-
Notifications
You must be signed in to change notification settings - Fork 6.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update the calico crd archive download url #12087
base: master
Are you sure you want to change the base?
Conversation
Signed-off-by: Ekko <lihai.tu@daocloud.io>
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: 0ekk The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/ok-to-test |
Do we have more background on that ? I haven't found anything related to the cause of that change. |
Checksum of calico crd archive has been changed due to the github compression settings. More details please see the discussion on the comments of #12077 |
Somehow I didn't see the end of the discussion. https://docs.github.com/en/repositories/working-with-files/using-files/downloading-source-code-archives#stability-of-source-code-archives specifically mention for security purpose we should rely on releases. |
That would be a bit more costly for download, but on the plus side the binaries and containers images are included, so we might be able to save on that. |
If the cost of normal download time or retry time due to network instability when downloading large files can be ignored, then using the release-.tgz artifact can be a better choice indeed. |
The bulk of the size of the file seems to be container images (in tar format). With the correct adaptions they could be reused instead of downloaded separately, but I'm not sure how well the download role can handle that, though. |
Yes ideally we would use the release-xyz.tgz from the releases page. I would go for the releasse-xyz.tgz if possible, not sure what is needed to change. Alternative could be to ask the calico team to release the tarball that we need. |
I think the current state (occasional change of the hash with github changing compression settings) is acceptable for now as long as we know about it. We should still go towards using the release-xyz.tgz artifacts, but OTOH I don't think it's worth it to change to the api endpoint in the meantime ; that way we save one "migration". |
PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
What type of PR is this?
/kind feature
What this PR does / why we need it:
As we know from #12077, currently obtaining the URL of the calico crd archive is unstable and may cause checksum failure after a period of time, so it is changed to the more recommended api access method of github.
Here is a script to get sha256 of them:
Which issue(s) this PR fixes:
Fixes #
Special notes for your reviewer:
Does this PR introduce a user-facing change?: