Skip to content

OCPBUGS-57348: Cluster manages bootimages despite explicit bootimages in installconfig#5120

Closed
djoshy wants to merge 3 commits intoopenshift:mainfrom
djoshy:4.19-ami
Closed

OCPBUGS-57348: Cluster manages bootimages despite explicit bootimages in installconfig#5120
djoshy wants to merge 3 commits intoopenshift:mainfrom
djoshy:4.19-ami

Conversation

@djoshy
Copy link
Contributor

@djoshy djoshy commented Jun 13, 2025

Closes https://issues.redhat.com//browse/OCPBUGS-57348

- What I did
Added install config CM detection during the boot image opt-in evaluation . If a boot image specified in the InstallConfig, the MCO will prevent the opt-in. This should also work on upgrades.

- How to verify it
Bring up a 4.20/4.19 AWS/GCP cluster with install-config parameters for boot images(see bug). The MCO should not opt-in the cluster for boot image updates by default. The same should be true for upgrades from 4.18->4.19.

@openshift-ci-robot openshift-ci-robot added jira/severity-moderate Referenced Jira bug's severity is moderate for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. labels Jun 13, 2025
@openshift-ci-robot
Copy link
Contributor

@djoshy: This pull request references Jira Issue OCPBUGS-57348, which is valid. The bug has been moved to the POST state.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.20.0) matches configured target version for branch (4.20.0)
  • bug is in the state ASSIGNED, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @gpei

The bug has been updated to refer to the pull request using the external bug tracker.

Details

In response to this:

Closes
- What I did
Added install config CM detection during the boot image opt-in evaluation . If a boot image specified in the InstallConfig, the MCO will prevent the opt-in. This should also work on upgrades.

- How to verify it
Bring up a 4.20/4.19 AWS/GCP cluster with install-config parameters for boot images(see bug). The MCO should not opt-in the cluster for boot image updates by default. The same should be true for upgrades from 4.18->4.19.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jun 13, 2025
@djoshy
Copy link
Contributor Author

djoshy commented Jun 13, 2025

/payload-job periodic-ci-openshift-release-master-nightly-4.19-e2e-rosa-sts-ovn
/payload-job periodic-ci-openshift-release-master-nightly-4.20-e2e-rosa-sts-ovn

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jun 13, 2025

@djoshy: trigger 2 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-release-master-nightly-4.19-e2e-rosa-sts-ovn
  • periodic-ci-openshift-release-master-nightly-4.20-e2e-rosa-sts-ovn

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/b8aee040-4874-11f0-9439-43db3895c78e-0

Copy link
Contributor

@yuqi-zhang yuqi-zhang left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm, there seems to be a failure with go deps verify-deps. Could you check on that?

return false, nil
}

// Ignore control place changes until MCO-1007 is completed.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit:

Suggested change
// Ignore control place changes until MCO-1007 is completed.
// Ignore control plane changes until MCO-1007 is completed.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jun 13, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: djoshy, yuqi-zhang

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci-robot
Copy link
Contributor

@djoshy: An error was encountered querying GitHub for users with public email (gpei@redhat.com) for bug OCPBUGS-57348 on the Jira server at https://issues.redhat.com/. No known errors were detected, please see the full error message for details.

Full error message. Post "http://ghproxy/graphql": dial tcp 172.30.229.2:80: connect: connection refused

Please contact an administrator to resolve this issue, then request a bug refresh with /jira refresh.

Details

In response to this:

Closes https://issues.redhat.com//browse/OCPBUGS-57348

- What I did
Added install config CM detection during the boot image opt-in evaluation . If a boot image specified in the InstallConfig, the MCO will prevent the opt-in. This should also work on upgrades.

- How to verify it
Bring up a 4.20/4.19 AWS/GCP cluster with install-config parameters for boot images(see bug). The MCO should not opt-in the cluster for boot image updates by default. The same should be true for upgrades from 4.18->4.19.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jun 13, 2025

@djoshy: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-azure-ovn-upgrade-out-of-change bae00bd link false /test e2e-azure-ovn-upgrade-out-of-change
ci/prow/e2e-gcp-op bae00bd link true /test e2e-gcp-op
ci/prow/e2e-gcp-op-single-node bae00bd link true /test e2e-gcp-op-single-node
ci/prow/e2e-gcp-op-ocl bae00bd link false /test e2e-gcp-op-ocl
ci/prow/okd-scos-e2e-aws-ovn bae00bd link false /test okd-scos-e2e-aws-ovn
ci/prow/e2e-gcp-op-techpreview bae00bd link false /test e2e-gcp-op-techpreview

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@djoshy
Copy link
Contributor Author

djoshy commented Jun 16, 2025

/close

closing in favor of openshift/installer#9783

@openshift-ci openshift-ci bot closed this Jun 16, 2025
@openshift-ci-robot
Copy link
Contributor

@djoshy: This pull request references Jira Issue OCPBUGS-57348. The bug has been updated to no longer refer to the pull request using the external bug tracker.

Details

In response to this:

Closes https://issues.redhat.com//browse/OCPBUGS-57348

- What I did
Added install config CM detection during the boot image opt-in evaluation . If a boot image specified in the InstallConfig, the MCO will prevent the opt-in. This should also work on upgrades.

- How to verify it
Bring up a 4.20/4.19 AWS/GCP cluster with install-config parameters for boot images(see bug). The MCO should not opt-in the cluster for boot image updates by default. The same should be true for upgrades from 4.18->4.19.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jun 16, 2025

@djoshy: Closed this PR.

Details

In response to this:

/close

closing in favor of openshift/installer#9783

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@djoshy djoshy deleted the 4.19-ami branch July 9, 2025 20:06
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/severity-moderate Referenced Jira bug's severity is moderate for the branch this PR is targeting. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants