-
Notifications
You must be signed in to change notification settings - Fork 532
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add ARG for base image customization #738
Conversation
|
Welcome @jgu17! |
Hi @jgu17. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
✅ Deploy Preview for kubernetes-sigs-scheduler-plugins canceled.
|
Thanks for the contribution @jgu17 . Could you sign the CLA? |
/ok-to-test |
Done |
/release-note-none |
Makefile
Outdated
GO_BASE_IMAGE=$(GO_BASE_IMAGE) \ | ||
ALPINE_BASE_IMAGE=$(ALPINE_BASE_IMAGE) \ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
could you keep it consistent to use /t
instead of spaces here? (Makefile sometimes is strict on using tabs.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good catch. Copy and paste in the vi editor changed the /t to spaces. Fixed.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/approve
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: Huang-Wei, jgu17 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@Huang-Wei Appreciate the approval! Do you know if there is a schedule for the next release? We would like to be able to build an image based on release tag using customized base images as soon as possible. What would you suggest, is there a hot fix process to port it back to the last release for example, if the new release schedule is still tbd? |
The next release is usually current release + 3 months.
for which release, and which base image? and may I know the reason?
It will depend on the severity of the thing we need to fix. Could you elaborate on your use case? |
Actually post each PR's merge, there are jobs running image building: https://testgrid.k8s.io/sig-scheduling#post-scheduler-plugins-push-images. For example, the build image based latest |
We used to have a forked downstream repo for scheduler-plugins and we would like to eliminate the forked repo, and contribute to and consume directly from the k8s-sig project. We are creating downstream pipelines that build container images from a mirrored repo from this scheduler-plugins repo and needs to overwrite the default base images in the Docker files with base images from a different registry that has additional built-in security mechanism and/or different linux distro. The pipeline is triggered by release tags in the upstream scheduler-plugins repo. The first build will be based off the last upstream release 0.28.9. |
Gotcha. Do you need me to port this back to |
That would be much appreciated. I can cherry pick this PR over if you want me to. The branch name 1.28 vs tag name 0.28.9 threw me off so I didn't know where to cherry pick to. But we will soon submit a CVE PR related to OTEL library first before asking to cut a new tag, if you don't mind. |
Prow can do this, we just: /cherrypick release-1.28
SGTM. Check if the PR is needed on |
@Huang-Wei: new pull request created: #740 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Add ARG to define the base image parameters so a downstream pipeline can override which the base golang image to use when building container images.