Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: generate a bundle with configmap and secret objects #256

Conversation

exdx
Copy link
Member

@exdx exdx commented Apr 6, 2020

Description of the change:
Adds support for users putting configmap and secret objects inside their bundle. Part of the work to increase the flexibility of OLM for users. OLM knows how to install secrets from an install plan currently, but support for configmaps will be added as well.

Currently no validation for these new objects is done (outside of them being valid kube objects) but they are whitelisted and will be installed when OLM installs the bundle.

Motivation for the change:

Reviewer Checklist

  • Implementation matches the proposed design, or proposal is updated to match implementation
  • Sufficient unit test coverage
  • Sufficient end-to-end test coverage
  • Docs updated or added to /docs
  • Commit messages sensible and descriptive

Copy link
Member

@kevinrizza kevinrizza left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This seems reasonable from the perspective of allowing bundles to contain configmaps and secrets, but do we also want to store the manifests in the registry itself?

Copy link
Member

@kevinrizza kevinrizza left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Spoke to Dan and did some testing, it seems like the registry insert doesn't gate on arbitrary yaml files.

We should potentially do a followup -- it could be the case that arbitrary yaml files are inserted here if you don't use opm to build your bundle. Should we gate when inserting into the registry? Right now as long as it's valid yaml or json we don't care.

/approve

@openshift-ci-robot openshift-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Apr 6, 2020
@exdx exdx mentioned this pull request Apr 7, 2020
@exdx exdx requested a review from njhale April 7, 2020 14:24
@ecordell
Copy link
Member

ecordell commented Apr 8, 2020

/approve

@openshift-ci-robot
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: ecordell, exdx, kevinrizza

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:
  • OWNERS [ecordell,kevinrizza]

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@kevinrizza
Copy link
Member

/lgtm

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Apr 8, 2020
@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

3 similar comments
@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest

Please review the full test history for this PR and help us cut down flakes.

@openshift-merge-robot openshift-merge-robot merged commit 489146a into operator-framework:master Apr 8, 2020
@exdx exdx deleted the feat/add-bundle-objects branch April 8, 2020 18:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

7 participants