Skip to content

Conversation

@wking
Copy link
Member

@wking wking commented Feb 9, 2022

As described in the enhancement. The openshift-samples value matches our ClusterOperator name, and was registered with the API.

I've annotated these types:

$ for X in manifests/*.yaml; do yaml2json < "${X}" | jq -r '.[] | select(.metadata.annotations["capability.openshift.io/name"] == "openshift-samples").kind'; done | sort | uniq -c
      1 ClusterOperator
      4 ClusterRole
      3 ClusterRoleBinding
      2 Deployment
      1 Namespace
      1 PrometheusRule
      3 Role
      4 RoleBinding
      1 Service
      1 ServiceAccount
      1 ServiceMonitor

which seemed like the moving parts that folks who say "no samples, thanks" wouldn't want. I've left the annotation off the ImageStreams:

$ for X in manifests/*.yaml; do yaml2json < "${X}" | jq -r '.[] | select(.metadata.annotations["capability.openshift.io/name"] != "openshift-samples").kind'; done | sort | uniq -c
      9 ImageStream

since those ImageStreams are consumed by tests, the console downloads deployment, etc.

While I was touching annotations, I've also added a commit to drop the unused single-node-developer profile. Notes in the commit, and precedent in openshift/cluster-version-operator#685.

There's an enhancement proposal for this profile [1], and the Code
Ready Containers folks took a run at using it in [2] before backing
off in [3].  I don't have any problems with having a specific CRC
profile, but if we end up going that way, we'll need a lot more
(e.g. we'll need CVO manifests, and I dropped this profile there in
[4]).

Generated with:

  $ sed -i '/single-node-developer/d' manifests/*.yaml

[1]: https://github.com/openshift/enhancements/blob/2911c46bf7d2f22eb1ab81739b4f9c2603fd0c07/enhancements/single-node/developer-cluster-profile.md
[2]: crc-org/snc#338
[3]: crc-org/snc#373 (comment)
[4]: openshift/cluster-version-operator#685
As described in [1].  The 'openshift-samples' value matches our
ClusterOperator name, and was registered with the API in [2].

I've annotated these types:

  $ for X in manifests/*.yaml; do yaml2json < "${X}" | jq -r '.[] | select(.metadata.annotations["capability.openshift.io/name"] == "openshift-samples").kind'; done | sort | uniq -c
      1 ClusterOperator
      4 ClusterRole
      3 ClusterRoleBinding
      2 Deployment
      1 Namespace
      1 PrometheusRule
      3 Role
      4 RoleBinding
      1 Service
      1 ServiceAccount
      1 ServiceMonitor

which seemed like the moving parts that folks who say "no samples,
thanks" wouldn't want.  I've left the annotation off the ImageStreams:

  $ for X in manifests/*.yaml; do yaml2json < "${X}" | jq -r '.[] | select(.metadata.annotations["capability.openshift.io/name"] != "openshift-samples").kind'; done | sort | uniq -c
      9 ImageStream

since those ImageStreams are consumed by tests, the console downloads
deployment, etc.

I'm also adjusting the JSON Patch file to remove [3] the
self-managed-high-availability annotation and add [4] the
ibm-cloud-managed annotation, instead of clobbering the whole
annotation set, to preserve additional annotations like the capability
name.  '~1` is the JSON Pointer escape for '/' [5].

[1]: https://github.com/openshift/enhancements/blame/27846285be01a2aebf8d3a04ebb8ed7f877e4959/enhancements/installer/component-selection.md#L106
[2]: https://github.com/openshift/api/blob/7e3ffb09accd36fb0536fa0e69bed5d70cccd6e5/config/v1/types_cluster_version.go#L232-L237
[3]: https://datatracker.ietf.org/doc/html/rfc6902#section-4.2
[4]: https://datatracker.ietf.org/doc/html/rfc6902#section-4.1
[5]: https://datatracker.ietf.org/doc/html/rfc6901#section-3
@gabemontero
Copy link
Contributor

/assign @dperaza4dustbit

Copy link
Contributor

@dperaza4dustbit dperaza4dustbit left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just one question on profile-patches, not connecting the dots

path: /metadata/annotations/include.release.openshift.io~1self-managed-high-availability
- op: add
path: /metadata/annotations/include.release.openshift.io~1ibm-cloud-managed
value: "true"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you elaborate on what this is doing?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

From the 024493c commit message:

I'm also adjusting the JSON Patch file to remove [3] the
self-managed-high-availability annotation and add [4] the
ibm-cloud-managed annotation, instead of clobbering the whole
annotation set, to preserve additional annotations like the capability
name. '~1` is the JSON Pointer escape for '/' [5].
...
[3]: https://datatracker.ietf.org/doc/html/rfc6902#section-4.2
[4]: https://datatracker.ietf.org/doc/html/rfc6902#section-4.1
[5]: https://datatracker.ietf.org/doc/html/rfc6901#section-3

@dperaza4dustbit
Copy link
Contributor

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Feb 10, 2022
@dperaza4dustbit
Copy link
Contributor

/approve

@dperaza4dustbit
Copy link
Contributor

/retest

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 10, 2022

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: dperaza4dustbit, wking

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Feb 10, 2022
@openshift-bot
Copy link
Contributor

/retest-required

Please review the full test history for this PR and help us cut down flakes.

4 similar comments
@openshift-bot
Copy link
Contributor

/retest-required

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest-required

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest-required

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest-required

Please review the full test history for this PR and help us cut down flakes.

@wking
Copy link
Member Author

wking commented Feb 11, 2022

/skip

@openshift-bot
Copy link
Contributor

/retest-required

Please review the full test history for this PR and help us cut down flakes.

@wking
Copy link
Member Author

wking commented Feb 11, 2022

e2e-aws-upgrade has etcdHighNumberOfLeaderChanges firing in the last three runs, so I won't bother kicking off a retest. I didn't see an exact match for the test-case in Bugzilla, so I've filed rhbz#2053380 to report the issue.

@openshift-bot
Copy link
Contributor

/retest-required

Please review the full test history for this PR and help us cut down flakes.

3 similar comments
@openshift-bot
Copy link
Contributor

/retest-required

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest-required

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest-required

Please review the full test history for this PR and help us cut down flakes.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 11, 2022

@wking: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/okd-e2e-aws-image-ecosystem 024493c link false /test okd-e2e-aws-image-ecosystem
ci/prow/okd-e2e-aws-builds 024493c link false /test okd-e2e-aws-builds
ci/prow/okd-e2e-aws-operator 024493c link false /test okd-e2e-aws-operator
ci/prow/okd-e2e-aws-upgrade 024493c link false /test okd-e2e-aws-upgrade
ci/prow/okd-e2e-aws-jenkins 024493c link false /test okd-e2e-aws-jenkins

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@dperaza4dustbit
Copy link
Contributor

/label docs-approved

@openshift-ci openshift-ci bot added the docs-approved Signifies that Docs has signed off on this PR label Feb 15, 2022
@dperaza4dustbit
Copy link
Contributor

/label px-approved

@openshift-ci openshift-ci bot added the px-approved Signifies that Product Support has signed off on this PR label Feb 15, 2022
@tisutisu
Copy link

/label qe-approved

@openshift-ci openshift-ci bot added the qe-approved Signifies that QE has signed off on this PR label Feb 16, 2022
@openshift-merge-robot openshift-merge-robot merged commit 567c568 into openshift:master Feb 16, 2022
@wking wking deleted the capabilities branch February 21, 2022 23:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. docs-approved Signifies that Docs has signed off on this PR lgtm Indicates that a PR is ready to be merged. px-approved Signifies that Product Support has signed off on this PR qe-approved Signifies that QE has signed off on this PR

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants