Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug 1890074: daemon: allow an extension to install group of packages #2170

Merged
merged 1 commit into from Oct 23, 2020

Conversation

sinnykumari
Copy link
Contributor

In the previous implementation, an extension was one to one
mapping with the package it would install on the host. This can
become confusing if enabling an extension would require
installing multiple sets of packages which are not install
time dependency.

Also added e2e test for kernel-devel extensions

@openshift-ci-robot openshift-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Oct 22, 2020
@sinnykumari sinnykumari changed the title daemon: allow an extension to install group of packages Bug 1890074: daemon: allow an extension to install group of packages Oct 22, 2020
@openshift-ci-robot openshift-ci-robot added the bugzilla/severity-high Referenced Bugzilla bug's severity is high for the branch this PR is targeting. label Oct 22, 2020
@openshift-ci-robot
Copy link
Contributor

@sinnykumari: This pull request references Bugzilla bug 1890074, which is valid. The bug has been moved to the POST state. The bug has been updated to refer to the pull request using the external bug tracker.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target release (4.7.0) matches configured target release for branch (4.7.0)
  • bug is in the state NEW, which is one of the valid states (NEW, ASSIGNED, ON_DEV, POST, POST)

In response to this:

Bug 1890074: daemon: allow an extension to install group of packages

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci-robot openshift-ci-robot added the bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. label Oct 22, 2020
Copy link
Member

@cgwalters cgwalters left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/approve
LGTM as is

test/e2e/mcd_test.go Outdated Show resolved Hide resolved
In the previous implementation, an extension was one to one
mapping with the package it would install on the host. This can
become confusing if enabling an extension would require
installing multiple sets of packages which are not install
time dependency.

Also added e2e test for kernel-devel extensions
@runcom
Copy link
Member

runcom commented Oct 22, 2020

awesome Sinny! does this just work as rhcos base does have kernel-headers then? if it does I think this is good to get in (I think we spoke about a test for this somewhere but I'm probably just missing the PR rn)

@sinnykumari
Copy link
Contributor Author

sinnykumari commented Oct 22, 2020

awesome Sinny! does this just work as rhcos base does have kernel-headers then? if it does I think this is good to get in (I think we spoke about a test for this somewhere but I'm probably just missing the PR rn)

machine-os-content already ships kernel-headers package along with (kernel-{devel,core,modules}) in extensions/ directory. So, we can just install it by MCO by explicitly specifying that as args to rpm-ostree install.

kernel-devel extension test is covered in this PR https://github.com/openshift/machine-config-operator/pull/2170/files#diff-6324e53eb8b87fa591d0dd87722e4dff1200a2bc57d7c83f042a90f4be53f68bR255 😄

@runcom
Copy link
Member

runcom commented Oct 22, 2020

/lgtm

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Oct 22, 2020
@openshift-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: cgwalters, runcom, sinnykumari

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:
  • OWNERS [cgwalters,runcom,sinnykumari]

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

}

return extArgs
}

// Returns list of extensions possible to install on a CoreOS based system.
func getSupportedExtensions() map[string][]string {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

love that you add helpful notes ❤️

@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

2 similar comments
@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

@kikisdeliveryservice
Copy link
Contributor

/skip

@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

@openshift-merge-robot
Copy link
Contributor

openshift-merge-robot commented Oct 23, 2020

@sinnykumari: The following tests failed, say /retest to rerun all failed tests:

Test name Commit Details Rerun command
ci/prow/e2e-ovn-step-registry c30db97 link /test e2e-ovn-step-registry
ci/prow/okd-e2e-aws c30db97 link /test okd-e2e-aws

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

1 similar comment
@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

@openshift-merge-robot openshift-merge-robot merged commit 83ab241 into openshift:master Oct 23, 2020
@openshift-ci-robot
Copy link
Contributor

@sinnykumari: All pull requests linked via external trackers have merged:

Bugzilla bug 1890074 has been moved to the MODIFIED state.

In response to this:

Bug 1890074: daemon: allow an extension to install group of packages

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@sinnykumari
Copy link
Contributor Author

/cherrypick 4.6

@openshift-cherrypick-robot

@sinnykumari: cannot checkout 4.6: error checking out 4.6: exit status 1. output: error: pathspec '4.6' did not match any file(s) known to git

In response to this:

/cherrypick 4.6

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@sinnykumari
Copy link
Contributor Author

/cherry-pick release-4.6

@openshift-cherrypick-robot

@sinnykumari: new pull request created: #2173

In response to this:

/cherry-pick release-4.6

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@@ -865,22 +865,43 @@ func generateExtensionsArgs(oldConfig, newConfig *mcfgv1.MachineConfig) []string
}
}

// Supported extensions has package list info that is required
// to enable an extension
extensions := getSupportedExtensions()
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This breaks OKD 4.7 :(

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you link me to that code? Wait...I think I found it:
https://github.com/openshift/release/blob/959c2954344438c4eed3ec7f52a5e099e8335516/ci-operator/jobs/openshift/release/openshift-release-release-4.7-periodics.yaml#L586

That's...terrifying 😄

I guess it's hard to do much here other than continue to entirely remove validation on OKD short term.

Copy link
Member

@vrutkovs vrutkovs Oct 23, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Right, previously MCC verified that extensions list is valid (on FCOS it skipped this check). Guess its time to rework it so that MCD could mutate it (and leave as is on OKD).

This huge list of RPMs is "additional requirements needed for https://github.com/openshift/okd-machine-os/pull/1/files?file-filters%5B%5D=.yaml#diff-31707c7d28c43a865b772edd586d49ef987cbe508755dbe27b2d9f382f1bdee0"

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

damm, missed this usecase. It will be good to have okd-gcp-op test running so that we don't break it.
Will give some thought to fix it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. bugzilla/severity-high Referenced Bugzilla bug's severity is high for the branch this PR is targeting. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

9 participants