-
Notifications
You must be signed in to change notification settings - Fork 2.2k
Fix helm loglevel parsing #5860
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix helm loglevel parsing #5860
Conversation
Hi @ChrisDevo. Thanks for your PR. I'm waiting for a cert-manager member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
e51295f
to
e4e045d
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you for the PR @ChrisDevo ! I've left a comment about the cap on the upper log level.
deploy/charts/cert-manager/templates/cainjector-deployment.yaml
Outdated
Show resolved
Hide resolved
Issues go stale after 90d of inactivity. |
Stale issues rot after 30d of inactivity. |
…clusive) Signed-off-by: ChrisDevo <chris.devine@berkeley.edu>
Signed-off-by: ChrisDevo <chris.devine@berkeley.edu>
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
e4e045d
to
2882d4a
Compare
I generalised the fix so it works for arbitrary level values (fixes #5860 (comment)).
|
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @inteon and @ChrisDevo.
I noticed that global.logLevel
is not documented in the Helm README file, but that's a separate issue.
cert-manager/deploy/charts/cert-manager/README.template.md
Lines 77 to 86 in 65e78f3
| `global.imagePullSecrets` | Reference to one or more secrets to be used when pulling images | `[]` | | |
| `global.commonLabels` | Labels to apply to all resources | `{}` | | |
| `global.rbac.create` | If `true`, create and use RBAC resources (includes sub-charts) | `true` | | |
| `global.priorityClassName`| Priority class name for cert-manager and webhook pods | `""` | | |
| `global.podSecurityPolicy.enabled` | If `true`, create and use PodSecurityPolicy (includes sub-charts) | `false` | | |
| `global.podSecurityPolicy.useAppArmor` | If `true`, use Apparmor seccomp profile in PSP | `true` | | |
| `global.leaderElection.namespace` | Override the namespace used to store the ConfigMap for leader election | `kube-system` | | |
| `global.leaderElection.leaseDuration` | The duration that non-leader candidates will wait after observing a leadership renewal until attempting to acquire leadership of a led but unrenewed leader slot. This is effectively the maximum duration that a leader can be stopped before it is replaced by another candidate | | | |
| `global.leaderElection.renewDeadline` | The interval between attempts by the acting master to renew a leadership slot before it stops leading. This must be less than or equal to the lease duration | | | |
| `global.leaderElection.retryPeriod` | The duration the clients should wait between attempting acquisition and renewal of a leadership | | |
/lgtm
/approve
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: wallrj The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Pull Request Motivation
Proposed fix for this issue
Kind
Release Note