Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OCPBUGS-26027: openshift/manifests: CloudCredential capability for CredentialsRequest #294

Merged

Conversation

wking
Copy link
Member

@wking wking commented Jan 3, 2024

Builds on #293; you may want to review that one first.

openshift/machine-api-operator@9c20871740 (openshift/machine-api-operator#1174) added this capability to the machine-API analog of this manifest. And openshift/cluster-capi-operator@e305541274 (openshift/cluster-capi-operator#143) annotated some cluster-API CredentialsRequests used for other providers. This commit catches cluster-API OpenStack up with those other changes.

There is a risk that tech-preview clusters updating into this change will have the CloudCredential capability implicitly enabled. But because tech-preview clusters with the CloudCredential capability disabled were not installable, there should be no exposed clusters attempting those updates.

As in openshift/cluster-version-operator@48fe9f2669 (install: Drop
single-node-developer profile, 2021-11-05,
openshift/cluster-version-operator#685).

There's an enhancement proposal for this profile [1], and the Code
Ready Containers folks took a run at using it in [2] before backing
off in [3].  I don't have any problems with having a specific CRC
profile, but if we end up going that way, we'll need a lot more
manifests with the annotation (e.g. we'll probably also want the CVO
manifests to include this annotation, or there won't be anything
consuming the admin-ack ConfigMaps ;).  This commit drops the
annotation from this repository to avoid distracting folks with dead
code.

[1]: https://github.com/openshift/enhancements/blob/2911c46bf7d2f22eb1ab81739b4f9c2603fd0c07/enhancements/single-node/developer-cluster-profile.md
[2]: crc-org/snc#338
[3]: crc-org/snc#373 (comment)
openshift/machine-api-operator@9c20871740 (annotate cloud credentials
request, 2023-11-14, openshift/machine-api-operator#1174) added this
capability to the machine-API analog of this manifest.  And
openshift/cluster-capi-operator@e305541274 (annotate credentials
request manifests, 2023-11-13, openshift/cluster-capi-operator#143)
annotated some cluster-API CredentialsRequests used for other
providers.  This commit catches cluster-API OpenStack up with those
other changes.

There is a risk that tech-preview clusters updating into this change
will have the CloudCredential capability implicitly enabled.  But
because TechPreviewNoUpgrade blocks minor updates, and we don't intend
to backport this to 4.14.z, that exposure is confined to unsuported
prerelease clusters.
@openshift-ci-robot openshift-ci-robot added jira/severity-moderate Referenced Jira bug's severity is moderate for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. labels Jan 3, 2024
@openshift-ci-robot
Copy link

@wking: This pull request references Jira Issue OCPBUGS-26027, which is valid. The bug has been moved to the POST state.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.16.0) matches configured target version for branch (4.16.0)
  • bug is in the state New, which is one of the valid states (NEW, ASSIGNED, POST)

No GitHub users were found matching the public email listed for the QA contact in Jira (itbrown@redhat.com), skipping review request.

The bug has been updated to refer to the pull request using the external bug tracker.

In response to this:

Builds on #293; you may want to review that one first.

openshift/machine-api-operator@9c20871740 (openshift/machine-api-operator#1174) added this capability to the machine-API analog of this manifest. And openshift/cluster-capi-operator@e305541274 (openshift/cluster-capi-operator#143) annotated some cluster-API CredentialsRequests used for other providers. This commit catches cluster-API OpenStack up with those other changes.

There is a risk that tech-preview clusters updating into this change will have the CloudCredential capability implicitly enabled. But because tech-preview clusters with the CloudCredential capability disabled were not installable, there should be no exposed clusters attempting those updates.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@dulek
Copy link

dulek commented Jan 4, 2024

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Jan 4, 2024
@EmilienM
Copy link
Member

EmilienM commented Jan 4, 2024

/approve

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jan 4, 2024
@openshift-ci-robot
Copy link

/retest-required

Remaining retests: 0 against base HEAD 9860b53 and 2 for PR HEAD d5a54c1 in total

Copy link

openshift-ci bot commented Jan 4, 2024

@wking: all tests passed!

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@openshift-merge-bot openshift-merge-bot bot merged commit 20e33ac into openshift:main Jan 4, 2024
7 checks passed
@openshift-ci-robot
Copy link

@wking: Jira Issue OCPBUGS-26027: All pull requests linked via external trackers have merged:

Jira Issue OCPBUGS-26027 has been moved to the MODIFIED state.

In response to this:

Builds on #293; you may want to review that one first.

openshift/machine-api-operator@9c20871740 (openshift/machine-api-operator#1174) added this capability to the machine-API analog of this manifest. And openshift/cluster-capi-operator@e305541274 (openshift/cluster-capi-operator#143) annotated some cluster-API CredentialsRequests used for other providers. This commit catches cluster-API OpenStack up with those other changes.

There is a risk that tech-preview clusters updating into this change will have the CloudCredential capability implicitly enabled. But because tech-preview clusters with the CloudCredential capability disabled were not installable, there should be no exposed clusters attempting those updates.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-bot
Copy link

[ART PR BUILD NOTIFIER]

This PR has been included in build openstack-cluster-api-controllers-container-v4.16.0-202401041812.p0.g20e33ac.assembly.stream for distgit openstack-cluster-api-controllers.
All builds following this will include this PR.

@wking wking deleted the CloudCredential-capability branch January 4, 2024 23:27
@wking
Copy link
Member Author

wking commented Jan 4, 2024

/cherrypick release-4.15

@openshift-cherrypick-robot

@wking: new pull request created: #295

In response to this:

/cherrypick release-4.15

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-merge-robot
Copy link

Fix included in accepted release 4.16.0-0.nightly-2024-01-09-085011

@mandre
Copy link
Member

mandre commented Feb 9, 2024

/cherrypick release-4.15

@openshift-cherrypick-robot

@mandre: new pull request created: #297

In response to this:

/cherrypick release-4.15

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/severity-moderate Referenced Jira bug's severity is moderate for the branch this PR is targeting. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

8 participants