Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

🤖 Sync from open-cluster-management-io/config-policy-controller: #235, #238 #845

Merged
merged 8 commits into from
May 2, 2024

Conversation

JustinKuli and others added 8 commits May 2, 2024 13:54
The framework-addon now handles emitting compliance events for those
errors for all template policy types.

Refs:
 - https://issues.redhat.com/browse/ACM-10858

Signed-off-by: Justin Kulikauskas <jkulikau@redhat.com>
(cherry picked from commit 01437a4)
The Subscription and OperatorGroup fields can now utilize templates. The
resolver uses the DynamicWatcher already used by the controller, so no
additional plumbing was needed for new watches or in order to share a
cache.

Refs:
 - https://issues.redhat.com/browse/ACM-10858

Signed-off-by: Justin Kulikauskas <jkulikau@redhat.com>
(cherry picked from commit 1ecc347)
The library now does the DeepCopy for us, to prevent accidental
mutations to objects in the cache.

Signed-off-by: Justin Kulikauskas <jkulikau@redhat.com>
(cherry picked from commit b080562)
From some test runs, it seems like some of the 3.8.x releases do not
always have the quayecosystems CRD, which makes the tests inconsistent.
From what I can tell, *none* of the 3.10.x releases will have that CRD,
so it should be consistent.

Signed-off-by: Justin Kulikauskas <jkulikau@redhat.com>
(cherry picked from commit cf5224b)
This test started failing relatively often. Debugging revealed that the
Subscription was getting into a ResolutionFailed=True condition, but
that it did not have the expected ConstraintsNotSatisfiable reason; it
looked like it was failing to resolve because the connection was refused
to the catalog.

Refs:
 - https://issues.redhat.com/browse/ACM-11414

Signed-off-by: Justin Kulikauskas <jkulikau@redhat.com>
(cherry picked from commit d02b4b9)
The full policy status is often helpful when understanding what might be
unexpectedly happening in some of the operatorpolicy tests.

Signed-off-by: Justin Kulikauskas <jkulikau@redhat.com>
(cherry picked from commit edc02a5)
This should help with some consistency.

Signed-off-by: Justin Kulikauskas <jkulikau@redhat.com>
(cherry picked from commit 188daa6)
This creates a separate slice rather than potentially mutating the
underlying array of the policy.Spec.Versions slice.

Signed-off-by: mprahl <mprahl@users.noreply.github.com>
(cherry picked from commit 2aa720c)
Copy link

openshift-ci bot commented May 2, 2024

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: magic-mirror-bot[bot]
Once this PR has been reviewed and has the lgtm label, please assign justinkuli for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link

sonarcloud bot commented May 2, 2024

@magic-mirror-bot magic-mirror-bot bot merged commit 6aab4d8 into main May 2, 2024
13 of 14 checks passed
@magic-mirror-bot magic-mirror-bot bot deleted the magic-mirror-main-1714658079967 branch May 2, 2024 14:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants