-
Notifications
You must be signed in to change notification settings - Fork 335
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HOSTEDCP-2249: Reconcile karpenter user-data secret programmatically instead of creating a mock nodePool #5439
base: main
Are you sure you want to change the base?
Conversation
@muraee: This pull request references HOSTEDCP-2249 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.19.0" version, but no target version was set. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: muraee The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/hold |
return err | ||
} | ||
|
||
haproxy := haproxy.HAProxy{ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not for this PR but we need to follow up to hide the haproxy generation behind the Config logic.
Then the rest of this logic could be encapsulated within a func token() as in the nodepool_controller if we have a common reconciler interface which implements the methods to get the image
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can we have this logic now to be a unit tested function which validates the expected userData is generated with their current contractual expectations, i.e. hyperv1.NodePoolLabel and hypershift.openshift.io/ami?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
added a unit test
@@ -1832,6 +1826,10 @@ func (r *HostedClusterReconciler) reconcile(ctx context.Context, req ctrl.Reques | |||
} | |||
} | |||
|
|||
if err := r.reconcileKarpenterOperator(ctx, createOrUpdate, hcluster, hcp, r.HypershiftOperatorImage, controlPlaneOperatorImage); err != nil { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
why are we moving this?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I just moved it to the end, just to make sure an error here doesn't block the HC from progressing.
3664cff
to
2ef2ab8
Compare
- stop nodepool_controller from importing hostecluster_controller to fix circular dependecies
2ef2ab8
to
df6576a
Compare
@muraee: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
What this PR does / why we need it:
Which issue(s) this PR fixes (optional, use
fixes #<issue_number>(, fixes #<issue_number>, ...)
format, where issue_number might be a GitHub issue, or a Jira story:Fixes #
Checklist