-
Notifications
You must be signed in to change notification settings - Fork 827
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Refactor infra/gcp/... #516
Comments
Yes, it is absolutely worth pursuing. The bash ensure stuff is getting out of hand IMO. |
Shall we discuss the idea sometime and you can either volunteer yourself or
write enough that we can solicit other volunteers?
…On Mon, Dec 16, 2019 at 3:00 PM Christoph Blecker ***@***.***> wrote:
Yes, it is absolutely worth pursuing. The bash ensure stuff is getting out
of hand IMO.
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#516?email_source=notifications&email_token=ABKWAVA273YNPZVGHHLBLQTQZAB7FA5CNFSM4J3S77C2YY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGOEHANOXI#issuecomment-566286173>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABKWAVAGRJBN2KMPTHEC4A3QZAB7FANCNFSM4J3S77CQ>
.
|
@thockin just taking a walk into the issues, maybe this is related: #523 I also saw the discussion into the mailing list, in my opinion Terraform is the best way to do this :) I just don't think I have enough knowledge into that to help with the Terraform stuff, but anyway just putting the PR here (again) so we may have a follow up. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale |
/area cluster-mgmt |
Having dipped my toes into adding to this mess:
|
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
@fejta-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/remove-lifecycle rotten
Whatever we use, even if it's bash, we need:
In an ideal world, we would have:
Even though I'm not a terraform native, to me this sounds really aligned with terraform:
There might also be a middle ground where we want some common patterns described in yaml instead, e.g.
|
/reopen @hasheddan had also discussed possibly demoing crossplane for us (slack ref: https://kubernetes.slack.com/archives/CCK68P2Q2/p1611757501019900) |
@spiffxp: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@spiffxp preparing whenisgood as we speak :) |
this is going to be fun, using kubernetes to manage the kubernetes infrastructure :D |
An update on the current state of the bash in infra/gcp. Over the past few months, as I've worked to reconcile inconsistencies or unmanaged resources discovered via our automated audit PRs, I've been trying to nudge the bash in a consistent direction. The principles I've tried to follow are:
|
Ref: kubernetes#516 Move every bash script used for GCP operations to a separated folder. Signed-off-by: Arnaud Meukam <[email protected]>
Ref: kubernetes#516 Move every bash script used for GCP operations to a separated folder. Signed-off-by: Arnaud Meukam <[email protected]>
Ref: kubernetes#516 Move every bash script used for GCP operations to a separated folder. Signed-off-by: Arnaud Meukam <[email protected]>
/milestone v1.23 |
/milestone v1.24 |
Right now it is set up as "concept-first". For example "ensure-staging" says "all of these are staging-like" and "ensure-prod" says "all of these are prod-like". That makes it hard to get a sense of what any one project has going on.
I propose to refactor it to "project-first". One list of projects and each one says "I am prod like" or "I am staging like". Then I could simply say
ensure-project k8s-foo-bar
and all of the properties would be asserted.This is very close to terraform territory, but I don't know TF well enough to make the "utility" functions to not be so duplicated. @cblecker - is this worth pursuing?
The text was updated successfully, but these errors were encountered: