-
Notifications
You must be signed in to change notification settings - Fork 40k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Specifying ID twice is sort of tedious #294
Comments
Also need to consider how replication controllers produce IDs for the pods they make, right now I think they just copy the possibly-blank ID field in their pod template. |
If Pod ID is required, and a ContainerManifest ID is also required, should the pod controller duplicate the pod id into the container manifest id if the container manifest id is not specified? Then the replication controller should also generate a unique container manifest ID in the template on creation if one is not specified. I will make that change in #253 if so |
I think so. Re3plication controller should add a short random On Mon, Jun 30, 2014 at 12:39 PM, Clayton Coleman notifications@github.com
|
With #846 the need for a manifest ID on the primary source may go away, once we can isolate the Kubelet from the etcd schema. Probably still need a source of uniqueness on config from other sources, but it could be source specific instead of being inside the source. |
Addressed by implementation of #1225? |
EDIT: Yes, will add this to #1519 |
@smarterclayton Should we expect that this has been addressed in v1beta1 by the BoundPod conversion functions in pkg/api/conversion.go? If I try to create a pod without the manifest version and id, it fails, since those fields are required. However, the conversion functions appear to trash the user-provided id value, and there's no choice for version. Example:
result:
|
BoundPod gets half of it. Once we land the internal pod refactor the validator can stop validating version and id (they become optional and ignored). We will still need to support the backward compatible validator for old ContainerManifests on disk though. ----- Original Message -----
|
I'm going to close this. IMO, we should focus on v1beta3. |
New structure: ManifestError
Add custom resource validation for network spec
Allow compilation time disabling for each type of Problem Daemon.
From examples:
{
"id": "redis-master-2",
"desiredState": {
"manifest": {
"id": "redis-master-2"
This stems from the fact that Kubelet takes ContainerManifest structs and needs them to have an ID, but none of the frontends massage the info from the Pod struct into the Manifest struct.
We should think hard about whether using the same structs for the user API and the Kubelet API makes sense. Or maybe we can restructure them to nest better, so the kubelet API looks more like:
{
id
manifest
}
The text was updated successfully, but these errors were encountered: