-
Notifications
You must be signed in to change notification settings - Fork 502
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
apt.kubernetes.io should keep old versions #234
Comments
Yes, this hit me today as well.... |
Is there a apt repo for the archives ? I need to deploy |
There is a new release 1.5.2 should we expect that 1.5.1 packages will be deleted? |
I guess the motivation may be to keep most folks on the latest version, which simplifies development, testing, and many other things, but this then means that:
without breaking their setup, unless all versions of Kubernetes are backward compatible -- which is probably going to be a bigger pain in the long run. Ultimately, not being able to set a fixed version therefore leads to configuration drift and snowflake servers, which is quite undesirable for any serious production usage. Thoughts? |
I think we might want to create virtual repos within our repo, e.g.
|
Yes, please! That would simplify things at our end 😄👍🏼
… On 23 Jan 2017, at 12:36, Ilya Dmitrichenko ***@***.***> wrote:
I think we might want to create virtual repos within our repo, e.g.
deb http://apt.kubernetes.io/ kubernetes-xenial-archive main # all packages we ever published
deb http://apt.kubernetes.io/ kubernetes-xenial-latest main # whatever is the latest
deb http://apt.kubernetes.io/ kubernetes-xenial-1.5 main # always latest 1.5.x
deb http://apt.kubernetes.io/ kubernetes-xenial-1.4 main # always latest 1.4.x
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub, or mute the thread.
|
Can you guys tell us when this new and desired feature can be implemented? |
Is the expectation here that users are going to build the debs themselves and host them in their own apt repository? In my particular use-case, as a security requirement, we isolate certain groups of pods on their own Kubernetes nodes. We have a process dynamically creating and destroying these nodes as needed. If the version of kubernetes in the apt repo changes and the old one goes away, my cluster will break, because my new dynamic worker nodes will start being created with the wrong version of kubelet on them! |
With the switch to rbac on by default for kubeadm for 1.6, we need to allow users to be pinned to an old version. I'm happy to help make this happen. What needs to be done? @luxas @mikedanese @ixdy @errordeveloper |
How many point and major releases do we want to keep around? Do we want to keep around multiple point releases of a major release? What if a deb has known security vulnerabilities? |
I'd say keep everything, but it doesn't have to be all in the same package stream, e.g. we can have an archive channel.
Perhaps archive channel would be a good answer to this? |
Maybe two archives one with all the stable major releases (e.g., 1.4.8 or whatever the best and latest point release for 1.4 was) and one with everything? |
Sorry for not responding earlier. This got lost in the noise. I'm thinking at least 2 major versions. Perhaps 2-3 minor versions for each. But, at the end of the day, is there a reason not to keep them all? What is the argument against? |
I also agree that we should have all in archive chanel and latest stable with stable chanel and next pre release in unstable chanel. |
i think this is somehow related #281 |
The reason for having all versions available is the cases where someone pins to a particular version (like me) and then tries to set up new k8s nodes... having it all break since the particular version was no longer available. |
i agree. in automatic provision scenarios of new nodes not having old versions causes real trouble |
We've just had this trouble today when adding more nodes:( |
For alle that were in real trouble today like me... I had luck and could restore the deb files from the apt cache of a three day old node. Installation by dpkg and after that an apt-get update and apt-get -f install to satisfy the broken dependenccies saved me |
@mikedanese -- I thought you had this? Can you restore these? |
It was not possible to keep the old kubeadm because it was a 1.6.0-alpha which sorted higher then 1.6.0 so it would have taken priority over the stable release. This should not happen again moving forward since an alpha will never been in the stable repo. |
Here is what is currently hosted on the repo.
We have the old versions of CNI, kubelet and kubectl. I also see a In any case, users can download the old kubeadm from https://storage.googleapis.com/kubernetes-release/release/v1.5.6/bin/linux/amd64/kubeadm. |
Joe, the most recent version of kubeadm in the deb repo (and only version before yesterday) was I expect that removing this package is what broke people? |
I suspect that is what broke folks. But I'm a bit confused because it looks like there is a 1.5.6 package. Perhaps that is because we built 1.5.6 after we changed up the version numbers in this repo? |
@jbeda, I did a 1.5.6 release yesterday since 1.5.6 was also released yesterday. I pushed kubeadm accidentally even though we were not using the release-1.5 branch for kubeadm and noticed because of kubernetes/kubeadm#213, then left it because 1.6.0 is broken. I'm going to remove it (reasons for that in the linked issue) after 1.6.1 kubeadm is released |
Sweet! Thanks! |
Thanks @mikedanese. I think the best we can do at this point is document this someplace. I'm going to file a docs bug on this. |
@mikedanese to summarize: Generally speaking you would keep older releases i nsome repoditory, just for 1.6.0 it did not work out, because the NVR was broken? |
add short url for 1.12 release info
It would be very desired to have all or at least last few releases would be available in the repository.
The text was updated successfully, but these errors were encountered: