-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SDK/Compiler - Fix s3 artifact key names #1451
Conversation
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed (or fixed any issues), please reply here (e.g. What to do if you already signed the CLAIndividual signers
Corporate signers
ℹ️ Googlers: Go here for more info. |
Hi @kvalev. Thanks for your PR. I'm waiting for a kubeflow member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
I signed it! |
CLAs look good, thanks! ℹ️ Googlers: Go here for more info. |
/cc @eterna2 |
@Ark-kun: GitHub didn't allow me to request PR reviews from the following users: eterna2. Note that only kubeflow members and repo collaborators can review this PR, and authors cannot review their own PRs. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/ok-to-test |
/lgtm |
Hey @kvalev Can u do me a flavor for one last check? Can u update the compiler test data for artifact_location so that one of the key uses the dict instead of the k8s secretselector object? Just to be sure. I got lazy the last time and missed this bug. |
I am trying to figure out why this was not caught by the compiler unit test? |
Done @eterna2 . The bug was not caught, because the yaml template for the compiler test was wrong. |
@kvalev /Lgtm |
The golden test output was wrong in the same way. I remember that this part looked strange to me, but at that time I was busy and had no time to test that code path manually. I kind of assumed that the author would use their feature and thus test it. |
Nit: It's better to have refactorings and actual changes in separate PRs. Minimizing the PR diff is important for making the reviewing easier. For example, in |
/lgtm |
@kvalev Can you please tell us the scenario where you need to use this feature? We're planning to deprecate this feature in Pipelines once argoproj/argo-workflows#1350 is released in Argo 2.4. So we'd like to learn your use cases and to try steer you to more supported solutions. |
Well, I just started working with kubeflow/argo, so I was not aware that it can be configured at cluster level. This would probably not work in my case anyway, as my kubeflow cluster is managed by a third party, so it would not be possible for me to reconfigure it. Having the option to specify the artifact storage myself would be highly desirable, especially considering that it is not always possible to run the latest and greatest kubeflow version. If this functionality would be deprecated or even removed from the SDK, it might not be possible to work with an older kubeflow installation and people might be at the mercy of their providers. |
Hmm. Interesting. Does your org have a centralized kubeflow (pipelines?) cluster, managed by other people in your org? Do you want to use something like personal S3 bucket for data storage? BTW, another area where you'll have problems is secrets that are needed to access GCP services. They're also taken from the standard Kubernetes secret volumes that are store in cluster. The reason we want to deprecate this is so that the compiled pipeline can be shared between different cluster that might have different storage configurations. Also hard-coding service endpoints and secret names sounds bad. |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: Ark-kun The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Yeah something like that.
Personal S3 bucket or perhaps maybe Artifactory, which seems to be supported by the underlying model.
This is not an issue for on-premise solutions. |
Yeah. Should have spotted it earlier. My cluster was running on a hacked version (which is working) and hadn't time to swapped over to the supposedly more properly coded one. |
Can you please bump the latest release version, to include this fix? cc @Ark-kun |
The current implementation generates an incorrect s3 output artifact snippet:
Instead it should be:
Related PR: #1064
This change is