-
Notifications
You must be signed in to change notification settings - Fork 503
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bug 1978798: Revert "Update ovnKubernetesConfig.policyAuditConfig Default" #1102
Bug 1978798: Revert "Update ovnKubernetesConfig.policyAuditConfig Default" #1102
Conversation
@astoycos: This pull request references Bugzilla bug 1978798, which is valid. The bug has been moved to the POST state. The bug has been updated to refer to the pull request using the external bug tracker. 3 validation(s) were run on this bug
Requesting review from QA contact: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/label qe-approved |
/bugzilla refresh The requirements for Bugzilla bugs have changed (BZs linked to PRs on master branch need to target OCP 4.11), recalculating validity. |
@openshift-bot: This pull request references Bugzilla bug 1978798, which is invalid:
Comment In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/bugzilla refresh |
@astoycos: This pull request references Bugzilla bug 1978798, which is valid. 3 validation(s) were run on this bug
Requesting review from QA contact: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@sttts If you get the chance can you PTAL a look at this? |
/assign @sttts |
Issues go stale after 90d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle stale |
e48771d
to
c98e37e
Compare
/lgtm |
/cc @tkashem |
/remove-lifecycle stale |
Worst diff ever. Was there a difference between nil and empty in the handling code? If there is a difference in how those are handled, then I'm worried about
Also, we avoid having nullable structs in our configuration code to improve discoverability of the options when taking actions like |
Yaml patches introduced these ugly diffs in the first place I believe :/ (see the original commit 6f0ce8c) This patch hack was originally needed because of this Kubebuilder bug and only effected users on clusters upgrading from when the new audit logging config object didn't exist (Pre-4.8). In 4.8 and later the defaults for the audit logging config are properly populated, and in upgrade clusters the workaround is documented in the bug. Regardless the kubebuilder defaults still work just fine when the policyAuditConfig exists AND the CNO handles if the config is null (which is a bit redundant if kubebuilder is working as expected). Lastly, The CNO doesn't need to distinguish between "nil" and "empty" in this case. |
So the thought is that clusters that are upgrading to 4.12 will already have this stanza? If so, I'm ok with this /approve holding for confirmation that my interpretation is correct. If it is, you may remove the hold. In the future, try to avoid using pointers and defaults in configuration APIs. Empty objects help with discoverability and handling "no opinion" differently that user selected choices allows for evolution over time. |
This reverts commit 6f0ce8c.
c98e37e
to
8b569e4
Compare
They should and if for some reason they don't it's very easy to add
Agreed, at the time I was just following the advice from the team. |
@benluddy this lost the lgtm during rebase |
@astoycos: all tests passed! Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: astoycos, benluddy, deads2k The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/unhold |
@astoycos: All pull requests linked via external trackers have merged: Bugzilla bug 1978798 has been moved to the MODIFIED state. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Remove the unecessary yaml patch for the ClusterNetworkOperator
CRD since this wasn't working as intended anyways. See bz for more info
This reverts commit 6f0ce8c.