-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Migrate to new networking.k8s.io/v1beta1 package #4127
Conversation
36912e3
to
90aab26
Compare
@cmluciano not sure yet |
Codecov Report
@@ Coverage Diff @@
## master #4127 +/- ##
=========================================
Coverage ? 57.48%
=========================================
Files ? 87
Lines ? 6534
Branches ? 0
=========================================
Hits ? 3756
Misses ? 2345
Partials ? 433
Continue to review full report at Codecov.
|
@cmluciano ok, |
Cool, do you think those leader elect failures are related to the api change moving between different versions? |
No. This was related to missing permission to change the configmap when the ingress class is |
24b69c0
to
f56fb5f
Compare
/test pull-ingress-nginx-test |
/test all |
/retest |
/test pull-ingress-nginx-e2e-1-12 |
2d80850
to
97ec90e
Compare
/retest |
8c55ea3
to
8bee39e
Compare
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: aledbf, ElvinEfendi The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
We have non-RBAC enabled cluster running 1.14.6 on AKS. After upgrading NGINX to 0.25.0 our ingress will no longer resolve to anything but the default route (all other routes currently return a 404). The release notes for 0.25.0 state "please make sure to update the ClusterRole required for the new networking.k8s.io/v1beta1 Ingress API", so I'm thinking the issue may have something do to with this PR? A couple question: 1) does that assumption sound correction given the issues we're having with our ingress? 2) is an update to the ClusterRole required to go along with this PR? 3) if either 1 or 2 are correct how would we resolve the issue for a non-RBAC enabled cluster? |
Also are we required to change the |
@aledbf |
What this PR does / why we need it:
Migrates from the
extensions
package to the new onenetworking.k8s.io/v1beta1
.There are some restrictions:
Migrates from the
"k8s.io/api/networking/v1beta1"
package to"k8s.io/api/networking/v1beta1"
for Kubernetes versions >= 1.14.0 and keeps the extension package for older versions.Which issue this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close that issue when PR gets merged): fixes #replaces #4081
Special notes for your reviewer: