Bug 1890074: pkg/daemon: avoid duplicate extension verification#2178
Bug 1890074: pkg/daemon: avoid duplicate extension verification#2178vrutkovs wants to merge 1 commit intoopenshift:masterfrom
Conversation
|
@vrutkovs: This pull request references Bugzilla bug 1890074, which is invalid:
Comment DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: vrutkovs The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
@vrutkovs: This pull request references Bugzilla bug 1890074, which is invalid:
Comment DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
5fe81c7 to
666528d
Compare
When package aliases (or groups) were introduced recently, this list is now being verified twice - during `validateExtensions` on MCC and in `generateExtensionsArgs` on MCD. This breaks OKD installs, as we'd like to avoid verifying a pre-approved list of RPMs on FCOS. However, MCC can't know which systems it would manage, so it applies RHCOS allowlist on all systems unknowingly. This commit refactors extensions verification and application: * available packages are listed in `constants.SupportedPackages` * groups/aliases MCD knows about at listed in `constants.SupportedPackageAliases` * `validateExtensions` ensures that `spec.extensions` items are in either list * `generateExtensionsArgs` expands aliases into a list of RPMs On OKD `validateExtensions` is not called, however `generateExtensionsArgs` would still apply. This might bite us later, but at least it won't block install, so its safe to merge now
666528d to
2c171cd
Compare
|
@vrutkovs: This pull request references Bugzilla bug 1890074, which is invalid:
Comment DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
1 similar comment
|
@vrutkovs: This pull request references Bugzilla bug 1890074, which is invalid:
Comment DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/retest rhel7/gcp-op flakes |
|
/test e2e-gcp-op |
|
@vrutkovs: The following test failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
|
Thank you for creating the PR to fix the OKD issue. |
I don't think we want that. Some packages may be shipped in OS image, but some may be installed from Fedora repos, so we'd prefer to avoid restricting OKD users to a hardcoded list of images |
Hmm, right. Using Fedora repo is another possibility for users to layer packages. #2181 preserves the previous implementation of extension on FCOS, so OKD existing package layering approach should stay as it is. |
It certainly would, that would be user responsibility though. In order to boot its sufficient to avoid removing default list of packages added by installer. #2181 would work, we might want to investigate unrestricted package list later. /hold |
definitely! |
|
Closed in favor of #2181 |
When package aliases (or groups) were introduced recently,
this list is now being verified twice - during
validateExtensionsonMCC and in
generateExtensionsArgson MCD. This breaks OKD installs,as we'd like to avoid verifying a pre-approved list of RPMs on FCOS.
However, MCC can't know which systems it would manage, so it applies
RHCOS allowlist on all systems unknowingly.
This commit refactors extensions verification and application:
constants.SupportedPackagesconstants.SupportedPackageAliasesvalidateExtensionsensures thatspec.extensionsitems are in either listgenerateExtensionsArgsexpands aliases into a list of RPMsOn OKD
validateExtensionsis not called, howevergenerateExtensionsArgswould still apply (so
kernel-develwould automatically bring inkernel-headers).This might bite us in the future, but at least it won't block
installs, so its safe to merge now.
/cc @cgwalters @sinnykumari @kikisdeliveryservice