-
Notifications
You must be signed in to change notification settings - Fork 35
Claude/kubernetes migration plan kq jw d #358
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from 15 commits
Commits
Show all changes
16 commits
Select commit
Hold shift + click to select a range
3bbcc2a
Add Kubernetes manifests and CI workflows for de.NBI migration
claude 233484e
Fix kubeconform validation to skip kustomization.yaml
claude aa28e91
Add matrix strategy to test both Dockerfiles in integration tests
claude 9aa798b
Adapt K8s base manifests for de.NBI Cinder CSI storage
claude 0d90cf7
Add pod affinity rules to co-locate all workspace pods on same node
claude e8d4671
Merge remote-tracking branch 'origin/main' into claude/kubernetes-mig…
claude ed3075b
Fix CI: wait for ingress-nginx admission webhook before deploying
claude 6036d14
Fix CI: add -n openms namespace to integration test steps
claude e7cac75
Fix CI: retry kustomize deploy for webhook readiness
claude 173f3b8
Fix REDIS_URL to use prefixed service name in overlay
claude d144aeb
Merge branch 'main' into claude/kubernetes-migration-plan-KQJwD
t0mdavid-m 443ae24
Add Traefik IngressRoute for direct LB IP access
claude 9c0fa08
Fix CI: skip Traefik IngressRoute CRD in validation and integration t…
claude b783ff7
Fix IngressRoute service name for kustomize namePrefix
claude 5f8a5b2
fix: use ConfigMap as settings override instead of full replacement
claude b913b64
fix: add set -euo pipefail to fail fast on settings merge error
claude File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,18 @@ | ||
| apiVersion: traefik.io/v1alpha1 | ||
| kind: IngressRoute | ||
| metadata: | ||
| name: streamlit-traefik | ||
| spec: | ||
| entryPoints: | ||
| - web | ||
| routes: | ||
| - match: PathPrefix(`/`) | ||
| kind: Rule | ||
| services: | ||
| - name: streamlit | ||
| port: 8501 | ||
| sticky: | ||
| cookie: | ||
| name: stroute | ||
| httpOnly: true | ||
| sameSite: lax |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🧩 Analysis chain
🏁 Script executed:
Repository: OpenMS/streamlit-template
Length of output: 3169
🏁 Script executed:
Repository: OpenMS/streamlit-template
Length of output: 1785
🏁 Script executed:
Repository: OpenMS/streamlit-template
Length of output: 1640
🏁 Script executed:
Repository: OpenMS/streamlit-template
Length of output: 106
🏁 Script executed:
Repository: OpenMS/streamlit-template
Length of output: 941
🏁 Script executed:
Repository: OpenMS/streamlit-template
Length of output: 3044
IngressRoute resources are not validated by kubeconform in either stage
The CI skips validation of Traefik IngressRoute manifests at line 26 (base validation ignores by filename) and line 39 (overlay validation skips by kind). This appears intentional—kubeconform validates only core Kubernetes API resources using official OpenAPI schemas; CRDs like IngressRoute require custom schema providers or manual dry-run validation.
However, this creates an unmonitored path for IngressRoute manifest changes. If validation of Traefik CRD syntax is desired, consider adding a schema-based validation step (e.g., using Traefik's CRD schemas) or enabling CRD validation via a custom kubeconform schema provider, rather than silently skipping the resource kind.
🤖 Prompt for AI Agents