OCPNODE-3880: Add empty CRIOCredentialProviderConfig resource#2711
OCPNODE-3880: Add empty CRIOCredentialProviderConfig resource#2711QiWang19 wants to merge 1 commit intoopenshift:masterfrom
Conversation
Signed-off-by: Qi Wang <qiwan@redhat.com>
|
Pipeline controller notification For optional jobs, comment This repository is configured in: LGTM mode |
|
Skipping CI for Draft Pull Request. |
|
Hello @QiWang19! Some important instructions when contributing to openshift/api: |
📝 WalkthroughWalkthroughThis pull request introduces a new OpenShift CRI-O credential provider configuration manifest file. The manifest defines a CRIOCredentialProviderConfig custom resource with apiVersion 🚥 Pre-merge checks | ✅ 2 | ❌ 1❌ Failed checks (1 inconclusive)
✅ Passed checks (2 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches
🧪 Generate unit tests (beta)
Comment |
|
/test all |
|
Unsupported PR languages |
ⓘ You are approaching your monthly quota for Qodo. Upgrade your plan Review Summary by QodoAdd empty CRIOCredentialProviderConfig resource definition
WalkthroughsDescription• Add empty CRIOCredentialProviderConfig resource definition • Configure resource with cluster metadata and annotations • Enable feature gate for credential provider configuration Diagramflowchart LR
A["New Resource File"] -- "defines" --> B["CRIOCredentialProviderConfig"]
B -- "with metadata" --> C["cluster name"]
B -- "with annotations" --> D["Feature gates & release config"]
B -- "with spec" --> E["Empty spec"]
File Changes1. payload-command/empty-resources/0000_05_config-operator_02_criocredentialproviderconfig.cr.yaml
|
ⓘ You are approaching your monthly quota for Qodo. Upgrade your plan Code Review by Qodo
1. Novel feature-gate annotation on CR
|
| include.release.openshift.io/ibm-cloud-managed: "true" | ||
| include.release.openshift.io/self-managed-high-availability: "true" | ||
| release.openshift.io/create-only: "true" | ||
| release.openshift.io/feature-gate: "CRIOCredentialProviderConfig" |
There was a problem hiding this comment.
1. Novel feature-gate annotation on cr 🐞 Bug ✓ Correctness
The release.openshift.io/feature-gate annotation is used here on a CR for the first time in this codebase — every prior usage is exclusively on kind: CustomResourceDefinition objects. If CVO does not honor this annotation for non-CRD resources, the CR will be applied on all clusters matching the cluster-profile annotations (ibm-cloud-managed and self-managed-high-availability), including Default feature-set clusters where the criocredentialproviderconfigs.config.openshift.io CRD does not exist, causing a CVO error that could degrade the ClusterVersion operator.
Agent Prompt
## Issue description
The `release.openshift.io/feature-gate` annotation has only ever been applied to `kind: CustomResourceDefinition` objects in this codebase. Applying it to a CR (`kind: CRIOCredentialProviderConfig`) is novel and unverified. If CVO does not honor this annotation for non-CRD resources, the CR will be applied on Default clusters where the CRD does not exist, causing a CVO error.
## Issue Context
- The CRIOCredentialProviderConfig CRD exists only for DevPreviewNoUpgrade, TechPreviewNoUpgrade, and CustomNoUpgrade feature sets.
- `CRIOCredentialProviderConfig` is in the `disabled` list for Default clusters (`payload-manifests/featuregates/featureGate-SelfManagedHA-Default.yaml`).
- All other CRDs using `release.openshift.io/feature-gate` also carry `release.openshift.io/feature-set`.
- No other file in `payload-command/empty-resources/` uses `release.openshift.io/feature-gate`.
## Fix Focus Areas
- payload-command/empty-resources/0000_05_config-operator_02_criocredentialproviderconfig.cr.yaml[9-9]
ⓘ Copy this prompt and use it to remediate the issue with your preferred AI generation tools
|
Unsupported PR languages |
|
/verified by Cluster-bot |
|
@QiWang19: This PR has been marked as verified by DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
/test verify |
|
Unsupported PR languages |
|
@QiWang19: This pull request references OCPNODE-3880 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set. DetailsIn response to this: Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
@QiWang19: This pull request references OCPNODE-3880 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
/lgtm |
|
Scheduling tests matching the |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: JoelSpeed The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
@QiWang19: The following test failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
Add an empty singleton CRIOCredentialProviderConfig CR named
cluster. As discussed, keep the behavior consistent with the current singleton CRDs.