Skip to content

Conversation

@hexfusion
Copy link
Contributor

@hexfusion hexfusion commented Mar 11, 2019

  • adds new flag kube-client-agent-imag and populates with release image metadata
  • update etcdCertSignerImage to use openshift 4.0 release image

depends on: openshift/machine-config-operator#538

Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=1684670

* adds new flag and populate with release image metadata

Signed-off-by: Sam Batschelet <[email protected]>
@hexfusion
Copy link
Contributor Author

/hold

@openshift-ci-robot openshift-ci-robot added do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels Mar 11, 2019
@hexfusion
Copy link
Contributor Author

/hold cancel

@openshift-ci-robot openshift-ci-robot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Mar 15, 2019
@hexfusion
Copy link
Contributor Author

/retest

@hexfusion
Copy link
Contributor Author

/cc @wking @abhinavdahiya PTAL

openshift/machine-config-operator#538 has merged allowing this to merge to complete chicken and egg.

@openshift-ci-robot
Copy link
Contributor

@hexfusion: GitHub didn't allow me to request PR reviews from the following users: PTAL.

Note that only openshift members and repo collaborators can review this PR, and authors cannot review their own PRs.

Details

In response to this:

/cc @wking @abhinavdahiya PTAL

openshift/machine-config-operator#538 has merged allowing this to merge to complete chicken and egg.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@wking wking changed the title data/data/bootstrap: add kube-client-agent-image flag Bug 1684670: data/data/bootstrap: add kube-client-agent-image flag Mar 15, 2019
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why this? Can we drop this commit until we move the etcd signer into the release image references?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why this? Can we drop this commit until we move the etcd signer into the release image references?

Sure I just figured it was better to not have the non RHEL image, will update.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hmm, now that you've dropped this, is it still fixing rhbz#1684670 ? I think we need openshift/origin#22325 so we can drop etcdCertSignerImage completely.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So if that if signer-server is refed in origin we can just pull the sha like the others or?

podman run --quiet --rm ${release} image kube-etcd-signer-server

Wouldn't this work now?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

guess not

podman run --quiet --rm registry.svc.ci.openshift.org/ci-op-mnr8nyp6/release:latest image kube-etcd-signer-server
[...]
 1 image.go:36] error: error: Unknown name requested, could not find kube-etcd-signer-server in UpdatePayload

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So if that if signer-server is refed in origin we can just pull the sha like the others or?

podman run --quiet --rm ${release} image kube-etcd-signer-server

Wouldn't this work now?

only images required by operators and some hard coded defaults are available in the release image.
[from this CI run release image]

oc adm release info registry.svc.ci.openshift.org/ci-op-mnr8nyp6/release:latest --image-for=kube-etcd-signer-server                                                                                                                              error: no image tag "kube-etcd-signer-server" exists in the release image registry.svc.ci.openshift.org/ci-op-mnr8nyp6/release:latest

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

images required by operators

this is defined by image-references file example for each openshift operators

hard coded defaults

this is defined here

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I see so with openshift/origin#22325 updated per your comment we will want

ETCD_CERT_SIGNER_IMAGE=$(podman run --quiet --rm ${release} image kube-etcd-signer-server) ? and remove etcdCertSignerImage ref?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@hexfusion
Copy link
Contributor Author

@abhinavdahiya @wking https://bugzilla.redhat.com/show_bug.cgi?id=1684670 was for kube-client-agent can we merge this PR to iterate on this?

@hexfusion
Copy link
Contributor Author

/test e2e-aws

@abhinavdahiya
Copy link
Contributor

/lgtm

@abhinavdahiya @wking https://bugzilla.redhat.com/show_bug.cgi?id=1684670 was for kube-client-agent can we merge this PR to iterate on this?

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Mar 15, 2019
@openshift-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: abhinavdahiya, hexfusion

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci-robot openshift-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Mar 15, 2019
@wking wking changed the title Bug 1684670: data/data/bootstrap: add kube-client-agent-image flag data/data/bootstrap: add kube-client-agent-image flag Mar 15, 2019
@wking
Copy link
Member

wking commented Mar 15, 2019

https://bugzilla.redhat.com/show_bug.cgi?id=1684670 was for kube-client-agent...

Ah, sorry, I was confused and removed the Bug 1684670 prefix from the PR subject. The oc adm release info change-log tooling will look there to generate a list of bugs fixed by a given release-image upgrade. However, the "Edit" button for the subject is no longer responding to me? Can someone else restore the Bug 168670 prefix to the PR subject?

@wking wking changed the title data/data/bootstrap: add kube-client-agent-image flag Bug 1684670: data/data/bootstrap: add kube-client-agent-image flag Mar 15, 2019
@wking
Copy link
Member

wking commented Mar 15, 2019

Heh, and as soon as I ask for help, it starts working again :p. Sorry for the noise

@abhinavdahiya abhinavdahiya changed the title Bug 1684670: data/data/bootstrap: add kube-client-agent-image flag data/data/bootstrap: add kube-client-agent-image flag Mar 15, 2019
@abhinavdahiya abhinavdahiya changed the title data/data/bootstrap: add kube-client-agent-image flag Bug 1684670: data/data/bootstrap: add kube-client-agent-image flag Mar 15, 2019
@abhinavdahiya
Copy link
Contributor

Oops 😇

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants