Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Resync from upstream release-1.9 to downstream 4.11 #374

Merged
merged 23 commits into from Apr 27, 2022

Conversation

leseb
Copy link

@leseb leseb commented Apr 27, 2022

Resync from upstream release-1.9 to downstream 4.11

subhamkrai and others added 23 commits April 21, 2022 15:47
adding support for go 1.18 but rook master still
build on 1.17.

Signed-off-by: subhamkrai <srai@redhat.com>
(cherry picked from commit 4283973)
moving setting csi parameter to setParams
function as `setParams` is mostly used to set
the csi parameters for the templates.

Signed-off-by: Madhu Rajanna <madhupr007@gmail.com>
(cherry picked from commit c255e35)
Allow defining ingressClassName on K8S clusters v1.20+ that uses networking.k8s.io/v1

Signed-off-by: Casper Biering <casper@biering.dk>
(cherry picked from commit 9aa16ac)
helm: ingressClassName should be available for networking.k8s.io/v1 (backport #10132)
csi: move setting csi param to setParams (backport #10124)
A new Ceph-CSI release is out so let's use it.

Signed-off-by: Sébastien Han <seb@redhat.com>
(cherry picked from commit 1093b0a)
The endpoint on the rgw realm pull spec is causing a failure
if not specified even when it is not expected to be
required. Now the endpoint has the json property to be
ommitted if not specified.

Signed-off-by: Travis Nielsen <tnielsen@redhat.com>
(cherry picked from commit 7f70977)
csi: update cephcsi to v3.6.1 release (backport #10150)
core: RGW realm pull spec is optional (backport #10139)
The "data" field only accepts base64 strings and our env var is not. So
let's use stringData to prevent an error from the API server:

```
"v1" cannot be handled as a Secret: illegal base64 data at input byte 29
```

Signed-off-by: Sébastien Han <seb@redhat.com>
(cherry picked from commit edfd120)
ci: use stringData instead of data for secret (backport #10156)
Support is removed for k8s for various limitations such as
priority classes not working and csi driver feature
incompleteness and missing snapshots. Documentation is updated
with the new min version of k8s 1.17 and also the tests are
updated to run on the min version of 1.17.

Signed-off-by: Travis Nielsen <tnielsen@redhat.com>
(cherry picked from commit d26b6cf)
build: Update min version to k8s 1.17 (backport #10123)
updating go ceph version to 0.15.0 will no longer require
`ceph_preview` during build. Also if added in VsCode workspace
we can remove that now.

Signed-off-by: subhamkrai <srai@redhat.com>
(cherry picked from commit 6de3e3d)
The access/secrets keys for the user struct need to allocate only if
ceph user creation succeeds.

Signed-off-by: Jiffin Tony Thottan <thottanjiffin@gmail.com>
(cherry picked from commit 60da73a)
build: update go-ceph version and remove ceph_preview (backport #10125)
The CSI package needs to load clusterInfo, today this code is in the mon
package which makes the call of LoadClusterInfo impossible without
having a circular import.

Signed-off-by: Sébastien Han <seb@redhat.com>
(cherry picked from commit 583791c)
The CI runs will now collect all the secrets and configmaps available.

Signed-off-by: Sébastien Han <seb@redhat.com>
(cherry picked from commit 79dbb35)
Implementation of the design proposed in
#9903.

Signed-off-by: Sébastien Han <seb@redhat.com>
(cherry picked from commit 73b1347)
sometimes, it take few seconds to fill certificate
after certificate approval. So, let's wait for few seconds.

Closes: #10158
Signed-off-by: subhamkrai <srai@redhat.com>
(cherry picked from commit 86b3d46)
ci: wait for cert while deploying vault (backport #10173)
core: fix csi-cephfsplugin pod restart on non-hostnetworking env (backport #9925)
@openshift-ci
Copy link

openshift-ci bot commented Apr 27, 2022

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: leseb

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Apr 27, 2022
@leseb leseb merged commit ee0f281 into red-hat-storage:release-4.11 Apr 27, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files.
Projects
None yet
6 participants