Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rmv blue-green plugin for native builds #62

Merged
merged 3 commits into from
Jun 19, 2024
Merged

Rmv blue-green plugin for native builds #62

merged 3 commits into from
Jun 19, 2024

Conversation

srinikitha09
Copy link
Contributor

@srinikitha09 srinikitha09 commented Oct 24, 2023

This plugin has not been updated since ages and moreover, it uses the deprecated cf api v2. As we want to use cf api v3, either the plugin should be updated accordingly or we should get rid of the dependency on it.

@srinikitha09 srinikitha09 marked this pull request as ready for review October 24, 2023 14:09
@o-liver
Copy link
Member

o-liver commented Oct 24, 2023

Before we merge this we should add an error to the cloudFoundryDeploy step in Piper that fails the step at the beginning if it is misconfigured: i.e. if cf push (maven and npm) is used instead of cf deploy (mta). That way we have a clean error message, rather than letting the deployment fail with something cryptic from the cf cli.

@anilkeshav27
Copy link
Member

Before we merge this we should add an error to the cloudFoundryDeploy step in Piper that fails the step at the beginning if it is misconfigured: i.e. if cf push (maven and npm) is used instead of cf deploy (mta). That way we have a clean error message, rather than letting the deployment fail with something cryptic from the cf cli.

could we also announce this in the community meeting, before rolling out a breaking change in the cf cli docker image . we would need to gracefully remove this parameter : https://www.project-piper.io/steps/cloudFoundryDeploy/#deploytype and its functionality from the step and the alternative could be the rolling deployment https://docs.cloudfoundry.org/devguide/deploy-apps/rolling-deploy.html via the piper parameter https://www.project-piper.io/steps/cloudFoundryDeploy/#cfnativedeployparameters . but we would need to give time to existing users to make this switch

@o-liver
Copy link
Member

o-liver commented Oct 24, 2023

Before we merge this we should add an error to the cloudFoundryDeploy step in Piper that fails the step at the beginning if it is misconfigured: i.e. if cf push (maven and npm) is used instead of cf deploy (mta). That way we have a clean error message, rather than letting the deployment fail with something cryptic from the cf cli.

could we also announce this in the community meeting, before rolling out a breaking change in the cf cli docker image . we would need to gracefully remove this parameter : https://www.project-piper.io/steps/cloudFoundryDeploy/#deploytype and its functionality from the step and the alternative could be the rolling deployment https://docs.cloudfoundry.org/devguide/deploy-apps/rolling-deploy.html via the piper parameter https://www.project-piper.io/steps/cloudFoundryDeploy/#cfnativedeployparameters . but we would need to give time to existing users to make this switch

The deployType parameter is still relevant for mta deployments though. Is it enough to change the documentation? We could also describe the rolling deployment as an alternative in the deployType documentation.

Of course it's good to announce this in a community meeting. How much time would you propose for users to make the switch? 3 months?

@anilkeshav27
Copy link
Member

anilkeshav27 commented Oct 25, 2023

Of course it's good to announce this in a community meeting. How much time would you propose for users to make the switch? 3 months?

yes 3 months is a good time. along with the announcement about rolling deployment . after 3 months we should carve out this piece of code from the cf deploy step and not support the functionality , parallely also remove the plugin from the docker image

if we remove the plugin today from the docker image and keep the code and the functionality in the cf deploy step, then we end up with a call to cf blue-green-deploy which will fail saying the plugin is not available .

i would like to avoid this as a breaking change for native cf users.

@o-liver
Copy link
Member

o-liver commented Oct 25, 2023

Of course it's good to announce this in a community meeting. How much time would you propose for users to make the switch? 3 months?

yes 3 months is a good time. along with the announcement about rolling deployment . after 3 months we should carve out this piece of code from the cf deploy step and not support the functionality , parallely also remove the plugin from the docker image

if we remove the plugin today from the docker image and keep the code and the functionality in the cf deploy step, then we end up with a call to cf blue-green-deploy which will fail saying the plugin is not available .

i would like to avoid this as a breaking change for native cf users.

I also discussed the option of keeping the plugin in the image, as the plugin still works but just runt into a rate limit if one uses it too heavily, with @1084565. We still want to remove it finally, as this plugin is not maintained and will give us trouble sooner or later wrt compliance.

Then the task is now to show a deprecation warning in the cloudFoundryDeploy step, if somebody has this setup. In that message we should refer to the rolling update possibility and how to configure that in the cloudFoundryDeploy step. Additionally we will also add this information into the documentation of this step. @srinikitha09 Could you do this with the ongoing task?

I will block this PR for the next 3 months.

Copy link
Member

@o-liver o-liver left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Blocked until end of January 2024

@srinikitha09
Copy link
Contributor Author

@o-liver any update on this?

@o-liver
Copy link
Member

o-liver commented Feb 1, 2024

@o-liver any update on this?

Thanks for the reminder. We will work on this ASAP. FYI @kaylinche we should plan this accordingly. As mentioned by @anilkeshav27 we should simultaneously remove this.

@srinikitha09
Copy link
Contributor Author

Do we still have any issues from merging this PR?

Copy link

@kaylinche kaylinche left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The changes are fine with me. The announcement time for the deprecation is also over.

@o-liver
Copy link
Member

o-liver commented Mar 13, 2024

Is the Piper code adjusted? Because Piper uses the latest tag for this docker image and might fail if we have not adjusted the cloudFoundryDeploy step beforehand.

@srinikitha09
Copy link
Contributor Author

Any objections to merge this PR now? The due date is already over.

@kaylinche
Copy link

Any objections to merge this PR now? The due date is already over.

No objections from my end.

Copy link
Member

@o-liver o-liver left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ready to merge

@srinikitha09 srinikitha09 merged commit 8c21786 into master Jun 19, 2024
6 of 7 checks passed
@srinikitha09 srinikitha09 deleted the rmv_bg branch June 19, 2024 09:30
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants