Skip to content

Conversation

@wking
Copy link
Member

@wking wking commented Nov 1, 2023

Repeating 897f57f (#4326). I'd thought the tuned 'from' regular expressions in 361e132
(#4337) would avoid the issue, but apparently not:

$ curl -s 'https://api.openshift.com/api/upgrades_info/graph?arch=amd64&channel=fast-4.14' | jq -r '.nodes[] | select(.version == "4.14.0").metadata["io.openshift.upgrades.graph.previous.remove_regex"]'
4[.](13[.]19|14[.]0-(ec[.].*|rc[.][01]))

showing Cincinnati using the from from the ConsoleImplicitlyEnabled, and apparently forgetting about the silent-drop from 4.14.0.yaml:

$ hack/show-edges.py --cincinnati https://api.openshift.com/api/upgrades_info/graph --root-version 4.13.17 fast-4.14
4.13.17 -> 4.13.18
4.13.17 -> 4.13.19
4.13.17 -> 4.14.0  # this unqualified recommendation misses the mutated-SCC guard from 4.14.0.yaml
4.13.18 -> 4.13.19
4.13.18 -> 4.14.0  # this unqualified recommendation misses the mutated-SCC guard from 4.14.0.yaml
4.13.19 -(risks: ConsoleImplicitlyEnabled)-> 4.14.0  # we'd like to keep this
4.13.19 -(risks: ConsoleImplicitlyEnabled)-> 4.14.1
4.14.0 -> 4.14.1

This commit is expected to transition us to:

$ hack/show-edges.py --root-version 4.13.17 fast-4.14
4.13.17 -> 4.13.18
4.13.17 -> 4.13.19
4.13.17 -(SILENT-BLOCK)-> 4.14.0  # better than the current unqualified recommendation
4.13.18 -> 4.13.19
4.13.18 -(SILENT-BLOCK)-> 4.14.0  # better than the current unqualified recommendation
4.13.19 -> 4.14.0  # we'd like this to mention ConsoleImplicitlyEnabled, but I'm back to not knowing how to get that to happen
4.13.19 -(risks: ConsoleImplicitlyEnabled)-> 4.14.1
4.14.0 -> 4.14.1

…from 4.13 again

Repeating 897f57f (blocked-edges/4.14.0-ConsoleImplicitlyEnabled:
Drop conditional risk from 4.13, 2023-10-31, openshift#4326).  I'd thought the
tuned 'from' regular expressions in 361e132
(blocked-edges/4.14.*-ConsoleImplicitlyEnabled: Tune from versions,
2023-11-01, openshift#4337) would avoid the issue, but apparently not:

  $ curl -s 'https://api.openshift.com/api/upgrades_info/graph?arch=amd64&channel=fast-4.14' | jq -r '.nodes[] | select(.version == "4.14.0").metadata["io.openshift.upgrades.graph.previous.remove_regex"]'
  4[.](13[.]19|14[.]0-(ec[.].*|rc[.][01]))

showing Cincinnati using the 'from' from the ConsoleImplicitlyEnabled,
and apparently forgetting about the silent-drop from 4.14.0.yaml:

  $ hack/show-edges.py --cincinnati https://api.openshift.com/api/upgrades_info/graph --root-version 4.13.17 fast-4.14
  4.13.17 -> 4.13.18
  4.13.17 -> 4.13.19
  4.13.17 -> 4.14.0  # this unqualified recommendation misses the mutated-SCC guard from 4.14.0.yaml
  4.13.18 -> 4.13.19
  4.13.18 -> 4.14.0  # this unqualified recommendation misses the mutated-SCC guard from 4.14.0.yaml
  4.13.19 -(risks: ConsoleImplicitlyEnabled)-> 4.14.0  # we'd like to keep this
  4.13.19 -(risks: ConsoleImplicitlyEnabled)-> 4.14.1
  4.14.0 -> 4.14.1

This commit is expected to transition us to:

  $ hack/show-edges.py --root-version 4.13.17 fast-4.14
  4.13.17 -> 4.13.18
  4.13.17 -> 4.13.19
  4.13.17 -(SILENT-BLOCK)-> 4.14.0  # better than the current unqualified recommendation
  4.13.18 -> 4.13.19
  4.13.18 -(SILENT-BLOCK)-> 4.14.0  # better than the current unqualified recommendation
  4.13.19 -> 4.14.0  # we'd like this to mention ConsoleImplicitlyEnabled, but I'm back to not knowing how to get that to happen
  4.13.19 -(risks: ConsoleImplicitlyEnabled)-> 4.14.1
  4.14.0 -> 4.14.1
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 1, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: wking

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Nov 1, 2023
@wking wking added the lgtm Indicates that a PR is ready to be merged. label Nov 1, 2023
@wking
Copy link
Member Author

wking commented Nov 1, 2023

Self-LGTMing, like I did for the previous round.

@openshift-ci openshift-ci bot merged commit 5fd30ac into openshift:master Nov 1, 2023
@wking wking deleted the 4.14.0-drop-ConsoleImplicitlyEnabled-again branch November 2, 2023 01:10
petr-muller added a commit to petr-muller/cincinnati-graph-data that referenced this pull request May 9, 2024
Generated with https://github.com/petr-muller/ota/tree/main/cmd/graph-extend-or-fix by basically extending backwards:
```console
for risk in AWSCustomDomainNodesNotReady AWSECRLegacyCredProvider AzureDefaultVMType AzureRegistryImagePreservation ConsoleImplicitlyEnabled IngressDegradedOnRouterReloads
    go run ./cmd/graph-extend-or-fix/... --jira-endpoint=https://issues.redhat.com --jira-bearer-token-file=$HOME/Temporary/jira-upgradeblocker-token --graph-repository-path=/home/pmuller/Projects/RH/github.com/openshift/cincinnati-graph-data --risk=$risk --last=4.14.1 --new=4.14.0 --do=extend
end
```

I have not included the formatting changes in AWSCustomDomainNodesNotReady and IngressDegradedOnRouterReloads that already existed on 4.14.0

Initially we wanted to silently drop the 4.14.0 release from the graph but because of [OTA-1043](https://issues.redhat.com/browse/OTA-1043) it is hard to keep it that way, because we usually automate adding new 4.14 risks over individual patch updates and forget to avoid adding one for 4.14.0. This way we struggle to keep the drop in effect (see openshift#4339 and openshift#4301), so we decided to give up and just bury 4.14.0 in conditional risks.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant