Skip to content

Conversation

@mandre
Copy link
Member

@mandre mandre commented Nov 5, 2024

Supersedes #326

lentzi90 and others added 30 commits June 19, 2023 13:39
This adds a proposal for how CAPO could support more than one
microversion. The current situation is that we hard code a microversion
that is then used for all API calls. This is currently done for Nova.
Other clients are not configured with a version as of now.
Signed-off-by: Huy Mai <huy.mai@est.tech>
The v1alpha7 tests were previously testing v1alpha6.
Signed-off-by: Jan Schoone <6106846+jschoone@users.noreply.github.com>
…_outdated_warnings

📖  remove outdated warnings
This commit makes security linting easier by never setting a TLS version
outside v1.2 or v1.3, even in case of an unacceptable user input.
🌱 Refactoring: never assign unacceptable TLS versions
…sion-proposal

📖 Proposal for microversion support
Also adds fuzz tests which would have caught this and any similar
issues.
🐛 Fix webhook panic when adding managed security groups
🐛 Remove a duplication for setting default port settings
It's some work we're preparing to build a new controller in charge of
creating servers and their dependencies (ports, etc). We don't want it
to depent on the OpenStack Machine object.
racheljpg and others added 14 commits November 5, 2024 17:50
In addition to vendor directories, we can ignore things that do not end
up in the product.

Co-Authored-By: Martin André <m.andre@redhat.com>
This is required for it to be included in the release payload. CAPO is
actually deployed by cluster-capi-operator, but is not directly
referenced by cluster-capi-operator. cluster-capi-operator instead
consumes a ConfigMap deployed by CAPO. CAPO must be included in the
release payload in order for cluster-capi-operator to be able to consume
this ConfigMap.
Also fix lint issues hightlighted by these tests.
This is step 1 of 3 in the dance necessary to add e2e tests. Next up,
the job definition itself (in 'openshift/release').

Signed-off-by: Stephen Finucane <stephenfin@redhat.com>
These are heavily based on the tests for other platforms, which are
currently included in the cluster-capi-operator tree [1] but which will
eventually be moved out to the openshift forks of the respective CAPI
implementations. The key difference from these is that (a) we don't
create a cluster (since we have the infracluster controller for this)
and (b) we obviously use OpenStack-specific semantics.

[1] https://github.com/openshift/cluster-capi-operator/tree/release-4.15/e2e

Co-Authored-By: Emilien Macchi <emilien@redhat.com>
Co-Authored-By: Stephen Finucane <stephenfin@redhat.com>
As in openshift/cluster-version-operator@48fe9f2669 (install: Drop
single-node-developer profile, 2021-11-05,
openshift/cluster-version-operator#685).

There's an enhancement proposal for this profile [1], and the Code
Ready Containers folks took a run at using it in [2] before backing
off in [3].  I don't have any problems with having a specific CRC
profile, but if we end up going that way, we'll need a lot more
manifests with the annotation (e.g. we'll probably also want the CVO
manifests to include this annotation, or there won't be anything
consuming the admin-ack ConfigMaps ;).  This commit drops the
annotation from this repository to avoid distracting folks with dead
code.

[1]: https://github.com/openshift/enhancements/blob/2911c46bf7d2f22eb1ab81739b4f9c2603fd0c07/enhancements/single-node/developer-cluster-profile.md
[2]: crc-org/snc#338
[3]: crc-org/snc#373 (comment)
openshift/machine-api-operator@9c20871740 (annotate cloud credentials
request, 2023-11-14, openshift/machine-api-operator#1174) added this
capability to the machine-API analog of this manifest.  And
openshift/cluster-capi-operator@e305541274 (annotate credentials
request manifests, 2023-11-13, openshift/cluster-capi-operator#143)
annotated some cluster-API CredentialsRequests used for other
providers.  This commit catches cluster-API OpenStack up with those
other changes.

There is a risk that tech-preview clusters updating into this change
will have the CloudCredential capability implicitly enabled.  But
because TechPreviewNoUpgrade blocks minor updates, and we don't intend
to backport this to 4.14.z, that exposure is confined to unsuported
prerelease clusters.
@mandre mandre force-pushed the sync-main-martin branch 2 times, most recently from 137281e to c26c73c Compare November 5, 2024 20:32
@openshift-ci
Copy link

openshift-ci bot commented Nov 5, 2024

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please ask for approval from mandre. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@mandre mandre force-pushed the sync-main-martin branch 2 times, most recently from 4ab4afe to 54c7ee5 Compare November 6, 2024 07:46
EmilienM and others added 4 commits November 6, 2024 11:11
Co-Authored-By: Martin André <m.andre@redhat.com>
Drop this after v0.11, as these are no longer present in main.

Generated with:

    cd hack/codegen
    go mod tidy
    go work vendor
    cd ../../orc/hack/codegen
    go mod tidy
    go work vendor
@openshift-ci
Copy link

openshift-ci bot commented Nov 6, 2024

@mandre: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/test 8ce1418 link true /test test
ci/prow/verify 8ce1418 link true /test verify
ci/prow/e2e-techpreview 8ce1418 link true /test e2e-techpreview
ci/prow/security 8ce1418 link false /test security

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@mandre
Copy link
Member Author

mandre commented Nov 6, 2024

I unfortunately pushed the branch into the wrong repo :-/
/close

@openshift-ci openshift-ci bot closed this Nov 6, 2024
@openshift-ci
Copy link

openshift-ci bot commented Nov 6, 2024

@mandre: Closed this PR.

Details

In response to this:

I unfortunately pushed the branch into the wrong repo :-/
/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@openshift-ci-robot
Copy link

@mandre: This pull request references Jira Issue OCPBUGS-43892. The bug has been updated to no longer refer to the pull request using the external bug tracker.

Details

In response to this:

Supersedes #326

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type.

Projects

None yet

Development

Successfully merging this pull request may close these issues.