-
Notifications
You must be signed in to change notification settings - Fork 2.3k
[release-4.15] OCPBUGS-30970: Adds azure and gcp image credential providers #12498
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[release-4.15] OCPBUGS-30970: Adds azure and gcp image credential providers #12498
Conversation
Install the azure and gcp image registry credential providers, that are required from 4.16.
|
@openshift-cherrypick-robot: Ignoring requests to cherry-pick non-bug issues: OCPCLOUD-2484, OCPCLOUD-2481 DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
/retitle [release-4.15] OCPCLOUD-2484,OCPCLOUD-2481,OCPBUGS-30970: Adds azure and gcp image credential providers |
|
@openshift-cherrypick-robot: This pull request references OCPCLOUD-2484 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target either version "4.15." or "openshift-4.15.", but it targets "4.16" instead. This pull request references OCPCLOUD-2481 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target either version "4.15." or "openshift-4.15.", but it targets "4.16" instead. This pull request references Jira Issue OCPBUGS-30970, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
/retitle [release-4.15] OCPBUGS-30970: Adds azure and gcp image credential providers |
|
This adds ose-azure-acr-image-credential-provider and ose-gcp-gcr-image-credential-provider to release-4.15. This means the packages are already available when the upgrade from 4.15 -> 4.16 takes place. Currrently, kubelet can fail to start : 7755 kuberuntime_manager.go:273] "Failed to register CRI auth plugins" err="plugin binary executable /usr/libexec/kubelet-image-credential-provider-plugins/acr-credential-provider did not exist"This is because the RHEL worker upgrade can happen after the cluster upgrade. |
|
/label cherry-pick-approved |
|
@theobarberbany the e2e-aws-workers-rhel8 job failed for the two packages are not available in 4.15 ocp repo. |
|
/hold |
|
@gpei That would be great. The choice to not have them in 4.15 was deliberate, but seemingly the wrong one now. When I did this work, I wasn't too familiar with how the upgrade process works and assumed that the workers would always be upgraded first, avoiding this problem! If you slack it to me I will message the member of ART team who dealt with this previously, as they will have context :) |
yeah, that's true for the RHCOS workers, but RHEL worker is an exception, they're not completely managed by the MCO, so it's very troublesome. |
|
/jira refresh |
|
@barbacbd: This pull request references Jira Issue OCPBUGS-30970, which is invalid:
Comment DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
/jira refresh |
|
@barbacbd: This pull request references Jira Issue OCPBUGS-30970, which is valid. The bug has been moved to the POST state. 9 validation(s) were run on this bug
Requesting review from QA contact: DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
@barbacbd: The specified target(s) for
Use DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
@barbacbd just FYI, it's still pending on ticket https://issues.redhat.com/browse/ART-9396 |
|
/test e2e-aws-workers-rhel8 |
|
/test e2e-aws-workers-rhel8 |
|
@openshift-cherrypick-robot: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
|
/hold cancel |
barbacbd
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/approve
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: barbacbd, openshift-cherrypick-robot The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
/label backport-risk-assessed |
|
@theobarberbany: Can not set label backport-risk-assessed: Must be member in one of these teams: [] DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/label backport-risk-assessed |
|
@sdodson: Can not set label backport-risk-assessed: Must be member in one of these teams: [] DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
@openshift-cherrypick-robot: Jira Issue OCPBUGS-30970: All pull requests linked via external trackers have merged:
Jira Issue OCPBUGS-30970 has been moved to the MODIFIED state. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
/cherry-pick release-4.14 |
|
@gpei: new pull request created: #12531 DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
While debugging on the 4.14 to 4.16 CPOU upgrade test with RHEL workers in openshift/release#65478, I realized that we might need to install these two packages in version 4.14 too, because if we directly upgrade the RHEL node from version 4.14 to 4.16 in CPOU upgrade workflow, the kubelet service will fail to start due to the absence of the two packages on Azure/GCP. |
|
I think that makes sense.... do we allow customers to jump 4.14 -> 4.16 without going through 4.15? Now I have to remember all the context around this. I'm not sure we're building azure & gcp credential providers for 4.14... edit: i've just seen the PR + ticket requesting builds :) those will need @gpei can you check if it works if upgrading 4.14 -> 4.15 -> 4.16? |
|
@theobarberbany hi, thanks for looking into this
This is available in an upgrade way called
yeah, I think it should work well for such step-by-step upgrade(I haven't tested it yet, and we don't have such CI job, but I can give a try later), because in 4.15 we don't require those packages yet, and while upgrading to 4.15, the packages would be installed on the RHEL node, and then it would be safe to moved to 4.16. such as in the RHEL worker upgrading from 4.14 to 4.15 step |
|
ah ok - this makes sense. Currently, we don't have the required |
I'm not aware of this, for 4.14.z bug, the bot just cloned https://issues.redhat.com//browse/OCPBUGS-57111 for the openshift-ansible PR backporting. |
This is an automated cherry-pick of #12492
/assign theobarberbany