Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OCPBUGS-6663: Check platform baremetal settings against default values #6809

Merged

Conversation

bfournie
Copy link
Contributor

@bfournie bfournie commented Jan 26, 2023

Spurious warning are being generated for platform baremetal values. Compare the values to default in order to detect the values were set in install-config.

Since the default values for MAC addresses are generated a valid comparison can't be done, so these checks have been removed.

@openshift-ci-robot openshift-ci-robot added jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. labels Jan 26, 2023
@openshift-ci-robot
Copy link
Contributor

@bfournie: This pull request references Jira Issue OCPBUGS-6663, which is valid. The bug has been moved to the POST state.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.13.0) matches configured target version for branch (4.13.0)
  • bug is in the state ASSIGNED, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @zniu1011

The bug has been updated to refer to the pull request using the external bug tracker.

In response to this:

Spurious warning are being generated for platform baremetal values. Compare the values to default in order to detect the values were set in install-config.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci openshift-ci bot requested a review from zniu1011 January 26, 2023 20:24
@bfournie
Copy link
Contributor Author

/cc @zaneb @rwsu @andfasano

@openshift-ci-robot
Copy link
Contributor

@bfournie: This pull request references Jira Issue OCPBUGS-6663, which is valid.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.13.0) matches configured target version for branch (4.13.0)
  • bug is in the state POST, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @zniu1011

In response to this:

Spurious warning are being generated for platform baremetal values. Compare the values to default in order to detect the values were set in install-config.

Since the default values for MAC addresses are generated a valid comparison can't be done, so these checks have been removed.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Copy link
Contributor

@rwsu rwsu left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

fieldPath := field.NewPath("Platform", "Baremetal", "ExternalBridge")
logrus.Warnf(fmt.Sprintf("%s: %s is ignored", fieldPath, baremetal.ExternalBridge))
}
if baremetal.ExternalMACAddress != "" {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good catch. I would have assumed the MAC address would have been blank instead of randomized.

@rwsu
Copy link
Contributor

rwsu commented Jan 30, 2023

/retest-required

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Jan 30, 2023
Spurious warning are being generated for platform baremetal values.
Compare the values to default in order to detect the values were set
in install-config.
@openshift-ci openshift-ci bot removed the lgtm Indicates that a PR is ready to be merged. label Jan 30, 2023
@bfournie
Copy link
Contributor Author

Fixed lint issue

@andfasano
Copy link
Contributor

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Jan 30, 2023
@bfournie
Copy link
Contributor Author

/cherry-pick release-4.12

@openshift-cherrypick-robot

@bfournie: once the present PR merges, I will cherry-pick it on top of release-4.12 in a new PR and assign it to you.

In response to this:

/cherry-pick release-4.12

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@rwsu
Copy link
Contributor

rwsu commented Jan 31, 2023

/retest-required

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jan 31, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: rwsu

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jan 31, 2023
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jan 31, 2023

@bfournie: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-vsphere-upi-zones ce99013 link false /test e2e-vsphere-upi-zones
ci/prow/e2e-agent-sno-ipv6 ce99013 link false /test e2e-agent-sno-ipv6
ci/prow/e2e-aws-ovn-workers-rhel8 ce99013 link false /test e2e-aws-ovn-workers-rhel8
ci/prow/e2e-gcp-secureboot ce99013 link false /test e2e-gcp-secureboot
ci/prow/e2e-aws-ovn-disruptive ce99013 link false /test e2e-aws-ovn-disruptive

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@openshift-merge-robot openshift-merge-robot merged commit 58e4ed8 into openshift:master Jan 31, 2023
@openshift-ci-robot
Copy link
Contributor

@bfournie: All pull requests linked via external trackers have merged:

Jira Issue OCPBUGS-6663 has been moved to the MODIFIED state.

In response to this:

Spurious warning are being generated for platform baremetal values. Compare the values to default in order to detect the values were set in install-config.

Since the default values for MAC addresses are generated a valid comparison can't be done, so these checks have been removed.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-cherrypick-robot

@bfournie: new pull request created: #6815

In response to this:

/cherry-pick release-4.12

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@bfournie bfournie deleted the agent-platform-defaults branch January 31, 2023 12:18
@@ -187,58 +188,53 @@ func warnUnusedConfig(installConfig *types.InstallConfig) {
switch installConfig.Platform.Name() {

case baremetal.Name:
defaultIc := &types.InstallConfig{Platform: types.Platform{BareMetal: &baremetal.Platform{}}}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In the case where the provisioning network is disabled and the ProvisioningIP is set, the default ProvisioningNetworkCIDR is derived from network CIDRs in the install-config. We could avoid a warning in that case by starting with a copy of the InstallConfig, instead of a blank one. (However, there will already be warnings about ProvisioningNetwork=disabled and ProvisioningIP in that case, so this is not a big deal.)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants