-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix annotation trigger to reconcile on container image change #18513
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -172,6 +172,33 @@ func UpdateObjectFromImages(obj runtime.Object, tagRetriever trigger.TagRetrieve | |
return updated, nil | ||
} | ||
|
||
// ContainerImageChanged returns true if any container image referenced by newTriggers changed. | ||
func ContainerImageChanged(oldObj, newObj runtime.Object, newTriggers []triggerapi.ObjectFieldTrigger) bool { | ||
for _, trigger := range newTriggers { | ||
if trigger.Paused { | ||
continue | ||
} | ||
|
||
newContainer, _, err := ContainerForObjectFieldPath(newObj, trigger.FieldPath) | ||
if err != nil { | ||
glog.V(5).Infof("%v", err) | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. please add context for this error |
||
continue | ||
} | ||
|
||
oldContainer, _, err := ContainerForObjectFieldPath(oldObj, trigger.FieldPath) | ||
if err != nil { | ||
// might just be a result of the update | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. glog(5) here as well There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. if the triggers has changed or the images and the field path is valid only for the new image+trigger combination there will always be an error here although it's not an error in this case |
||
continue | ||
} | ||
|
||
if newContainer.GetImage() != oldContainer.GetImage() { | ||
return true | ||
} | ||
} | ||
|
||
return false | ||
} | ||
|
||
// annotationTriggerIndexer uses annotations on objects to trigger changes. | ||
type annotationTriggerIndexer struct { | ||
prefix string | ||
|
@@ -236,6 +263,8 @@ func (i annotationTriggerIndexer) Index(obj, old interface{}) (string, *trigger. | |
change = cache.Added | ||
case !reflect.DeepEqual(oldTriggers, triggers): | ||
change = cache.Updated | ||
case ContainerImageChanged(old.(runtime.Object), obj.(runtime.Object), triggers): | ||
change = cache.Updated | ||
} | ||
} | ||
|
||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,68 @@ | ||
package trigger | ||
|
||
import ( | ||
"time" | ||
|
||
g "github.com/onsi/ginkgo" | ||
o "github.com/onsi/gomega" | ||
|
||
appsv1 "k8s.io/api/apps/v1" | ||
"k8s.io/apimachinery/pkg/types" | ||
"k8s.io/kubernetes/test/e2e/framework" | ||
|
||
exutil "github.com/openshift/origin/test/extended/util" | ||
) | ||
|
||
var ( | ||
SyncTimeout = 30 * time.Second | ||
) | ||
|
||
var _ = g.Describe("[Feature:AnnotationTrigger] Annotation trigger", func() { | ||
defer g.GinkgoRecover() | ||
|
||
oc := exutil.NewCLI("cli-deployment", exutil.KubeConfigPath()) | ||
|
||
var ( | ||
deploymentFixture = exutil.FixturePath("testdata", "image", "deployment-with-annotation-trigger.yaml") | ||
) | ||
|
||
g.It("reconciles after the image is overwritten", func() { | ||
namespace := oc.Namespace() | ||
|
||
g.By("creating a Deployment") | ||
deployment, err := readDeploymentFixture(deploymentFixture) | ||
o.Expect(err).NotTo(o.HaveOccurred()) | ||
o.Expect(deployment.Spec.Template.Spec.Containers).To(o.HaveLen(1)) | ||
o.Expect(deployment.Spec.Template.Spec.Containers[0].Image).To(o.Equal(" ")) | ||
|
||
deployment, err = oc.KubeClient().AppsV1().Deployments(namespace).Create(deployment) | ||
o.Expect(err).NotTo(o.HaveOccurred()) | ||
o.Expect(deployment.Spec.Template.Spec.Containers[0].Image).To(o.Equal(" ")) | ||
|
||
g.By("tagging the docker.io/library/centos:latest as test:v1 image to create ImageStream") | ||
out, err := oc.Run("tag").Args("docker.io/library/centos:latest", "test:v1").Output() | ||
framework.Logf("%s", out) | ||
o.Expect(err).NotTo(o.HaveOccurred()) | ||
|
||
g.By("waiting for the initial image to be replaced from ImageStream") | ||
deployment, err = waitForDeploymentModification(oc.KubeClient().AppsV1(), deployment.ObjectMeta, SyncTimeout, func(d *appsv1.Deployment) (bool, error) { | ||
return d.Spec.Template.Spec.Containers[0].Image != deployment.Spec.Template.Spec.Containers[0].Image, nil | ||
}) | ||
o.Expect(err).NotTo(o.HaveOccurred()) | ||
|
||
g.By("setting Deployment image repeatedly to ' ' to fight with annotation trigger") | ||
for i := 0; i < 50; i++ { | ||
deployment, err = oc.KubeClient().AppsV1().Deployments(namespace).Patch(deployment.Name, types.StrategicMergePatchType, | ||
[]byte(`{"spec":{"template":{"spec":{"containers":[{"name":"test","image":" "}]}}}}`)) | ||
o.Expect(err).NotTo(o.HaveOccurred()) | ||
o.Expect(deployment.Spec.Template.Spec.Containers[0].Image).To(o.Equal(" ")) | ||
} | ||
|
||
g.By("waiting for the image to be injected by annotation trigger") | ||
o.Expect(deployment.Spec.Template.Spec.Containers[0].Image).To(o.Equal(" ")) | ||
deployment, err = waitForDeploymentModification(oc.KubeClient().AppsV1(), deployment.ObjectMeta, SyncTimeout, func(d *appsv1.Deployment) (bool, error) { | ||
return d.Spec.Template.Spec.Containers[0].Image != deployment.Spec.Template.Spec.Containers[0].Image, nil | ||
}) | ||
o.Expect(err).NotTo(o.HaveOccurred()) | ||
}) | ||
}) |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,47 @@ | ||
package trigger | ||
|
||
import ( | ||
"fmt" | ||
"io/ioutil" | ||
"time" | ||
|
||
"github.com/ghodss/yaml" | ||
|
||
appsv1 "k8s.io/api/apps/v1" | ||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||
"k8s.io/apimachinery/pkg/watch" | ||
appsv1clientset "k8s.io/client-go/kubernetes/typed/apps/v1" | ||
) | ||
|
||
func readDeploymentFixture(path string) (*appsv1.Deployment, error) { | ||
data, err := ioutil.ReadFile(path) | ||
if err != nil { | ||
return nil, err | ||
} | ||
|
||
deployment := new(appsv1.Deployment) | ||
err = yaml.Unmarshal(data, deployment) | ||
if err != nil { | ||
return nil, err | ||
} | ||
|
||
return deployment, err | ||
} | ||
|
||
func waitForDeploymentModification(appsClient appsv1clientset.AppsV1Interface, objMeta metav1.ObjectMeta, timeout time.Duration, condition func(deployment *appsv1.Deployment) (bool, error)) (*appsv1.Deployment, error) { | ||
watcher, err := appsClient.Deployments(objMeta.Namespace).Watch(metav1.SingleObject(objMeta)) | ||
if err != nil { | ||
return nil, err | ||
} | ||
|
||
event, err := watch.Until(timeout, watcher, func(event watch.Event) (bool, error) { | ||
if event.Type != watch.Modified && (objMeta.ResourceVersion == "" && event.Type != watch.Added) { | ||
return true, fmt.Errorf("different kind of event appeared while waiting for Deployment modification: event: %#v", event) | ||
} | ||
return condition(event.Object.(*appsv1.Deployment)) | ||
}) | ||
if err != nil { | ||
return nil, err | ||
} | ||
return event.Object.(*appsv1.Deployment), nil | ||
} |
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,26 @@ | ||
apiVersion: apps/v1 | ||
kind: Deployment | ||
metadata: | ||
annotations: | ||
image.openshift.io/triggers: '[{"from":{"kind":"ImageStreamTag","name":"test:v1"},"fieldPath":"spec.template.spec.containers[?(@.name==\"test\")].image"}]' | ||
name: test | ||
spec: | ||
progressDeadlineSeconds: 600 | ||
replicas: 1 | ||
revisionHistoryLimit: 10 | ||
selector: | ||
matchLabels: | ||
app: test | ||
strategy: | ||
type: Recreate | ||
template: | ||
metadata: | ||
labels: | ||
app: test | ||
spec: | ||
containers: | ||
- image: " " | ||
name: test | ||
command: ["/bin/sleep"] | ||
args: | ||
- infinity |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Add yourself as a reviewer too
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I though approver is a superset includung reviewer. I think I've already done it somewhere and lgtm works there. What's the difference?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/gtm
works everywhere - the reviewers section is used by the bot to request reviews automatically.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
now you will have to do image api reviews \o/ :-)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
oh no, I am going to fall back