Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Install ICSP/CatalogSource Files #59

Closed
afflom opened this issue Aug 31, 2021 · 8 comments
Closed

Install ICSP/CatalogSource Files #59

afflom opened this issue Aug 31, 2021 · 8 comments
Labels
kind/feature Categorizes issue or PR as related to a new feature. lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed.
Projects

Comments

@afflom
Copy link
Contributor

afflom commented Aug 31, 2021

This is a delicate procedure. We need to make sure that we nail the logic on this. The logic needs to be clarified, but this is a rough guess:

  1. patch override operator hub
  2. update icmp for ocp releases, images referenced in the catalogs, and other arbitrary images in the imageset.
  3. check installed operator versions and verify upgrade path to new catalog. Error if operators will become orphaned.
  4. once operators are upgradable to new catalog version, upgrade ocp
  5. patch override operator hub
  6. upgrade operators from new catalog version

For the record, I am not saying that we should be triggering cluster upgrades from this application. Also, some of this might be handled by CVO or OLM. So some of this might not be handled by this app, but some of these objects need to be managed by us.

@jpower432 jpower432 added this to the Alpha2 milestone Sep 1, 2021
@afflom afflom changed the title Install ICMP/CatalogSource Files Install ICSP/CatalogSource Files Sep 1, 2021
@afflom afflom added the kind/feature Categorizes issue or PR as related to a new feature. label Sep 9, 2021
@afflom afflom modified the milestones: Alpha2, Alpha3 Sep 16, 2021
@dmesser
Copy link
Contributor

dmesser commented Sep 23, 2021

Can we actually reliably do this? We don't know where the cluster or how many clusters are going to be installed based on this. Also different clusters need different ICSPs based on their versions.

@afflom
Copy link
Contributor Author

afflom commented Sep 23, 2021

@dmesser, From our offline convo, I'll backlog this for now.

@afflom afflom removed this from the Alpha3 milestone Sep 23, 2021
@afflom afflom added this to the Backlog milestone Nov 30, 2021
@jpower432 jpower432 removed this from the Backlog milestone Feb 1, 2022
@jpower432 jpower432 added this to To do in Backlog via automation Feb 1, 2022
@openshift-bot
Copy link
Contributor

Issues go stale after 90d of inactivity.

Mark the issue as fresh by commenting /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.
Exclude this issue from closing by commenting /lifecycle frozen.

If this issue is safe to close now please do so with /close.

/lifecycle stale

@openshift-ci openshift-ci bot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label May 3, 2022
@jpower432
Copy link
Contributor

@afflom I think we have deemed this RFE as out of scope for oc-mirror. Do you agree? Safe to close?

@afflom
Copy link
Contributor Author

afflom commented May 6, 2022

I'd personally like to see an oc-mirror k8s controller that has this capability. It should have at least two modes of operation:

Spoke clusters: The controller would read the oc-mirror metadata from a mirror registry and render and apply the k8s resources to the cluster where it resides. It makes even more sense with oc-mirror being published to the ocp payload.

Hub clusters: same as above, but would also perform the registry maintenance (publish/delete)

@openshift-bot
Copy link
Contributor

Stale issues rot after 30d of inactivity.

Mark the issue as fresh by commenting /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.
Exclude this issue from closing by commenting /lifecycle frozen.

If this issue is safe to close now please do so with /close.

/lifecycle rotten
/remove-lifecycle stale

@openshift-ci openshift-ci bot added lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels Jun 6, 2022
@openshift-bot
Copy link
Contributor

Rotten issues close after 30d of inactivity.

Reopen the issue by commenting /reopen.
Mark the issue as fresh by commenting /remove-lifecycle rotten.
Exclude this issue from closing again by commenting /lifecycle frozen.

/close

@openshift-ci openshift-ci bot closed this as completed Jul 6, 2022
@openshift-ci
Copy link

openshift-ci bot commented Jul 6, 2022

@openshift-bot: Closing this issue.

In response to this:

Rotten issues close after 30d of inactivity.

Reopen the issue by commenting /reopen.
Mark the issue as fresh by commenting /remove-lifecycle rotten.
Exclude this issue from closing again by commenting /lifecycle frozen.

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Backlog automation moved this from To do to Done Jul 6, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/feature Categorizes issue or PR as related to a new feature. lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed.
Projects
Development

No branches or pull requests

4 participants