-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Doc: How to use generate name to replay Task #685
Comments
Thanks for reporting this issue @skeeey. One way to solve this issue is to delete the It may be addressed in tekton CLI, where it says Any other suggestions or thoughts @vdemeester @bobcatfish ? |
Agreeing with @hrishin 👼 That said, there is a concept of
cc @bobcatfish |
I think it may be better to have an incremental number (ie -1 -2 -3 etc..) than random suffix, |
I think in this case, the resource is changed, I change the
to
from the code, the problem is the judgement In my case, at the first round, the reconciler handles the I understand the So I think we may need to enhance the taskRunInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{
AddFunc: impl.Enqueue,
UpdateFunc: func(old, new interface{}) {
oldtaskrun := old.(*v1alpha1.TaskRun)
newtaskrun := new.(*v1alpha1.TaskRun)
if !reflect.DeepEqual(oldtaskrun.Spec, newtaskrun.Spec) {
impl.Enqueue(new)
}
},
}) then we need remove the Any suggestions or thoughts @hrishin @vdemeester @bobcatfish @chmouel? |
My thought is : a That's why I think we should look into supporting |
@vdemeester thanks for your clarify, If we don't want to update a taskrun, I think the |
If we use
|
How about refusing a user to modify a Run that has ended by admission webhooks? |
@runzexia that could be an option. Right now our admission webhooks are pretty simple though (aka they don't use the k8s api) @zxDiscovery maybe yes 👼 This works as is with |
Yeah this makes sense to me. If we're going to stray from k8s and prevent modifications, we should enforce that somehow. |
@skeeey thanks for the detailed explanation of the
Agree! If someone wants to write this up in an issue I'd be super grateful! :D |
I've updated the "expected behavior" in the description to reflect our discussion |
Hi all, I was deploying Tekton in our AKS to do CI/CD, and I ran into the problem to replay taskRuns and PipelineRuns. I understand what is the current behavior, but can someone tell me how is doing the CI/CD with this behavoir?? Is it mandatory to delete the TaskRuns or PipelineRuns and recreate? Are you creating Runs with differents names? Thank you |
Yes
Yes, some ways are already mentioned in the above thread. Other ways to start the pipeline is to use |
Thank you @hrishin, yes it does! Is there any way to automatize this process or anyone has this process automatized? |
@guillermobandres so, An example is the use of |
I am willing to close this issue as, as of today you can use /cc @bobcatfish @dibyom @sbwsg |
👍 sgtm |
/close |
@vdemeester: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
is the workaround with |
@tuananh I don't know if it's documented in the official docs, but I wrote an Q&A here https://stackoverflow.com/a/69880097/4964553 |
Expected Behavior
It should be possible to use
generateName
like functionality to createTaskRun
yaml definitions such that the definition in a yaml file can be reapplied.Actual Behavior
I cannot reapply a
taskrun
when thetaskrun
failsSteps to Reproduce the Problem
taskrun
with a brokentask
referencethen check the
taskrun
status bykubectl get taskrun echo-hello-world-task-run -o yaml
task
reference intaskrun
and apply it againtaskrun
still failed, note: the task reference has been changedAdditional Info
The text was updated successfully, but these errors were encountered: