Comments (8)
I agree, I think that metadata is stored in either those fields (can't remember which one) https://github.com/keel-hq/keel/blob/master/types/types.go#L76-L77. It could be checked by k8s and helm providers. Need to check but maybe the only change has to be made in this function https://github.com/keel-hq/keel/blob/master/util/version/version.go#L119:6 .
from keel.
I think this problem also applies to all versions with metadata such release candidates (rc). Sometimes (might be quite often) you might not want to update to release candidate your production workloads.
We need a bit more generic solution that would still be easy to use and useful. How about new label that would have something like keel.sh/version=strict
- skip all new versions that have metadata in the like pre release, release candidate.
Or it could be inverted, where you have to specify something to allow metadata in versions.
from keel.
You are correct, it applies to any SemVer tag formatted like so: vN.N.N-PreReleaseInfo
, where the PreReleaseInfo could be anything.
I like your idea of having something that's simple to use, and that label seems like it would handle most cases. I'm not sure I'm a huge fan of version
with a value of strict
because, at least in my mind, that's a bit ambiguous. If I saw that we were following strict versions, without knowing the context here, I'm not sure what I would assume the behavior is. I know this is absolutely bikeshedding, but how do you feel about something indicating it's a setting to do with pre-release
tags (keel.sh/prerelaseTags=true/false
) only because the SemVer spec refers to them as pre-release tags.
I think this solution would solve most deployment use cases, but for one of the use cases I had in mind with keel this solution wouldn't work for us. I can see situations, in keel, where I'd want the policy to be major
but I'd only want to support deploying pre-release tags for patch-level increases. Here's a quick breakdown then of what versions it would deploy for us:
v1.4.0
(yes)v1.4.1-rc1
(yes)v1.5.0
(yes)v1.5.0-rc1
(no)
Eventually I may want to relax the restrictions and have v1.5.0-rc1
get deployed too, but that would come after confidence is built in the SemVer processes + tooling we have. I think that's why I advocated for the more complex solution. Yes the additional complexity is there, but it gives consumers of the tool the power to really control the deployment flow without needing to write additional tooling or forking keel.
I was running out of energy when I opened this issue last night, and wasn't able to include a more concrete example of what I was thinking:
func stringToPolicyType(p string) types.PolicyType {
// imagine this would take "minor" and return `types.PolicyTypeMinor`
}
func stringToPreReleasePolicy(p string) types.PolicyType {
// imagine this would take "patch" and return `types.PolicyTypePreReleasePatch`
}
// assume cfg["policy"] lines up with the current policy setting,
// and that cfg["prerelease"] lines up with the pre-release values (same values as policy)
// cfg["policy"] = minor; cfg["prerelease"] = patch
// bit-wise AND to combine both conditions in to one integer
policy := stringToPolicyType(cfg["policy"]) & stringToPreReleasePolicy(cfg["prerelease"])
// we can then do bit-wise math to calculate the desired behaviors
// if our policy is a minor policy..
if policy&types.PolicyTypeMinor == types.PolicyTypeMinor {
// if this is a preRelease minor release, and our policy allows us to do minor pre-releases
// Note: because of the policy we defined above,
// the second half of this expression should evaluate to false
if isPreRelease(newVersion) && policy&types.PolicyTypePreReleaseMinor == types.PolicyTypePreReleaseMinor {
// do the thing
}
}
from keel.
Let's get back to this example with minor
policy, needs a little bit reordering:
- 1.4.0 (yes)
- 1.4.1-rc1 (yes)
- 1.5.0-rc1 (no)
- 1.5.0 (yes)
- 1.5.1 (yes)
Could we just make this default behaviour? patch
example:
- 1.5.0 (yes)
- 1.5.1-rc1 (no)
- 1.5.1 (yes)
Default behaviour - only allow minor
& path
pre-releases if policy is major
.
And same for minor/patch
versions (well, for patch no pre-releases would go through).
This would allow to safely upgrade to new versions. Policy all
would allow any upgrades.
I think this would work for your use case.
from keel.
In your first example, what if I want to test the 1.5.0-rc1
, but wouldn't want an automatic upgrade to 2.0.0
?
It's quite possible I'm not understanding what's being proposed, so let me try to make sure I understand. We'd have a flag that turns on support for managing pre-releases, and using that keel would make assumptions about how you want pre-release tags handled based on the policy you have selected.
- If this mode is enabled, keel will assume that for
patch
policy you only want to deploy patch changes and not patch-level pre-release tags. - If you're at the
minor
policy, you will deploy released minor and patch versions, and pre-release patch versions. - If you are at
major
, you will deploy released major, minor, and patch releases while deploying pre-release minor and patch tags? - If you are using the
all
policy, you'd get all versions (pre-release and stable).
from keel.
Hey there ! I'm reviving this with another idea:
I believe everything needs to stay the same in the keel.sh configs.
When image tag has a pre-release tag then it's a special case and keel should update bumps to that special tag only.
Like it was another docker repo.
from keel.
Trying something right now then 😄
from keel.
So that was quick, ShouldUpdate
allowed updates without checking the pre-release tag, so I just needed to add a check 😄
from keel.
Related Issues (20)
- Feature: Update non `images` fields HOT 2
- Assuming registry up-to-date status?
- Keel configuration to work behind a reverse proxy
- *v1beta1.CronJob: the server could not find the requested resource HOT 2
- Notifications feature proposal
- Website search bar not working
- Initial tag required? HOT 1
- High CPU usage HOT 5
- Fix documentation to add "Registry" webhook
- Bump helm chart release HOT 4
- Helm chart: Ingress not working with release name
- Add support for ntfy HOT 1
- Can keel handle multiple containers in a pod deployment? HOT 3
- Cannot use registry mirror
- keel is using deprecated api /apis/batch/v1beta1/cronjobs
- Helm chart still uses app version 0.19.1
- Timeout errors trying to use polling HOT 1
- Slack integration is broken
- Allow ignoring/skipping version
- GCP registry returns 404 on digest check
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from keel.