-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[release-0.14] 🐛 inherited defaults not respected in cache BuilderWithOptions #2491
[release-0.14] 🐛 inherited defaults not respected in cache BuilderWithOptions #2491
Conversation
Hi @akalenyu. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/cc @joelanford |
Nvm we got rid of this code |
/ok-to-test Fix seems okay to me. Not sure if we are still actively maintaining this branch though (no strong opinions from my side) |
/lgtm |
@alvaroaleman WDYT? |
/lgtm cancel Would be good to have some unit test coverage |
I'd rather have ppl upgrade controller-runtime tbh |
So we have some release branches where we made the decision not to bump
As far as I can tell based on https://github.com/kubernetes-sigs/controller-runtime/commits/release-0.14
Let me know if you would accept this fix, then I can work on some. Note, like you mention above, |
Can you elaborate, I don't understand what you mean. Are there blockers which prevent you from bumping to 0.16? If yes, I would prefer getting those resolved over maintaining 0.14 indefinitely Edit: Ah wait, you already bumped on the main branch, but you have older branches with older CR versions that you have to maintain? |
Yup |
2270f10
to
2b0d261
Compare
Alright, sounds fine from my side. @alvaroaleman Fine for you as well? |
Today, controller runtime mistakenly ignores the inherited Manager default dynamic mapper and uses a discovery mapper instead: kubernetes-sigs/controller-runtime#2491 This means that if some CRD was not available on the cdi-controller startup, Even if it got installed after, we would still get IsNoMatch when trying to access it. Signed-off-by: Alex Kalenyuk <akalenyu@redhat.com>
yeah okay, fair |
When using BuilderWithOptions the inherited (manager/cluster) options are lost. If they were provided, they are stronger than the cache package defaults. (Overrides default dynamic mapper in my case) Signed-off-by: Alex Kalenyuk <akalenyu@redhat.com>
2b0d261
to
f27befe
Compare
When using BuilderWithOptions some of the inherited (manager/cluster) options are lost.
If they were provided, they would be stronger than the cache package defaults
(In my case, the default dynamic mapper is overridden with discovery).
From a quick look at 0.15/0.16 this is not an issue there.