Skip to content
This repository has been archived by the owner on Nov 2, 2023. It is now read-only.

ingress: add YurtIngress enhancement features #51

Merged
merged 7 commits into from
May 10, 2022

Conversation

zzguang
Copy link
Member

@zzguang zzguang commented Apr 30, 2022

What type of PR is this?

Uncomment only one /kind <> line, hit enter to put that in a new line, and remove leading whitespace from that line:

/kind enhancement

What this PR does / why we need it:

Add YurtIngress enhancement features to provide users more flexibility for configuration, which mainly includes:

  1. Remove singleton YurtIngress CR restriction
  2. Add ingress_IPs configuration API
  3. Add nginx ingress controller docker images configuration API
  4. Fix some bugs

Which issue(s) this PR fixes:

Fixes #

Special notes for your reviewer:

Does this PR introduce a user-facing change?


other Note

LindaYu17 and others added 2 commits April 30, 2022 15:18
Signed-off-by: Linda Yu <linda.yu@intel.com>
Signed-off-by: zhenggu1 <zhengguang.zhang@intel.com>
@openyurt-bot
Copy link
Collaborator

@zzguang: GitHub didn't allow me to assign the following users: your_reviewer.

Note that only openyurtio members, repo collaborators and people who have commented on this issue/PR can be assigned. Additionally, issues/PRs can only have 10 assignees at the same time.
For more information please see the contributor guide

In response to this:

What type of PR is this?

Uncomment only one /kind <> line, hit enter to put that in a new line, and remove leading whitespace from that line:
/kind bug
/kind documentation
/kind enhancement
/kind good-first-issue
/kind feature
/kind question
/kind design
/sig ai
/sig iot
/sig network
/sig storage
/sig storage

What this PR does / why we need it:

Which issue(s) this PR fixes:

Fixes #

Special notes for your reviewer:

Does this PR introduce a user-facing change?


other Note

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@rambohe-ch
Copy link
Member

/assign @kadisi

zzguang added 4 commits May 10, 2022 15:29
When the ingress controller service for a nodepool is exposed, user can set
the service external IP by the new added API in YurtIngress CR.

Signed-off-by: zzguang <zhengguang.zhang@intel.com>
nginx ingress controller image and webhook certgen image are hard-coded in the previous version,
which is not friendly to users, so add the API for users to config the related images locations
themselves, which means users can upgrade the nginx ingress controller as well.

Note: for the nginx ingress controller version has a relationship with the kubernetes version,
when users config the nginx ingress controller image, they should ensure these 2 versions are
matchable.

Signed-off-by: zzguang <zhengguang.zhang@intel.com>
Signed-off-by: zzguang <zhengguang.zhang@intel.com>
When yurt-app-manager is deleted, some nginx ingress controller related
resources can not be cleaned up or garbage collected, add ownerReferences
to these resources to avoid this issue.

Signed-off-by: zzguang <zhengguang.zhang@intel.com>
func SetDefaultsYurtIngress(obj *YurtIngress) {

if obj.Spec.IngressControllerImage == "" {
obj.Spec.IngressControllerImage = "k8s.gcr.io/ingress-nginx/controller:v0.48.1"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Constant is recommended

}
if obj.Spec.IngressWebhookCertGenImage == "" {
obj.Spec.IngressWebhookCertGenImage = "docker.io/jettech/kube-webhook-certgen:v1.5.1"
}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Constant is recommended

Copy link
Member

@kadisi kadisi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

just some nits

Signed-off-by: zzguang <zhengguang.zhang@intel.com>
@kadisi
Copy link
Member

kadisi commented May 10, 2022

/lgtm
/approve

@openyurt-bot openyurt-bot added the lgtm lgtm label May 10, 2022
@openyurt-bot
Copy link
Collaborator

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: kadisi, zzguang

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants