-
Notifications
You must be signed in to change notification settings - Fork 219
manifests/00-ingress-credentials-request: Fill in cluster-profile annotations #692
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
manifests/00-ingress-credentials-request: Fill in cluster-profile annotations #692
Conversation
…otations
All of these platforms require manual credential creation (e.g. via
ccoctl), so it doesn't really matter if the CredentialRequests get
pushed into the cluster or not. But having them in the cluster will
allow the Kube API-server and possibly the cloud-credential operator
to complain about anything surprising they see ("that's not a valid
value for that property", "I'm watching over your manual-mode
shoulder, and you missed a requested secret", etc.). Regardless of
whether we have that coverage today, getting these into the cluster is
consistent with our other, existing CredentialsRequests.
Also tweak the namespace of the Alibaba request to match our usual
openshift-cloud-credential-operator. Neither the in-cluster
cloud-credential operator nor ccoctl care about cred-request
namespaces; they both happily process requests in any namespace. But
all of our other, existing CredentialsRequests use the cloud-cred
namespace, so stick with that for consistency too.
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: Miciah, wking The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
hypershift/roks doesn't use the cloud credential operator, so the |
|
Waiting while we decide whether the cloud-credential operator should be installed for more profiles than just |
$ sed -i '/ibm-cloud-managed/d' manifests/00-ingress-credentials-request.yaml From Cesar [1]: hypershift/roks doesn't use the cloud credential operator, so the ibm-cloud-managed annotation can be left out. However, it doesn't do any harm since there's no operator to do anything with them. Dropping the cluster-profile from these resources should reduce confusion by clearing unused cruft out of the IBM clusters. [1]: openshift#692 (comment)
|
New changes are detected. LGTM label has been removed. |
|
ok, fbcf019 -> ef47357 drops |
ef47357 to
3155096
Compare
There's an enhancement proposal for this profile [1], and the Code Ready Containers folks took a run at using it in [2] before backing off in [3]. I don't have any problems with having a specific CRC profile, but until we end up going that way, save ourselves the mental overhead of trying to guess whether it will want each of our manifest resources by dropping the annotation across the board. Effectively reverts abd8a20 (Annotate manifests for single-node-developer cluster profile, 2020-11-27, openshift#498). Generated with: $ sed -i '/single-node-developer/d' manifests/*.yaml $ git checkout HEAD -- manifests/00-custom-resource-definition* where I'm leaving the CRDs alone to avoid things like [4]: hack/verify-generated-crd.sh --- vendor/github.com/openshift/api/operator/v1/0000_50_ingress-operator_00-ingresscontroller.crd.yaml 2021-12-22 07:10:24.000000000 +0000 +++ manifests/00-custom-resource-definition.yaml 2021-12-22 07:10:25.000000000 +0000 @@ -5,7 +5,6 @@ metadata: api-approved.openshift.io: openshift/api#616 include.release.openshift.io/ibm-cloud-managed: "true" include.release.openshift.io/self-managed-high-availability: "true" - include.release.openshift.io/single-node-developer: "true" name: ingresscontrollers.operator.openshift.io spec: group: operator.openshift.io invalid CRD: vendor/github.com/openshift/api/operator/v1/0000_50_ingress-operator_00-ingresscontroller.crd.yaml => manifests/00-custom-resource-definition.yaml [1]: https://github.com/openshift/enhancements/blob/2911c46bf7d2f22eb1ab81739b4f9c2603fd0c07/enhancements/single-node/developer-cluster-profile.md [2]: crc-org/snc#338 [3]: crc-org/snc#373 (comment) [4]: https://prow.ci.openshift.org/view/gs/origin-ci-test/pr-logs/pull/openshift_cluster-ingress-operator/692/pull-ci-openshift-cluster-ingress-operator-master-verify/1473551168843026432#1:build-log.txt%3A14
3155096 to
0dd22b3
Compare
Generated with: $ update-generated-bindata.sh
|
@wking: The following tests failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
| namespace: openshift-cloud-credential-operator | ||
| annotations: | ||
| include.release.openshift.io/ibm-cloud-managed: "true" | ||
| include.release.openshift.io/self-managed-high-availability: "true" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Talking this over with @joelddiaz , we probably want to keep these out of this profile, to make it more clear to cluster admins that the cloud-cred operator will completely ignore CredentialsRequests on these platforms, regardless of whether it's configured for manual or mint or whatever mode.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this does imply we should do this for ALL CredentialsRequests for platforms that are only supported in "Manual" mode...
|
Issues go stale after 90d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle stale |
|
@wking: PR needs rebase. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
Stale issues rot after 30d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle rotten |
|
Rotten issues close after 30d of inactivity. Reopen the issue by commenting /close |
|
@openshift-bot: Closed this PR. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
All of these platforms require manual credential creation (e.g. via
ccoctl), so it doesn't really matter if the CredentialRequests get pushed into the cluster or not. But having them in the cluster will allow the Kube API-server and possibly the cloud-credential operator to complain about anything surprising they see ("that's not a valid value for that property", "I'm watching over your manual-mode shoulder, and you missed a requested secret", etc.). Regardless of whether we have that coverage today, getting these into the cluster is consistent with our other, existing CredentialsRequests.Also tweak the namespace of the Alibaba request to match our usual
openshift-cloud-credential-operator. Neither the in-cluster cloud-credential operator norccoctlcare about cred-request namespaces; they both happily process requests in any namespace. But all of our other, existing CredentialsRequests use the cloud-cred namespace, so stick with that for consistency too.