Fix: Configurable Docker image of xcom_sidecar#32858
Fix: Configurable Docker image of xcom_sidecar#32858eladkal merged 5 commits intoapache:mainfrom pegasas:main
xcom_sidecar#32858Conversation
|
Congratulations on your first Pull Request and welcome to the Apache Airflow community! If you have any issues or are unsure about any anything please check our Contribution Guide (https://github.com/apache/airflow/blob/main/CONTRIBUTING.rst)
|
|
related to issue: #32805 |
jscheffl
left a comment
There was a problem hiding this comment.
I just made a dry run code-reading (yet) would take 1-2 days until I'd be able to do a full test.
Besides one comment where I expect that a default matching to todays hard coded values is expected, I miss any kind of documentation. We don't want the users having to read the code to discover all secret options. Can you add some?
Hi, @jens-scheffler-bosch , the document has been added in previous pull request https://github.com/apache/airflow/pull/26766/files |
Ah, I see. Was not aware of this "legacy". Still for a user hard to find so not knowing about this feature maybe you rather stumble over it by crawling the source. |
jscheffl
left a comment
There was a problem hiding this comment.
Tested and the exposure of the image and resource spec works.
I'd wish for a bit better documentation but other than this (has not been better in the past) I would vote for getting it merged.
Note: I'm not a committer so my approval is just a emotional support, has no value :-D
Quite the opposite. It does have a value as committer see it and read the comments and reviews/approval :) The change looks good. But I have one comment here. It would be a bit of a problem IF we would not have clarified our security model recently - see https://airflow.apache.org/docs/apache-airflow/stable/security/index.html and "Capabilities of authenticated UI users". Without this clarification added - this change could be seen as security issue, because the user who could configure the connection, could also configure a completely different image and perform Remote Code Execution (which is quite surprising for the user who - from the first glance - can just configure connections). But in our Security model we have it clear that this is expected:
So yeah. It looks good (in this context). |
Thank @potiuk and @jens-scheffler-bosch for clarification! |
xcom_sidecar
|
Awesome work, congrats on your first merged pull request! You are invited to check our Issue Tracker for additional contributions. |
|
Thank you @pegasas ! |
Thanks @eladkal for spending your precious time on my first review! |
Description
The iamge of xcom_sidecar is not cunfigurable (code: xcom_sidecar.py#36). In our situation we can not access the "alpine" image from the docker image registry. Then the pod will not be started because the pulling of image failed.
Therefore it would be very nice that the image of xcom_sidecar is configurable so that we can pass an image hosted by our registry.
I see there was a merged PR about this feature #26766. But the changes was deleted in the commit a1f5a54.
Could you please review it and add this feature again? Thanks!
Use case/motivation
Usecase:
Use KubernetesPodOperator with do_xcom_push=True in an environment which can not access docker image registry.
Related issues
PR #26766 deleted in a1f5a54
^ Add meaningful description above
Read the Pull Request Guidelines for more information.
In case of fundamental code changes, an Airflow Improvement Proposal (AIP) is needed.
In case of a new dependency, check compliance with the ASF 3rd Party License Policy.
In case of backwards incompatible changes please leave a note in a newsfragment file, named
{pr_number}.significant.rstor{issue_number}.significant.rst, in newsfragments.