-
Notifications
You must be signed in to change notification settings - Fork 330
[Feat] Add imagePullSecrets support for router and cache-server deplo… #762
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Summary of ChangesHello @HanFa, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request significantly enhances the Helm chart's flexibility by introducing comprehensive support for Highlights
Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here. You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension. Footnotes
|
…yment. Signed-off-by: Fang Han <fhan0520@gmail.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code Review
This pull request adds support for imagePullSecrets to the router and cache-server deployments, allowing images to be pulled from private container registries. The changes include updates to Helm templates, values.yaml, values.schema.json, and the README.md. New tests have also been added to verify the functionality for multiple components.
My review focuses on improving documentation consistency and test robustness. I've pointed out an inconsistency in the cacheserverSpec documentation and suggested a more consistent structure for image-related properties. I've also recommended strengthening the assertions in the new test file to ensure they are more comprehensive.
| | `cacheserverSpec.image.repository` | string | `"lmcache/lmstack-cache-server"` | Docker image repository for the cache server | | ||
| | `cacheserverSpec.image.tag` | string | `"latest"` | Docker image tag for the cache server | | ||
| | `cacheserverSpec.image.pullPolicy` | string | `"Always"` | Image pull policy for the cache server | | ||
| | `cacheserverSpec.imagePullSecrets` | list | `[]` | Image pull secrets for private container registries | |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This new parameter cacheserverSpec.imagePullSecrets is being added at the top level of cacheserverSpec, while other image-related parameters like repository are documented as being under an image object. However, the implementation in helm/templates/deployment-cache-server.yaml actually uses flat properties (e.g., .Values.cacheserverSpec.repository), which makes the existing documentation for image.repository incorrect. Also, imagePullPolicy is hardcoded in the template and not configurable as the README suggests.
To improve consistency and clarity, it would be best to refactor all image-related properties for cacheserverSpec to be under an image object, including this new imagePullSecrets parameter. This would also be a good opportunity to fix the incorrect documentation for the other image parameters.
| - template: deployment-router.yaml | ||
| equal: | ||
| path: spec.template.spec.imagePullSecrets[0].name | ||
| value: router-secret | ||
| - template: deployment-vllm-multi.yaml | ||
| equal: | ||
| path: spec.template.spec.imagePullSecrets[0].name | ||
| value: model-secret | ||
| - template: deployment-lora-controller.yaml | ||
| equal: | ||
| path: spec.template.spec.imagePullSecrets[0].name | ||
| value: lora-secret | ||
| - template: deployment-cache-server.yaml | ||
| equal: | ||
| path: spec.template.spec.imagePullSecrets[0].name | ||
| value: cache-secret |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The assertions in this test case could be more robust. Instead of checking just the name of the first secret with path: spec.template.spec.imagePullSecrets[0].name, it would be better to assert the entire imagePullSecrets list. This ensures the structure is exactly as expected and would catch issues if more properties were added to the secret reference in the future.
For example, the assertion for the router could be:
- template: deployment-router.yaml
equal:
path: spec.template.spec.imagePullSecrets
value:
- name: router-secretThis is similar to how the individual component tests are structured earlier in this file.
zerofishnoodles
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
…yment.
FIX #761
Now all types of containers should be able to pull from a private image repository.
BEFORE SUBMITTING, PLEASE READ THE CHECKLIST BELOW AND FILL IN THE DESCRIPTION ABOVE
-swhen doinggit commit[Bugfix],[Feat], and[CI].Detailed Checklist (Click to Expand)
Thank you for your contribution to production-stack! Before submitting the pull request, please ensure the PR meets the following criteria. This helps us maintain the code quality and improve the efficiency of the review process.
PR Title and Classification
Please try to classify PRs for easy understanding of the type of changes. The PR title is prefixed appropriately to indicate the type of change. Please use one of the following:
[Bugfix]for bug fixes.[CI/Build]for build or continuous integration improvements.[Doc]for documentation fixes and improvements.[Feat]for new features in the cluster (e.g., autoscaling, disaggregated prefill, etc.).[Router]for changes to thevllm_router(e.g., routing algorithm, router observability, etc.).[Misc]for PRs that do not fit the above categories. Please use this sparingly.Note: If the PR spans more than one category, please include all relevant prefixes.
Code Quality
The PR need to meet the following code quality standards:
pre-committo format your code. SeeREADME.mdfor installation.DCO and Signed-off-by
When contributing changes to this project, you must agree to the DCO. Commits must include a
Signed-off-by:header which certifies agreement with the terms of the DCO.Using
-swithgit commitwill automatically add this header.What to Expect for the Reviews
We aim to address all PRs in a timely manner. If no one reviews your PR within 5 days, please @-mention one of YuhanLiu11
, Shaoting-Feng or ApostaC.