Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Auto provision image stream #1404

Merged
merged 1 commit into from
Apr 10, 2015

Conversation

ncdc
Copy link
Contributor

@ncdc ncdc commented Mar 20, 2015

Auto provision an image stream when an image is pushed if the stream doesn't yet exist.

@ncdc
Copy link
Contributor Author

ncdc commented Mar 20, 2015

@smarterclayton interested in doing this?

@smarterclayton
Copy link
Contributor

Yes if user has permission.

@ncdc
Copy link
Contributor Author

ncdc commented Mar 20, 2015

If a project/namespace doesn't exist yet, should this create it (assuming the user has permissions to do so)? I'm thinking no...

@smarterclayton
Copy link
Contributor

No

On Mar 20, 2015, at 5:05 PM, Andy Goldstein notifications@github.com wrote:

If a project/namespace doesn't exist yet, should this create it (assuming the user has permissions to do so)? I'm thinking no...


Reply to this email directly or view it on GitHub.

@smarterclayton
Copy link
Contributor

What's the status of this?

@ncdc
Copy link
Contributor Author

ncdc commented Apr 8, 2015

I'll have it in once I finish reviewing Ravi's v2 auth work. That's a prerequisite.

Sent from my iPhone

On Apr 7, 2015, at 11:43 PM, Clayton Coleman notifications@github.com wrote:

What's the status of this?


Reply to this email directly or view it on GitHub.

@ncdc ncdc force-pushed the auto-provision-image-repo branch from 23aa0d9 to a78df0c Compare April 9, 2015 02:00
@ncdc ncdc changed the title [WIP, do not merge] Auto provision image repo [WIP, do not merge] Auto provision image stream Apr 9, 2015
@ncdc
Copy link
Contributor Author

ncdc commented Apr 9, 2015

@smarterclayton @liggitt I'd like to add a test for this to e2e, but I need an oauth token and I'm not sure how to automate requesting one, as openshift ex tokens request-token doesn't allow you to set the username and password with flags. Is there a way to do it?

@ncdc
Copy link
Contributor Author

ncdc commented Apr 9, 2015

[test]

@openshift-bot
Copy link
Contributor

continuous-integration/openshift-jenkins/test SUCCESS (https://ci.openshift.redhat.com/jenkins/job/test_pull_requests_openshift3/1755/)

@liggitt
Copy link
Contributor

liggitt commented Apr 9, 2015

can you describe what you would do with the token? do you need a token or just a valid login to run osc commands with? would osc login ... work?

@ncdc
Copy link
Contributor Author

ncdc commented Apr 9, 2015

I need a token so I can pass it to docker login as the password

Sent from my iPhone

On Apr 8, 2015, at 10:26 PM, Jordan Liggitt notifications@github.com wrote:

can you describe what you would do with the token? do you need a token or just a valid login to run osc commands with? would osc login ... work?


Reply to this email directly or view it on GitHub.

@ncdc
Copy link
Contributor Author

ncdc commented Apr 9, 2015

Actually I can just do this in an integration test instead

Sent from my iPhone

On Apr 8, 2015, at 10:26 PM, Jordan Liggitt notifications@github.com wrote:

can you describe what you would do with the token? do you need a token or just a valid login to run osc commands with? would osc login ... work?


Reply to this email directly or view it on GitHub.

@ncdc ncdc force-pushed the auto-provision-image-repo branch from a78df0c to 91fda56 Compare April 9, 2015 14:04
@ncdc ncdc changed the title [WIP, do not merge] Auto provision image stream Auto provision image stream Apr 9, 2015
@ncdc
Copy link
Contributor Author

ncdc commented Apr 9, 2015

@smarterclayton PTAL. This is obviously v2 registry only.

if err := r.registryClient.ImageStreamMappings(r.namespace).Create(&irm); err != nil {
log.Errorf("Error creating ImageStreamMapping: %s", err)
return err
if err := r.registryClient.ImageStreamMappings(r.namespace).Create(&ism); err != nil {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: in the future you might want to make the if block return and the else be the rest of the page (with a good comment about autoprovision).

@ncdc
Copy link
Contributor Author

ncdc commented Apr 9, 2015

@smarterclayton any other comments or is it ok to merge when green?

@smarterclayton
Copy link
Contributor

Merge when green

@ncdc
Copy link
Contributor Author

ncdc commented Apr 10, 2015

[merge]

@openshift-bot
Copy link
Contributor

continuous-integration/openshift-jenkins/merge SUCCESS (https://ci.openshift.redhat.com/jenkins/job/merge_pull_requests_openshift3/1533/) (Image: devenv-fedora_1252)

@openshift-bot
Copy link
Contributor

Evaluated for origin up to 91fda56

openshift-bot pushed a commit that referenced this pull request Apr 10, 2015
@openshift-bot openshift-bot merged commit 67514ef into openshift:master Apr 10, 2015
jboyd01 pushed a commit to jboyd01/origin that referenced this pull request Oct 17, 2017
…service-catalog/' changes from 3aacfedec6..aa27078754

aa27078754 origin build: add origin tooling
bcf37fd 0.1.0-rc2 chart updates (openshift#1410)
4ab0a0a add back 'Processing' message for instance deletion (openshift#1332)
0ecbcb1 Update logs for Cluster service plans. (openshift#1389)
8b491ef Fix a quoting nit (openshift#1400)
63685e4 add orphan mitigation-specific conditions for instances (openshift#1378)
adee662 Updated missed fields in service and plan specs (openshift#1406)
2095919 Handle default plan setting when using k8s names (openshift#1405)
607ba66 Document rbacEnable. (openshift#1404)
268294e Adding rbac definition for v1 api endpoint. (openshift#1284)
103288d differentiate between failed updates and provisions during deletion (openshift#1383)
eba8ba4 enable API aggregation and Service Catalog RBAC on Jenkins (openshift#1333)
5a93315 Validate relistDuration is non-negative (openshift#1395)
e279d21 Fix log messages for secrets (openshift#1385)
87fa8c9 fix status update when starting orphan mitigation (openshift#1372)
11f18f3 Switch to wget for integration apiserver checks (openshift#1384)
8c44a7d update OSB client to 2.13 (openshift#1392)
e64bbd1 default plan admission controller: filter list of service plans/service classes by the class name (openshift#1351)
6648c0e Check field names. Fix issue 1291 (openshift#1379)
5319841 update comment for instance generation check (openshift#1382)
7d5823f remove internal poll method (openshift#1381)
07d3068 Rework the logging for controller_instance. (openshift#1371)
5f4ca01 address PR comment as a followup (openshift#1380)
485d5e6 Add support for specifying plan using K8S names. (openshift#1377)
662bba8 Log number of secret keys created for binding credential (openshift#1375)
8ad6a31 Move controller constants into correct files (openshift#1373)
7bd66dd Adding type to log. (openshift#1339)
1ce5c4d Remove k8s/k8s dependency (openshift#1355)
b458323 Adding log formatting for BindingController. (openshift#1352)
275eb11 rename test variables to be consistent (openshift#1315)
ffd6b8b travis: skip cleanup before deploy (openshift#1368)
d5ecc04 fix travis tag checker (openshift#1365)
2cae0ee Minor updates to README (openshift#1360)
REVERT: 3aacfedec6 carry: Set external plan name for service-catalog walkthrough
REVERT: 3ec9e5b07a origin build: add origin tooling

git-subtree-dir: cmd/service-catalog/go/src/github.com/kubernetes-incubator/service-catalog
git-subtree-split: aa2707875461dd51be3731b1d94b5cfc3b9a3976
jpeeler pushed a commit to jpeeler/origin that referenced this pull request Feb 1, 2018
* Document rbacEnable.

* Fix format.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants