-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make ConditionCheck container names DNS-safe #3394
Conversation
/assign @imjasonh @afrittoli @vdemeester |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We use our own method in the names package to generate truncated names, we should stay consistent here too.
If we decide to move to kmeta in all places we can discuss that too but that seems like a bigger piece of work.
TIL, I can try to find it and use that instead. |
My recent change uncovered a latent bug where especially long test names result in especially long container names, which fails certain validations. Unfortunately it slipped in because the test was expected to fail. This leverages the names.SimpleNameGenerator.RestrictLength helper to solve this problem. Fixes: tektoncd#3393
Alright, I think this is now done. LMK if this is/isn't what you meant. |
/lgtm |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks!
/approve
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: afrittoli The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Changes
My recent change uncovered a latent bug where especially long test names result in especially long container names, which fails certain validations. Unfortunately it slipped in because the test was expected to fail.
This leverages an upstream helper we created to solve ~exactly this problem. You get DNS-safe short names based on an input name and a suffix, which are deterministic, and are friendly for suitably short inputs.
Fixes: #3393
Submitter Checklist
These are the criteria that every PR should meet, please check them off as you
review them:
See the contribution guide for more details.
Double check this list of stuff that's easy to miss:
cmd
dir, please updatethe release Task to build and release this image.
Reviewer Notes
If API changes are included, additive changes must be approved by at least two OWNERS and backwards incompatible changes must be approved by more than 50% of the OWNERS, and they must first be added in a backwards compatible way.
Release Notes
/kind bug