-
Notifications
You must be signed in to change notification settings - Fork 532
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Release of v1.0.0 #1693
Comments
We're happy to have help here. I know that @mstruebing was working on some things, but nothing too active. Please feel free to send PRs for any of those issues. Lately the main blocker has been regenerating the client for Kubernetes 1.30 |
Oh interesting, so there are some breaking changes with the kube API in 1.30? |
No, for some reason when I regenerate, the code isn't changing, the generation logic is stuck on 1.28.4, it's something in the script somewhere but I haven't had time to figure it out. |
For the complexity of middleware use, the current approach relies on reconstructing internals in order to improve our ergonomics of the client, we could create something like a
Long-term it'd be best to get something upstream into the generator as I doubt we are the only ones who have a need for overriding headers at request time. I've added an issue on the generator to track what I think would help clean this up: |
I just pushed |
@brendandburns any planned date where we can expect 1.0.0 release ..instead of |
@charankumarpalla no current date, is the |
No , we were planning to use latest |
@charankumarpalla it's as production ready as it's going to get. If you find bugs, we'll fix them. The main reason for the rc is that it contains many breaking changes because the code generator is different, so we need mileage on the code to see what works and what doesn't. We'd love for you to adopt the rc and provide feedback if things work or don't, that helps us move towards a 1.0.0 |
Yeah I second that, the main reason it’s not provided as production yet is because we don’t have much feedback on how much trouble (or not) it will cause. Anything in that regard would be very very helpful. |
Also chiming in to say that my team is also looking forward to a |
@brendandburns I'm curious about the value of the Is it important that when using 1.0.0-rc6 our cluster should be running at least v1.30.1 or above? We've been trying rc6 on a cluster running v1.28.9 and seeing some weirdness with update/create secret calls silently failing. Wondering if we should stick with rc4 for now (which is working fine) until we get our cluster upgraded to v1.30.1+ |
@rossanthony in theory a client generated from 1.30 should work correctly with a 1.28 cluster because of the three version compatibility commitment, especially for apis that are |
Will there be a 1.0.0-rc7, including the 1.30 compatibility using fetch? |
I guess at this time we could even make it 1.0.0 without an RC-tag. This way it would encourage more people to use it and issues are detected and fixed faster (probably). |
Yeah, I'm ok with releasing a |
Sounds good to me. |
Any update here? 1.31 has been released now with a patch update as well, will we see v1 for this package any time soon? |
@brendandburns |
As an additional data point: we've been using the 1.0 rc for a few months now in our production app without any issues. We mostly interact with the job APIs and watch functionality. We could even remove a bunch of hacky code to fix the broken datetime typings in the old version! 😄 |
Same here, 1.0-rc7 is work well for us! We ran into the issue fixed in #1937 last week though, and are looking forward to that being included in a 1.0 release 😄 |
Now that Node v23 is out, it might be worth adding it to the CI before dropping the "rc." The npm downloads by version seem to show good adoption of the v1.x branch (not as much as v0.x, but I think that is expected). |
@brendandburns Could I pain you back to this issue to help with a stable release here please 🙇 |
Can you please release a rc8 with the last v5 protocol update? |
I think that we are going to align the 1.0.0 release to the Kubernetes 1.32 API which is slated for 12/11. I will see about cutting an |
How's the aligned release for 1.0.0 with 1.32 looking? Noted 1.32 hasn't released yet, just want to make sure this release happens |
The Kubernetes 1.32 release and generated code has landed. I think we're ready to ship the 1.0.0 wdyt? |
+1 from me. |
+1 |
+1 I'm excited! |
The 1.0.0 release is now live on NPM! https://www.npmjs.com/package/@kubernetes/client-node/v/1.0.0 Closing this issue. |
Should the release-1.x branch be merged into master too? |
@xkabylgSICKAG that's being worked on. I believe we will rename |
I'm curious if anyone is actively working on further enhancements to the release-1.x branch? I'm keen to help get it over the finish line, if there's enough pending work to divide and conquer?
I noticed there are a couple of things mentioned:
There's also a snyk vulnerability with the version of the tar package being using in 1.0.0-rc4 and I noticed there are some @types in the dependencies which should be moved to devDependencies: https://github.com/kubernetes-client/javascript/blob/release-1.x/package.json#L57-L63
@brendanburns let me know if there's anything I can do to help? It's hard to know what might be in flight already, so wanted to check first before starting anything and potentially stepping on anyones toes.
The text was updated successfully, but these errors were encountered: