-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Podman Compatibility and Enhance Kind cluster setup #11086
base: main
Are you sure you want to change the base?
Conversation
Signed-off-by: see-quick <maros.orsak159@gmail.com>
Why most of the already existing commands are now started via |
Mainly because we have to run kind of as |
Signed-off-by: see-quick <maros.orsak159@gmail.com>
Signed-off-by: see-quick <maros.orsak159@gmail.com>
…on required. Signed-off-by: see-quick <maros.orsak159@gmail.com>
Signed-off-by: see-quick <maros.orsak159@gmail.com>
Signed-off-by: see-quick <maros.orsak159@gmail.com>
/azp run acceptance |
Azure Pipelines successfully started running 1 pipeline(s). |
Signed-off-by: see-quick <maros.orsak159@gmail.com>
Signed-off-by: see-quick <maros.orsak159@gmail.com>
Signed-off-by: see-quick <maros.orsak159@gmail.com>
Signed-off-by: see-quick <maros.orsak159@gmail.com>
} | ||
|
||
function label_node { | ||
# It should work for all clusters | ||
for nodeName in $(kubectl get nodes -o custom-columns=:.metadata.name --no-headers); | ||
for nodeName in $($SUDO kubectl get nodes -o custom-columns=:.metadata.name --no-headers); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
should $SUDO be used everywhere?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah, because if do not execute with sudo you will not see kind cluster
as we previously started kind as sudo
/packit test --labels acceptance |
// Kaniko pushes the image to the local registry, but Podman stores it in an internal storage | ||
// that is not directly accessible to Kind. Podman must first pull the image from the registry | ||
// so that it is available in the Podman daemon's local storage before "kind load" can work. | ||
Exec.exec("sudo", "podman", "pull", image); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
what if I will use kind with docker?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think I should add some wrapper to check your container runtime and base on that just use podman/docker.
Type of change
Description
This PR introduces Podman compatibility to the KIND cluster setup script. It seamlessly allows users to use Docker or Podman as their container runtime. The changes ensure proper configuration and support for Kubernetes cluster provisioning.
Checklist