Skip to content

Conversation

@sttts
Copy link
Contributor

@sttts sttts commented Apr 13, 2021

No description provided.

@openshift-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: sttts
To complete the pull request process, please assign sdodson after the PR has been reviewed.
You can assign the PR to them by writing /assign @sdodson in a comment when ready.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@sttts sttts force-pushed the sttts-exclude-tech-preview branch from 42548de to ac7b520 Compare April 13, 2021 10:00
}

func LoadUpdate(dir, releaseImage, excludeIdentifier, profile string) (*Update, error) {
func LoadUpdate(dir, releaseImage, excludeIdentifier string, includeTechPreview func() (bool, error), profile string) (*Update, error) {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think this approach is going to work. Today we only call InitializeFromPayload when we launch the CVO, and the other LoadUpdate caller is when we have detected the admin requesting an update. So if someone sets the tech-preview feature gate after that load, the CVO will not notice or react to that change until the next load (after a pod reschedule or requested update). And we'd have to track the feature-gate-status as part of ClusterVersion's status.desired and/or status.history so the new CVO pod would be able to distinguish between "I'm continuing the work of my predecessor and can launch in reconciliation mode" and "tech-preview has changed since the last reconciled payload, so I should launch in update mode". That's... possible. But it seems like a lot of juggling vs. just deploying the tech-preview operator all the time, and having that tech-preview operator decide if it should enable its operands or not. For precedent, consider the registry operator, which the CVO always installs, but which can be configured to not deploy its registry operand.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jun 22, 2021

@sttts: The following test failed, say /retest to rerun all failed tests:

Test name Commit Details Rerun command
ci/prow/e2e-agnostic-upgrade ac7b520 link /test e2e-agnostic-upgrade

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@openshift-bot
Copy link
Contributor

Issues go stale after 90d of inactivity.

Mark the issue as fresh by commenting /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.
Exclude this issue from closing by commenting /lifecycle frozen.

If this issue is safe to close now please do so with /close.

/lifecycle stale

@openshift-ci openshift-ci bot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Sep 20, 2021
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Sep 20, 2021

@sttts: PR needs rebase.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci openshift-ci bot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Sep 20, 2021
@openshift-bot
Copy link
Contributor

Stale issues rot after 30d of inactivity.

Mark the issue as fresh by commenting /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.
Exclude this issue from closing by commenting /lifecycle frozen.

If this issue is safe to close now please do so with /close.

/lifecycle rotten
/remove-lifecycle stale

@openshift-ci openshift-ci bot added lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels Oct 20, 2021
@wking
Copy link
Member

wking commented Nov 9, 2021

cert-manager ended up being OLM-installed, and openshift/enhancements#922 is being considered with more generic knobs for opting in to or out of specific core-release-payload components. So closing this narrower annotation as obsolete.

/close

@openshift-ci openshift-ci bot closed this Nov 9, 2021
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 9, 2021

@wking: Closed this PR.

Details

In response to this:

cert-manager ended up being OLM-installed, and openshift/enhancements#922 is being considered with more generic knobs for opting in to or out of specific core-release-payload components. So closing this narrower annotation as obsolete.

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants