root access
Signed-off-by: Madhu Rajanna madhupr007@gmail.com