[WIP] NE-2519: Bump Sail Library to release-3.3.1#1403
[WIP] NE-2519: Bump Sail Library to release-3.3.1#1403gcs278 wants to merge 2 commits intoopenshift:masterfrom
Conversation
|
@gcs278: This pull request references NE-2519 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
Important Review skippedAuto reviews are limited based on label configuration. 🚫 Excluded labels (none allowed) (1)
Please check the settings in the CodeRabbit UI or the ⚙️ Run configurationConfiguration used: Repository YAML (base), Organization UI (inherited) Review profile: CHILL Plan: Pro Run ID: You can disable this status message by setting the Use the checkbox below for a quick retry:
✨ Finishing Touches🧪 Generate unit tests (beta)
Comment |
|
Skipping CI for Draft Pull Request. |
Vendor github.com/openshift-service-mesh/sail-operator from release-3.3.1 to obtain Istio 1.28.5 image SHAs from the ClusterServiceVersion. This eliminates floating tags in favor of pinned image digests for GA. Gateway API downgrade to v1.4.1: During TP, we used openshift-service-mesh/sail-operator main branch which vendored the latest Istio requiring Gateway API v1.5.0. We decided to pin to v1.4.1 to ensure compatibility with our CRDs. Now with release-3.3.1 branch, sail-operator vendors Istio 1.28.5 which only requires Gateway API v1.4.0. This allows us to safely remove the pin and downgrade to v1.4.1 without conflicts. Steps performed: Removed gateway-api version pin from go.mod go get github.com/openshift-service-mesh/sail-operator@rv3.3.1 go get sigs.k8s.io/gateway-api@v1.4.1 go mod tidy go mod vendor
66aa45b to
079ee24
Compare
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
Remove SetImageDefaults() call which prevented Sail Library from using image SHAs from the ClusterServiceVersion. The library is designed to read pinned image digests from the CSV, but our override was replacing them with defaults, defeating the purpose of using pinned SHAs for GA.
|
I did get a GWAPI failure in e2e-aws-operator, but it seems to be an AWS infra or CCM failure assigning the load balancer: The failure in e2e-azure-operator looks like an unrealted flake. The failure in e2e-vsphere-static-metallb-operator-gwapi looked like an infra install failure. /retest |
|
@gcs278: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
|
@gcs278: Closed this PR. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
🚧 Note: This is a WIP branch to test with @aslakknutsen's openshift-service-mesh/sail-operator#756. I've drafted the PR/commit to reflect when the sail library merges into 3.3.1 (i'm still using Aslak's dev branch in this build & we don't have SHAs for 3.3.1 yet).
Vendor github.com/openshift-service-mesh/sail-operator from release-3.3.1 to obtain Istio 1.28.5 image SHAs from the ClusterServiceVersion. This eliminates floating tags in favor of pinned image digests for GA.
Gateway API downgrade to v1.4.1:
During TP, we used openshift-service-mesh/sail-operator main branch which vendored the latest Istio requiring Gateway API v1.5.0. We decided to pin to v1.4.1 to ensure compatibility with our CRDs.
Now with release-3.3.1 branch, sail-operator vendors Istio 1.28.5 which only requires Gateway API v1.4.0. This allows us to safely remove the pin and downgrade to v1.4.1 without conflicts.
Steps performed: