-
Notifications
You must be signed in to change notification settings - Fork 1.4k
Make default ingress tls and annotations congurable in the helm config #2513
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Make default ingress tls and annotations congurable in the helm config #2513
Conversation
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Signed-off-by: Thomas Newton <[email protected]>
…v1.IngressTLS` Signed-off-by: Thomas Newton <[email protected]>
Signed-off-by: Thomas Newton <[email protected]>
Signed-off-by: Thomas Newton <[email protected]>
Signed-off-by: Thomas Newton <[email protected]>
Signed-off-by: Thomas Newton <[email protected]>
Signed-off-by: Thomas Newton <[email protected]>
Signed-off-by: Thomas Newton <[email protected]>
Signed-off-by: Thomas Newton <[email protected]>
Signed-off-by: Thomas Newton <[email protected]>
Signed-off-by: Thomas Newton <[email protected]>
b71b383
to
8695766
Compare
@thetaiter-swf: changing LGTM is restricted to collaborators In response to this: Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@ChenYi015 sorry for the direct ping, but you helped me get a couple of other things merged. I was hoping you could review this, when you get a chance. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I wonder if defining default TLS settings with JSON is the way to go. Probably not a bad experience if using Helm but I don't really like to deal with escaping JSON strings in general.
Signed-off-by: Thomas Newton <[email protected]>
f63e190
to
8af6dba
Compare
Thanks for reviewing. I think that is a fair assesment, but I can't think of any better options... Do you have any suggestions? |
Hmm maybe read from a file instead, likely from CMs. I'd say adding support YAML and JSON is a good idea too. I'd like to hear others' opinions on this though. I do love this feature proposed here and would love to see it implemented. |
I've been thinking a bit about how to implement this. It does add a bit of complexity and I'm not decided how to organise things. It feels a bit strange to mix with some config provided via config maps and some via CLI arguments. I can implement it with config maps if anyone has strong opinions, but I think my preference would be to leave it as is for now. If we want to change to using config maps, I would propose that as a seperate PR to do a full migration to config maps. |
Agreed on this but I honestly I am not sure if escaped json string is good either. I'd love to hear others' opinions and get this implemented. @ChenYi015 @jacobsalway @vara-bonthu Opinions on this? |
Purpose of this PR
Support helm chart level defaults for ingress TLS and annotations, so they don't need to be configured on every SparkApplication.
Closes: #2460
Proposed changes:
--default-ingress-tls
and--default-ingress-annotations
and use them when TLS/annotations are not provided in the SparkApplication's spec. These are provided as JSON strings in the CLI.Change Category
Rationale
Checklist
Additional Notes
I considered adding an e2e test to cover the helm and CLI configuration. However, I couldn't see a way to run the e2e tests with multiple helm configs. I could have changed all the e2e tests to use these new configs, but then we loose test coverage for when the new configs are not used.
I'm a golang noob.