-
Notifications
You must be signed in to change notification settings - Fork 39.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update istio addon manifest to 0.8 #64537
Update istio addon manifest to 0.8 #64537
Conversation
af75d23
to
07f8afb
Compare
/ok-to-test |
/ok-to-test |
/cc @wangzhen127 |
@ostromart: GitHub didn't allow me to request PR reviews from the following users: wangzhen127. Note that only kubernetes members and repo collaborators can review this PR, and authors cannot review their own PRs. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/cc @yliaog |
/retest |
07f8afb
to
800dee5
Compare
/kind feature I've added a kind and priority. However, I don't know what SIG this is, and you need to get that SIG to approve it for milestone. I can't do that. |
Seems like sig-network..? |
thanks, yeah I don't think there is a sig specifically for service mesh or
addons, so network seemed appropriate (?)
…On Fri, Jun 1, 2018 at 2:55 PM Zihong Zheng ***@***.***> wrote:
/cc @MrHohn <https://github.com/MrHohn> can you verify / delegate?
I honestly don't know :) I thought there is sig-service-mesh but there
isn't.
If it is sig-network, I guess @thockin <https://github.com/thockin>?
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#64537 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AA4BqxJbtdnDoeXng22IvAdIK9xochH_ks5t4bhMgaJpZM4UUJfK>
.
|
/lgtm LGTM for seccomp changes. Feel free to squash commits. |
@wangzhen127: changing LGTM is restricted to assignees, and only kubernetes org members may be assigned issues. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/status approved-for-milestone |
/lgtm (on behalf of Istio networking team) |
@rshriram: changing LGTM is restricted to assignees, and only kubernetes org members may be assigned issues. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/assign @roberthbailey |
I think that @mikedanese said he had time to take a pass on this. |
[MILESTONENOTIFIER] Milestone Pull Request: Up-to-date for process Pull Request Labels
|
Were these changes reviewed elsewhere? |
Are you talking about reviewing 1. the base istio.yaml in the context of istio generally, 2. the changes that were overlaid on top to turn it into a k8s addon, or 3. the use of the resulting yaml in k8s?
|
labels: | ||
istio-injection: enabled | ||
addonmanager.kubernetes.io/mode: Reconcile |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
why is this removed?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I thought this was not public-writeable, but I can put it back in.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Turns out it is writable but regardless...
istio-injection: enabled was removed from default because the webhook matcher now looks for namespaces that do not have "istio-injection: disabled" rather than having enabled. This just covers all possible namespaces outside the special ones.
Reconcile could be added here but I wonder if there's any risk of reconciling namespace resources.
app: istio-mixer | ||
chart: mixer-0.8.0 | ||
release: istio | ||
heritage: Tiller |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this label significant?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It's just a standard label recommended when using tiller to upgrade istio. If tiller is used by the user it will be clear from documentation that update of anything in istio-system will be reconciled regardless how it's updated.
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: mikedanese, ostromart, rshriram, wangzhen127 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/test pull-kubernetes-node-e2e |
1 similar comment
/test pull-kubernetes-node-e2e |
Automatic merge from submit-queue (batch tested with PRs 64723, 64537). If you want to cherry-pick this change to another branch, please follow the instructions here. |
What this PR does / why we need it:
Update Istio addon version to latest stable 0.8.0.
Changes from vanilla istio[-auth].yaml include:
Release note: