Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add kube-rbac-proxy image by digest for CNAO #1791

Merged
merged 1 commit into from
Mar 1, 2022

Conversation

orenc1
Copy link
Collaborator

@orenc1 orenc1 commented Feb 22, 2022

CNAO is moving to use HTTPS for its metrics service, and uses kube-rbac-proxy to make the service available with SSL.
The kube-rbac-proxy image should be fetched by digest and be added to the related images section in the CSV.

Once kubevirt/cluster-network-addons-operator#1144 will be merged and a new CNAO will be released, the CNAO section will be populated with the new image as well, by consuming its csv-generator with the new --kube-rbac-proxy-image argument.

Signed-off-by: orenc1 ocohen@redhat.com

Reviewer Checklist

Reviewers are supposed to review the PR for every aspect below one by one. To check an item means the PR is either "OK" or "Not Applicable" in terms of that item. All items are supposed to be checked before merging a PR.

  • PR Message
  • Commit Messages
  • How to test
  • Unit Tests
  • Functional Tests
  • User Documentation
  • Developer Documentation
  • Upgrade Scenario
  • Uninstallation Scenario
  • Backward Compatibility
  • Troubleshooting Friendly

Release note:

Add kube-rbac-proxy image for CNAO

@coveralls
Copy link
Collaborator

coveralls commented Feb 22, 2022

Pull Request Test Coverage Report for Build 1905549936

  • 0 of 0 changed or added relevant lines in 0 files are covered.
  • No unchanged relevant lines lost coverage.
  • Overall coverage remained the same at 85.216%

Totals Coverage Status
Change from base Build 1905540550: 0.0%
Covered Lines: 3689
Relevant Lines: 4329

💛 - Coveralls

Copy link
Contributor

@oshoval oshoval left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks Oren
Will update once the CNAO is updated

hack/config Outdated Show resolved Hide resolved
Copy link
Contributor

@oshoval oshoval left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks
lgtm, lets just be sure it is on hold until CNAO PR is merged

@orenc1
Copy link
Collaborator Author

orenc1 commented Feb 22, 2022

Thanks lgtm, lets just be sure it is on hold until CNAO PR is merged

I think these are independent.
We can merge this PR, in parallel you merge yours, and then CNAO makes a release that includes this PR.
When new CNAO is released, the bump-bot will run and update the manifests with the new CNAO csv-generator and will open a new PR.

@oshoval
Copy link
Contributor

oshoval commented Feb 22, 2022

Thanks lgtm, lets just be sure it is on hold until CNAO PR is merged

I think these are independent. We can merge this PR, in parallel you merge yours, and then CNAO makes a release that includes this PR. When new CNAO is released, the bump-bot will run and update the manifests with the new CNAO csv-generator and will open a new PR.

But what if there will be a CNAO release without my code after you merge this PR?
in case the variable will be just disregarded it is fine, but in case the csv-generator would deny it (i.e unknown arg), it will fail isn't it ?

@orenc1
Copy link
Collaborator Author

orenc1 commented Feb 22, 2022

Thanks lgtm, lets just be sure it is on hold until CNAO PR is merged

I think these are independent. We can merge this PR, in parallel you merge yours, and then CNAO makes a release that includes this PR. When new CNAO is released, the bump-bot will run and update the manifests with the new CNAO csv-generator and will open a new PR.

But what if there will be a CNAO release without my code after you merge this PR? in case the variable will be just disregarded it is fine, but in case the csv-generator would deny it (i.e unknown arg), it will fail isn't it ?

So to be on the safe side, please don't make a new CNAO release without kubevirt/cluster-network-addons-operator#1144. I see the last release was made 5 days ago anyway.
/FYI @phoracek

@oshoval
Copy link
Contributor

oshoval commented Feb 22, 2022

Thanks lgtm, lets just be sure it is on hold until CNAO PR is merged

I think these are independent. We can merge this PR, in parallel you merge yours, and then CNAO makes a release that includes this PR. When new CNAO is released, the bump-bot will run and update the manifests with the new CNAO csv-generator and will open a new PR.

But what if there will be a CNAO release without my code after you merge this PR? in case the variable will be just disregarded it is fine, but in case the csv-generator would deny it (i.e unknown arg), it will fail isn't it ?

So to be on the safe side, please don't make a new CNAO release without kubevirt/cluster-network-addons-operator#1144. I see the last release was made 5 days ago anyway. /FYI @phoracek

/FYI @qinqon

@hco-bot
Copy link
Collaborator

hco-bot commented Feb 22, 2022

okd-hco-e2e-upgrade-index-gcp lane succeeded.
/override ci/prow/okd-hco-e2e-upgrade-index-aws
hco-e2e-image-index-gcp lane succeeded.
/override ci/prow/hco-e2e-image-index-aws
hco-e2e-image-index-sno-azure lane succeeded.
/override ci/prow/hco-e2e-image-index-sno-aws

@hco-bot
Copy link
Collaborator

hco-bot commented Feb 22, 2022

hco-e2e-upgrade-prev-index-azure lane succeeded.
/override ci/prow/hco-e2e-upgrade-prev-index-aws
hco-e2e-image-index-azure, hco-e2e-image-index-gcp lanes succeeded.
/override ci/prow/hco-e2e-image-index-aws
okd-hco-e2e-upgrade-index-gcp lane succeeded.
/override ci/prow/okd-hco-e2e-upgrade-index-aws
hco-e2e-image-index-sno-azure lane succeeded.
/override ci/prow/hco-e2e-image-index-sno-aws

1 similar comment
@hco-bot
Copy link
Collaborator

hco-bot commented Feb 22, 2022

hco-e2e-upgrade-prev-index-azure lane succeeded.
/override ci/prow/hco-e2e-upgrade-prev-index-aws
hco-e2e-image-index-azure, hco-e2e-image-index-gcp lanes succeeded.
/override ci/prow/hco-e2e-image-index-aws
okd-hco-e2e-upgrade-index-gcp lane succeeded.
/override ci/prow/okd-hco-e2e-upgrade-index-aws
hco-e2e-image-index-sno-azure lane succeeded.
/override ci/prow/hco-e2e-image-index-sno-aws

@orenc1
Copy link
Collaborator Author

orenc1 commented Feb 22, 2022

it would be better to verify all of the changes in the same PR.
waiting for new CNAO release that includes kubevirt/cluster-network-addons-operator#1144, then I'll update the PR with the new CNAO version and re-build the manifests.
/hold

@orenc1 orenc1 added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Feb 22, 2022
@kubevirt-bot kubevirt-bot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Feb 22, 2022
@kubevirt-bot kubevirt-bot added dco-signoff: yes Indicates the PR's author has DCO signed all their commits. size/S and removed needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. labels Feb 23, 2022
@orenc1
Copy link
Collaborator Author

orenc1 commented Feb 23, 2022

/retest

@orenc1
Copy link
Collaborator Author

orenc1 commented Feb 23, 2022

looks like a problem with the bundle resolution/unpacking - InstallPlan wasn't created.
/retest

@orenc1
Copy link
Collaborator Author

orenc1 commented Feb 23, 2022

/retest

@kubevirt-bot kubevirt-bot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Feb 24, 2022
CNAO is moving to use HTTPS for its metrics service, and uses kube-rbac-proxy to make the service available with SSL.
The kube-rbac-proxy image should be fetched by digest and be added to the related images section in the CSV.

Signed-off-by: orenc1 <ocohen@redhat.com>
@kubevirt-bot kubevirt-bot added size/XS and removed needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. size/S labels Feb 27, 2022
@sonarcloud
Copy link

sonarcloud bot commented Feb 27, 2022

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

No Coverage information No Coverage information
0.0% 0.0% Duplication

@orenc1
Copy link
Collaborator Author

orenc1 commented Feb 27, 2022

/retest

1 similar comment
@orenc1
Copy link
Collaborator Author

orenc1 commented Feb 27, 2022

/retest

@openshift-ci
Copy link

openshift-ci bot commented Feb 27, 2022

@orenc1: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/hco-e2e-upgrade-index-sno-azure 6dfddb3 link false /test hco-e2e-upgrade-index-sno-azure

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@orenc1
Copy link
Collaborator Author

orenc1 commented Feb 27, 2022

/unhold

@kubevirt-bot kubevirt-bot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Feb 27, 2022
@hco-bot
Copy link
Collaborator

hco-bot commented Feb 27, 2022

hco-e2e-upgrade-index-sno-aws lane succeeded.
/override ci/prow/hco-e2e-upgrade-index-sno-azure

@kubevirt-bot
Copy link
Contributor

@hco-bot: Overrode contexts on behalf of hco-bot: ci/prow/hco-e2e-upgrade-index-sno-azure

In response to this:

hco-e2e-upgrade-index-sno-aws lane succeeded.
/override ci/prow/hco-e2e-upgrade-index-sno-azure

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@@ -12,6 +12,7 @@ NODE_DRIVER_REG_VERSION="v2.2.0"
LIVENESS_PROBE_VERSION="v2.3.0"
CSI_SNAPSHOT_VERSION="v4.2.1"
CSI_SIG_STORAGE_PROVISIONER_VERSION="v2.2.1"
KUBE_RBAC_PROXY_VERSION="4.10"
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@orenc1, Do you want to add it to the auto-bump bot?

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not sure it is required. We explicitly specified only the y-stream version, so that we'll get automatic z-stream updates to the image.
We'll update this image tag once in a release.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we need to update to 4.11 now ?

@nunnatsa
Copy link
Collaborator

nunnatsa commented Mar 1, 2022

/lgtm
/approve

@kubevirt-bot kubevirt-bot added the lgtm Indicates that a PR is ready to be merged. label Mar 1, 2022
@kubevirt-bot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: nunnatsa

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@kubevirt-bot kubevirt-bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Mar 1, 2022
@kubevirt-bot kubevirt-bot merged commit 408b048 into kubevirt:main Mar 1, 2022
@oshoval oshoval mentioned this pull request Dec 21, 2022
11 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. dco-signoff: yes Indicates the PR's author has DCO signed all their commits. lgtm Indicates that a PR is ready to be merged. size/XS
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

6 participants