-
Notifications
You must be signed in to change notification settings - Fork 213
OCPVE-646: add cloud credential capability #963
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
@qJkee: This pull request references OCPVE-646 which is a valid jira issue. DetailsIn response to this: Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
07f9501 to
e347fc6
Compare
60f889e to
35b9f59
Compare
go get -u github.com/openshift/api@master go mod tidy go mod vendor git add -A go.* vendor
update tests with new capabilities brought by new version of openshift/api package
|
I don't know if this is ready yet, because openshift/cloud-credential-operator#594 CI runs still has some CRDs associated with the capability: $ curl -s https://gcsweb-ci.apps.ci.l2s4.p1.openshiftapps.com/gcs/origin-ci-test/pr-logs/pull/openshift_cloud-credential-operator/594/pull-ci-openshift-cloud-credential-operator-master-e2e-aws-ovn/1731773578577186816/artifacts/e2e-aws-ovn/gather-must-gather/artifacts/must-gather.tar | tar tvz | grep cred
-rw------- 1003680000/root 10856 2023-12-04 14:01 831f684e7f57b017401eefcd684417fcee8915173aafcdf8a54e69f76e3f93df/cluster-scoped-resources/apiextensions.k8s.io/customresourcedefinitions/cloudcredentials.operator.openshift.io.yaml
-rw------- 1003680000/root 11252 2023-12-04 14:01 831f684e7f57b017401eefcd684417fcee8915173aafcdf8a54e69f76e3f93df/cluster-scoped-resources/apiextensions.k8s.io/customresourcedefinitions/credentialsrequests.cloudcredential.openshift.io.yaml
-rw------- 1003680000/root 986 2023-12-04 14:01 831f684e7f57b017401eefcd684417fcee8915173aafcdf8a54e69f76e3f93df/cluster-scoped-resources/apiregistration.k8s.io/apiservices/v1.cloudcredential.openshift.io.yaml
-rw------- 1003680000/root 8349 2023-12-04 14:01 831f684e7f57b017401eefcd684417fcee8915173aafcdf8a54e69f76e3f93df/cluster-scoped-resources/apiserver.openshift.io/apirequestcounts/cloudcredentials.v1.operator.openshift.io.yaml
-rw------- 1003680000/root 12828 2023-12-04 14:01 831f684e7f57b017401eefcd684417fcee8915173aafcdf8a54e69f76e3f93df/cluster-scoped-resources/apiserver.openshift.io/apirequestcounts/credentialsrequests.v1.cloudcredential.openshift.io.yamlMaybe I don't understand how those are supposed to be annotated, and they flow in through the cluster-config-operator or other repository? That run also still contains a namespace associated with the capability, and I don't understand that either: $ curl -s https://gcsweb-ci.apps.ci.l2s4.p1.openshiftapps.com/gcs/origin-ci-test/pr-logs/pull/openshift_cloud-credential-operator/594/pull-ci-openshift-cloud-credential-operator-master-e2e-aws-ovn/1731773578577186816/artifacts/e2e-aws-ovn/gather-extra/artifacts/namespaces.json | jq -r '.items[].metadata | select(.name | contains("cred"))'
{
"annotations": {
"capability.openshift.io/name": "CloudCredential",
"openshift.io/node-selector": "",
"openshift.io/sa.scc.mcs": "s0:c11,c10",
"openshift.io/sa.scc.supplemental-groups": "1000130000/10000",
"openshift.io/sa.scc.uid-range": "1000130000/10000"
},
"creationTimestamp": "2023-12-04T20:47:52Z",
"labels": {
"controller-tools.k8s.io": "1.0",
"kubernetes.io/metadata.name": "openshift-cloud-credential-operator",
"olm.operatorgroup.uid/1724a5ee-7ce3-4b42-9bf7-8be431027e68": "",
"openshift.io/cluster-monitoring": "true"
},
"name": "openshift-cloud-credential-operator",
"resourceVersion": "9572",
"uid": "b98338f1-60c3-4bdb-be43-c22c6e4cd2e6"
} |
wking
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@qJkee figured out why those resources are there in openshift/cloud-credential-operator#594 CI. The CVO says "these manifests are labeled with a capability that isn't enabled" and ignores them. But the CCO render command says "capabilities in unset in this install-config, so I'm enabled, so include them". That should get resolved once all these pulls land.
/lgtm
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: qJkee, wking The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
/retest |
|
HyperShift CI is generally sad, and unrelated to this pull. /override ci/prow/e2e-hypershift |
|
@wking: Overrode contexts on behalf of wking: ci/prow/e2e-hypershift DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/label qe-approved |
|
@qJkee: This pull request references OCPVE-646 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.15.0" version, but no target version was set. DetailsIn response to this: Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
This always fails on cap additions, and I haven't gotten traction on openshift/api#1624. /override ci/prow/e2e-agnostic-ovn-upgrade-out-of-change |
|
@wking: Overrode contexts on behalf of wking: ci/prow/e2e-agnostic-ovn-upgrade-out-of-change DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
Override the other HyperShift job too. /override ci/prow/e2e-hypershift-conformance |
|
@wking: Overrode contexts on behalf of wking: ci/prow/e2e-hypershift-conformance DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
We expect these to fail again: /override ci/prow/e2e-agnostic-ovn-upgrade-out-of-change And these others are all expensive and unlikely to have cross-effects between this and #999 which landed in parallel: /override ci/prow/e2e-agnostic-operator |
|
@wking: Overrode contexts on behalf of wking: ci/prow/e2e-agnostic-operator, ci/prow/e2e-agnostic-ovn, ci/prow/e2e-agnostic-ovn-upgrade-into-change, ci/prow/e2e-agnostic-ovn-upgrade-out-of-change, ci/prow/e2e-hypershift DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
@qJkee: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
|
[ART PR BUILD NOTIFIER] This PR has been included in build cluster-version-operator-container-v4.15.0-202312060008.p0.ge23ee60.assembly.stream for distgit cluster-version-operator. |
No description provided.