-
Notifications
You must be signed in to change notification settings - Fork 247
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Drop support for hooks #856
Comments
I would propose NFD to drop the big image completely, and add an initcontainer that removes host source.d/ subdirectory content, if it exists ("os.removeAll(path)"). All this should of course have prominent warnings in NFD release notes and worker log. I.e. if one wants to continue using hooks, one would need to restart things installing hooks, in addition to downgrading back to NFD version supporting them. n+X release would eventually drop the hook removal initcontainer. @mythi Any comments from the Intel device plugins (which are currently using hooks) maintenance side? |
I would propose that:
|
running the source binaries in our initContainers (instead of using the initContainers to install the binaries) and piping the output to, e.g., |
I have had sooooo many conversations recently, that I can't not support this issue moaaaarrr. |
Change volume name to a more generic one before the NFD host mount directory itself needs to be changed: kubernetes-sigs/node-feature-discovery#856 Signed-off-by: Eero Tamminen <[email protected]>
To work around kustomize inability to enforce correct init container, and because this is more likely way how it will work once NFD drops support for hooks: kubernetes-sigs/node-feature-discovery#856 Signed-off-by: Eero Tamminen <[email protected]>
Because: * To work around kustomize inability to enforce correct init container order * This is more likely how things will work once NFD drops support for hooks: kubernetes-sigs/node-feature-discovery#856 Signed-off-by: Eero Tamminen <[email protected]>
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
Before adding kustomize file changing it from feature hooks directory to feature files directory (which is needed to support scalability testing with fake devices): kubernetes-sigs/node-feature-discovery#856 When changing volume names, controller needs to be changed too. Signed-off-by: Eero Tamminen <[email protected]>
Before adding kustomize file changing it from feature hooks directory to feature files directory, which is needed to support scalability testing with fake devices, and for: kubernetes-sigs/node-feature-discovery#856 When changing volume names, controller needs to be changed too. Signed-off-by: Eero Tamminen <[email protected]>
Change GPU plugin NFD init container to run-time container: * To work around kustomize inability to enforce correct init container order * This is more likely how things will work once NFD drops support for hooks: kubernetes-sigs/node-feature-discovery#856 Signed-off-by: Eero Tamminen <[email protected]>
Before adding kustomize file changing it from feature hooks directory to feature files directory (which is needed to support scalability testing with fake devices): kubernetes-sigs/node-feature-discovery#856 When changing volume names, controller needs to be changed too. Signed-off-by: Eero Tamminen <[email protected]>
NFD hooks are deprecated and going away: kubernetes-sigs/node-feature-discovery#856 This makes the mount names more future-proof, and shows where later changes need to be done (to change operator mount directory, and switch hook-using deployments e.g. to feature files). Signed-off-by: Eero Tamminen <[email protected]>
Change GPU plugin NFD init container to run-time container: * To work around kustomize inability to enforce correct init container order * This is more likely how things will work once NFD drops support for hooks: kubernetes-sigs/node-feature-discovery#856 Signed-off-by: Eero Tamminen <[email protected]>
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
This will still take a few releases to completely drop the hooks, I think /remove-lifecycle stale |
Hooks were marked as deprecated in v0.12, we switched to the "minimal" container image as a default in v0.13 and hooks were now disabled by default in v0.14. As per our deprecation policy I think we could drop them completely already in v0.15 but I don't know if we have such a hurry (as they're now disabled anyway) so we could wait one more release for possible users to migrate off them. |
v0.15 release could include note that it will be dropped in v0.16:
|
Definitely. And if people are in (in dropping in v0.16), we could even put it in the deprecation note in the documentation that hook support is slated for complete removal in v0.16. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
Ach, we forgot to explicitly mention the removal of hooks in the v0.15 release notes 🤦♂️ Maybe we can keep them for one release and in v0.16. They are disabled by default, anyway, so there's no major practical impact /remove-lifecycle stale |
Document the upcoming removal of hooks: |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
/remove-lifecycle rotten |
There should be nothing blocking. Just drop the code and documentation and that should be it. |
Ok #1941 will mark this one as done |
What would you like to be added:
Deprecate and eventually remove support for hooks in the
local
feature source.Why is this needed:
In #855 @eero-t had a merituos pondering why hooks should removed. Some rationale why hooks are bad and we want to disable them:
Plan
The text was updated successfully, but these errors were encountered: