-
Notifications
You must be signed in to change notification settings - Fork 808
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for securityContext in controller #1112
Add support for securityContext in controller #1112
Conversation
Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please follow instructions at https://git.k8s.io/community/CLA.md#the-contributor-license-agreement to sign the CLA. It may take a couple minutes for the CLA signature to be fully registered; after that, please reply here with a new comment and we'll verify. Thanks.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
|
Welcome @phantasm66! |
Hi @phantasm66. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Not sure why the linux foundation CLA is still showing as incomplete. I completed the individual signup last night:
(From the signed PDF) |
Hey there @ayberk @leakingtapan sorry for the at-mentions! I was hoping to get some eyes in this, if possible... Thanks! |
/ok-to-test This LGTM, but you might need to update the chart minor version. I'll leave the approval to @wongma7 @AndyXiangLi. |
I saw this as a bug fix (for EKS, specifically) so I bumped the patch version in the |
/assign @AndyXiangLi |
aa684dc
to
a395239
Compare
Rebased.. friendly ping again to: @AndyXiangLi 😄 |
a395239
to
e9f80cf
Compare
I’ll rebase this again, but can someone authorized to approve this please do so? |
@phantasm66 when you rebase will you please fix the version in the changelog. @ayberk or @wongma7 will one of you take a quick look at this after the rebase is done? |
0e6101e
to
0aabbbe
Compare
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ayberk, krmichel, phantasm66 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Hi @phantasm66 , there's no release v1.6.0 for now, can you bump up the chart version v2.5.1 and keeps the app version v1.5.0? |
@gtxu this was already merged. |
@gtxu How do you want to proceed? Do you want to revert the merge that @ayberk initiated and then I'll bump the versions down and you can re-approve/merge? I was originally told that this was adding new functionality and that the minor version should be bumped, not the patch version - which is why I went to I'm happy to do whatever you need me to do, but I've received conflicting info on how y'all want contributors to set versions. |
|
Hi @phantasm66 , No action needed for this now. It is fine to bump up chart version, but the |
Gotcha. Sorry about that. Thanks for opening that other PR to fix the versions. |
Is this a bug fix or adding new feature?
Bug fix for EKS kubernetes versions below
1.19
.What is this PR about? / Why do we need it?
Your compatibility matrix says that appVersion 1.2.1 of the Helm Chart supports Kubernetes versions 1.17 and above. In EKS this does not seem to be the case.
We are running appVersion 1.2.1 of the
aws-ebs-csi-driver
on EKS Kubernetesv1.18
and encountered the following error when the controller attempted to mount an EBS volume:This seems expected based on the AWS EKS doc I linked above, so we manually added the following to our controller Deployment live manifest and relaunched the controller pods:
Which immediately resulted in the EBS volume being successfully mounted:
What testing is done?
I ran through your
make verify
,make test
andmake test-integration
but they all failed withERROR: vendor check failed
, which is not a directory I touched for this PR.