Skip to content

Conversation

@petr-muller
Copy link
Member

Conditional risk names are used as a Reason field values when the risk
applies and CVO sets up the Recommended condition. Hence, the risk
names need to be valid Reason field values.

xref: openshift/cincinnati-graph-data#4059

Conditional risk names are used as a `Reason` field values when the risk
applies and CVO sets up the `Recommended` condition. Hence, the risk
names need to be valid Reason field values.
@openshift-ci-robot openshift-ci-robot added jira/severity-moderate Referenced Jira bug's severity is moderate for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. jira/invalid-bug Indicates that a referenced Jira bug is invalid for the branch this PR is targeting. labels Sep 1, 2023
@openshift-ci-robot
Copy link

@petr-muller: This pull request references Jira Issue OCPBUGS-18454, which is invalid:

  • expected the bug to target the "4.14.0" version, but no target version was set

Comment /jira refresh to re-evaluate validity if changes to the Jira bug are made, or edit the title of this pull request to link to a different bug.

The bug has been updated to refer to the pull request using the external bug tracker.

Details

In response to this:

Conditional risk names are used as a Reason field values when the risk
applies and CVO sets up the Recommended condition. Hence, the risk
names need to be valid Reason field values.

xref: openshift/cincinnati-graph-data#4059

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Sep 1, 2023

Hello @petr-muller! Some important instructions when contributing to openshift/api:
API design plays an important part in the user experience of OpenShift and as such API PRs are subject to a high level of scrutiny to ensure they follow our best practices. If you haven't already done so, please review the OpenShift API Conventions and ensure that your proposed changes are compliant. Following these conventions will help expedite the api review process for your PR.

@openshift-ci openshift-ci bot added the size/S Denotes a PR that changes 10-29 lines, ignoring generated files. label Sep 1, 2023
@openshift-ci openshift-ci bot requested review from jwforres and mfojtik September 1, 2023 13:37
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Sep 1, 2023

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: petr-muller
Once this PR has been reviewed and has the lgtm label, please assign spadgett for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Sep 1, 2023

@petr-muller: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

// +kubebuilder:validation:Required
// +kubebuilder:validation:MaxLength=1024
// +kubebuilder:validation:MinLength=1
// +kubebuilder:validation:Pattern=`^[A-Za-z]([A-Za-z0-9_,:]*[A-Za-z0-9_])?$`
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm conflicted about this. If we accept that the update service can serve risks with non-compliant names, then we can:

a. Land this regexp. Drop the risk (silently for now, eventually triggering CannotEvaluateConditionalUpdates to warn the admin). You'd have to do this for all clusters, not just clusters where the risk applied.
b. Land this regexp. Squash any non-compliant names into compliant names before writing the risk.
c. Drop this API change. Accept the risk with the non-compliant name, and squash it into something compliant when we translate to the Recommended reason (if we end up wanting to involve the risk's name because we assess it as the only valid risk).

I'm personally leaning towards (c), because fewer clusters are impacted (only clusters where the non-compliant risk is the only risk assessed to apply), and because I like complaining in status instead of relying on alerts alone. But this pull request's current (a) is more aligned with our existing status enum precedent, where the Kube API server doesn't trust the CVO to write solid data. And (b) hides the "hey, we wish the update service was using a better name for this risk" condition while (c) makes that more obvious just from status.

I'm not terribly committed though, so I'm ok with what you have here if my cost/benefit breakdown isn't convincing ;)

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree, I currently like (c) the best too. I filed openshift/cluster-version-operator#962 that follows that path (including some refactors so that the change is easier to test). That PR just operates in the same area like openshift/cluster-version-operator#964 which is more important to merge and I will need to rebase #962 on top of it.

@petr-muller
Copy link
Member Author

/jira refresh

@openshift-ci-robot openshift-ci-robot added jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. and removed jira/invalid-bug Indicates that a referenced Jira bug is invalid for the branch this PR is targeting. labels Sep 8, 2023
@openshift-ci-robot
Copy link

@petr-muller: This pull request references Jira Issue OCPBUGS-18454, which is valid.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.15.0) matches configured target version for branch (4.15.0)
  • bug is in the state POST, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @shellyyang1989

Details

In response to this:

/jira refresh

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@petr-muller
Copy link
Member Author

/close

We'll probably don't want to do this and only merge openshift/cluster-version-operator#962. Closing for now, I can always reopen.

@openshift-ci openshift-ci bot closed this Sep 20, 2023
@openshift-ci-robot
Copy link

@petr-muller: This pull request references Jira Issue OCPBUGS-18454. The bug has been updated to no longer refer to the pull request using the external bug tracker.

Details

In response to this:

Conditional risk names are used as a Reason field values when the risk
applies and CVO sets up the Recommended condition. Hence, the risk
names need to be valid Reason field values.

xref: openshift/cincinnati-graph-data#4059

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Sep 20, 2023

@petr-muller: Closed this PR.

Details

In response to this:

/close

We'll probably don't want to do this and only merge openshift/cluster-version-operator#962. Closing for now, I can always reopen.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

jira/severity-moderate Referenced Jira bug's severity is moderate for the branch this PR is targeting. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants