Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug 1978798: Revert "Update ovnKubernetesConfig.policyAuditConfig Default" #1102

Merged

Conversation

astoycos
Copy link
Contributor

Remove the unecessary yaml patch for the ClusterNetworkOperator
CRD since this wasn't working as intended anyways. See bz for more info

This reverts commit 6f0ce8c.

@openshift-ci openshift-ci bot added bugzilla/severity-medium Referenced Bugzilla bug's severity is medium for the branch this PR is targeting. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. labels Jan 21, 2022
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jan 21, 2022

@astoycos: This pull request references Bugzilla bug 1978798, which is valid. The bug has been moved to the POST state. The bug has been updated to refer to the pull request using the external bug tracker.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target release (4.10.0) matches configured target release for branch (4.10.0)
  • bug is in the state ASSIGNED, which is one of the valid states (NEW, ASSIGNED, ON_DEV, POST, POST)

Requesting review from QA contact:
/cc @asood-rh

In response to this:

Bug 1978798: Revert "Update ovnKubernetesConfig.policyAuditConfig Default"

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@asood-rh
Copy link

/label qe-approved

@openshift-ci openshift-ci bot added the qe-approved Signifies that QE has signed off on this PR label Jan 21, 2022
@openshift-bot
Copy link

/bugzilla refresh

The requirements for Bugzilla bugs have changed (BZs linked to PRs on master branch need to target OCP 4.11), recalculating validity.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jan 28, 2022

@openshift-bot: This pull request references Bugzilla bug 1978798, which is invalid:

  • expected the bug to target the "4.11.0" release, but it targets "4.10.0" instead

Comment /bugzilla refresh to re-evaluate validity if changes to the Bugzilla bug are made, or edit the title of this pull request to link to a different bug.

In response to this:

/bugzilla refresh

The requirements for Bugzilla bugs have changed (BZs linked to PRs on master branch need to target OCP 4.11), recalculating validity.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci openshift-ci bot added bugzilla/invalid-bug Indicates that a referenced Bugzilla bug is invalid for the branch this PR is targeting. and removed bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. labels Jan 28, 2022
@astoycos
Copy link
Contributor Author

/bugzilla refresh

@openshift-ci openshift-ci bot added bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. and removed bugzilla/invalid-bug Indicates that a referenced Bugzilla bug is invalid for the branch this PR is targeting. labels Feb 11, 2022
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 11, 2022

@astoycos: This pull request references Bugzilla bug 1978798, which is valid.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target release (4.11.0) matches configured target release for branch (4.11.0)
  • bug is in the state POST, which is one of the valid states (NEW, ASSIGNED, ON_DEV, POST, POST)

Requesting review from QA contact:
/cc @asood-rh

In response to this:

/bugzilla refresh

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@astoycos
Copy link
Contributor Author

@sttts If you get the chance can you PTAL a look at this?

@astoycos
Copy link
Contributor Author

/assign @sttts

@openshift-bot
Copy link

Issues go stale after 90d of inactivity.

Mark the issue as fresh by commenting /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.
Exclude this issue from closing by commenting /lifecycle frozen.

If this issue is safe to close now please do so with /close.

/lifecycle stale

@openshift-ci openshift-ci bot added lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. labels May 13, 2022
@astoycos astoycos force-pushed the remove-policy-audit-config-patch branch from e48771d to c98e37e Compare May 26, 2022 15:59
@openshift-ci openshift-ci bot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label May 26, 2022
@benluddy
Copy link
Contributor

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label May 31, 2022
@benluddy
Copy link
Contributor

/cc @tkashem

@openshift-ci openshift-ci bot requested a review from tkashem May 31, 2022 19:14
@benluddy
Copy link
Contributor

benluddy commented Jun 7, 2022

/remove-lifecycle stale

@openshift-ci openshift-ci bot removed the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Jun 7, 2022
@tkashem
Copy link
Contributor

tkashem commented Jun 8, 2022

/cc @soltysh @deads2k

@openshift-ci openshift-ci bot requested review from deads2k and soltysh June 8, 2022 18:55
@deads2k
Copy link
Contributor

deads2k commented Jul 8, 2022

Worst diff ever. Was there a difference between nil and empty in the handling code? If there is a difference in how those are handled, then I'm worried about

  1. behavior change when this is no longer defaulted
  2. the api behavior in general, it's unexpected to have a difference between nil and empty.

Also, we avoid having nullable structs in our configuration code to improve discoverability of the options when taking actions like oc edit for instance.

@astoycos
Copy link
Contributor Author

astoycos commented Jul 8, 2022

Yaml patches introduced these ugly diffs in the first place I believe :/ (see the original commit 6f0ce8c)

This patch hack was originally needed because of this Kubebuilder bug and only effected users on clusters upgrading from when the new audit logging config object didn't exist (Pre-4.8). In 4.8 and later the defaults for the audit logging config are properly populated, and in upgrade clusters the workaround is documented in the bug.

Regardless the kubebuilder defaults still work just fine when the policyAuditConfig exists AND the CNO handles if the config is null (which is a bit redundant if kubebuilder is working as expected).

Lastly, The CNO doesn't need to distinguish between "nil" and "empty" in this case.

@andreaskaris
Copy link
Contributor

@deads2k @astoycos Any consensus here?

@deads2k
Copy link
Contributor

deads2k commented Jul 12, 2022

This patch hack was originally needed because of this Kubebuilder bug and only effected users on clusters upgrading from when the new audit logging config object didn't exist (Pre-4.8). In 4.8 and later the defaults for the audit logging config are properly populated, and in upgrade clusters the workaround is documented in the bug.

So the thought is that clusters that are upgrading to 4.12 will already have this stanza? If so, I'm ok with this

/approve
/hold

holding for confirmation that my interpretation is correct. If it is, you may remove the hold.

In the future, try to avoid using pointers and defaults in configuration APIs. Empty objects help with discoverability and handling "no opinion" differently that user selected choices allows for evolution over time.

@openshift-ci openshift-ci bot added do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. approved Indicates a PR has been approved by an approver from all required OWNERS files. labels Jul 12, 2022
@astoycos astoycos force-pushed the remove-policy-audit-config-patch branch from c98e37e to 8b569e4 Compare July 12, 2022 18:51
@openshift-ci openshift-ci bot removed lgtm Indicates that a PR is ready to be merged. needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. labels Jul 12, 2022
@astoycos
Copy link
Contributor Author

So the thought is that clusters that are upgrading to 4.12 will already have this stanza? If so, I'm ok with this

They should and if for some reason they don't it's very easy to add

In the future, try to avoid using pointers and defaults in configuration APIs. Empty objects help with discoverability and handling "no opinion" differently that user selected choices allows for evolution over time.

Agreed, at the time I was just following the advice from the team.

@astoycos
Copy link
Contributor Author

@benluddy this lost the lgtm during rebase

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jul 12, 2022

@astoycos: all tests passed!

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@benluddy
Copy link
Contributor

/lgtm

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jul 12, 2022

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: astoycos, benluddy, deads2k

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Jul 12, 2022
@astoycos
Copy link
Contributor Author

/unhold

@openshift-ci openshift-ci bot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Jul 12, 2022
@openshift-ci openshift-ci bot merged commit 75a381b into openshift:master Jul 12, 2022
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jul 12, 2022

@astoycos: All pull requests linked via external trackers have merged:

Bugzilla bug 1978798 has been moved to the MODIFIED state.

In response to this:

Bug 1978798: Revert "Update ovnKubernetesConfig.policyAuditConfig Default"

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. bugzilla/severity-medium Referenced Bugzilla bug's severity is medium for the branch this PR is targeting. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. lgtm Indicates that a PR is ready to be merged. qe-approved Signifies that QE has signed off on this PR
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

8 participants