-
-
Notifications
You must be signed in to change notification settings - Fork 356
Bump k8s-openapi
to 0.25.0
#1756
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Signed-off-by: clux <sszynrae@gmail.com>
Signed-off-by: clux <sszynrae@gmail.com>
Signed-off-by: clux <sszynrae@gmail.com>
based on requirements downstream from msrv check Signed-off-by: clux <sszynrae@gmail.com>
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #1756 +/- ##
=======================================
+ Coverage 76.2% 76.5% +0.3%
=======================================
Files 84 84
Lines 7889 7887 -2
=======================================
+ Hits 6006 6026 +20
+ Misses 1883 1861 -22
🚀 New features to boost your workflow:
|
…roots Signed-off-by: clux <sszynrae@gmail.com>
Signed-off-by: clux <sszynrae@gmail.com>
Is it documented anywhere that client-go specifically has a policy of supporting the last five versions? k8s-openapi's policy is based on looking at what's supported in public clouds. If client-go's policy is documented to be that, then I can have k8s-openapi do the same in the future. |
I think client-go used to follow the skew-policy of 3 but i see that's now replaced with a generic Tbh, I just chose a fairly arbitrary line in the sand of 5 releases in website pr and no one objected. At the time it was stricter than k8s-openapi used to be (iirc you used to bundle like 6 versions). I don't think it's a particularly huge deal. Support for older spec structs generally means you want to use older alpha/beta apis past their prime, and it's kind of OK to not have us keep removed alpha/beta code around for this. I am happy to revise our policy. It's easiest for us to test The only issue with what you've written there is that it's not something i can translate into a clear policy. A static N versions would be great (be it 3 or 4 or 5) / tracking Kubernetes maintenance eol also works. A script to determine from clouds might be fine (but i imagine the output of these scripts would be region dependent, and dependent on which clouds we prioritize). I see alibaba supports 1.28 still. |
Okay, I can start doing latest five versions from next release.
Yes, I'm not aware of such a script, especially one that can be used without being a customer of that cloud. I just eyeball the web pages right now.
Yes, ACK always seems to support one version older than everyone else so I decided to stop considering it for this release to see if anyone complains. |
if you do want to do In either case, I appreciate it. |
Change via k8s-openapi CHANGELOG.
Kubernetes Minimum
Less supported versions from
k8s-openapi
this time so it kind of screws with our version-policy a bit, as we cannot test what is not in k8s-openapi. Effectively we now only have 3 Kubernetes versions between latest and MK8SV.MSRV
Bumps MSRV one version to 1.82.0 based on lowest found in the msrv check.
log output
via failing msrv job
Deny
Excludes a temporary duplicate webpki-roots (at 1.0 and 0.26) and allows it's new license (it's an optional dep anyway).
Via deny job failure.
Clippy
Nice lint from wait.rs to use
Option::is_none_or
:clippy output
Plan is still to proceed with 1.0 after. Not heard anyone else have big concerns about it.