Skip to content

Conversation

sairameshv
Copy link
Member

DRA has been graduated to GA in upstream 1.34[1] and is required to be enabled for OCP-4.21 rebase to unblock the DRA based e2e test failures[2]

[1] - https://kubernetes.io/blog/2025/09/01/kubernetes-v1-34-dra-updates/
[2] - https://issues.redhat.com/browse/OCPBUGS-61381

@openshift-ci-robot openshift-ci-robot added jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. labels Sep 23, 2025
@openshift-ci-robot
Copy link

@sairameshv: This pull request references Jira Issue OCPBUGS-61381, which is valid. The bug has been moved to the POST state.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.21.0) matches configured target version for branch (4.21.0)
  • bug is in the state ASSIGNED, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @lyman9966

The bug has been updated to refer to the pull request using the external bug tracker.

In response to this:

DRA has been graduated to GA in upstream 1.34[1] and is required to be enabled for OCP-4.21 rebase to unblock the DRA based e2e test failures[2]

[1] - https://kubernetes.io/blog/2025/09/01/kubernetes-v1-34-dra-updates/
[2] - https://issues.redhat.com/browse/OCPBUGS-61381

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci openshift-ci bot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Sep 23, 2025
Copy link
Contributor

openshift-ci bot commented Sep 23, 2025

Skipping CI for Draft Pull Request.
If you want CI signal for your change, please convert it to an actual PR.
You can still manually trigger a test run with /test all

Copy link
Contributor

openshift-ci bot commented Sep 23, 2025

Hello @sairameshv! Some important instructions when contributing to openshift/api:
API design plays an important part in the user experience of OpenShift and as such API PRs are subject to a high level of scrutiny to ensure they follow our best practices. If you haven't already done so, please review the OpenShift API Conventions and ensure that your proposed changes are compliant. Following these conventions will help expedite the api review process for your PR.

@openshift-ci openshift-ci bot requested a review from lyman9966 September 23, 2025 16:37
@openshift-ci openshift-ci bot added the size/XL Denotes a PR that changes 500-999 lines, ignoring generated files. label Sep 23, 2025
Copy link
Contributor

openshift-ci bot commented Sep 23, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign joelspeed for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@sairameshv
Copy link
Member Author

/test

Copy link
Contributor

openshift-ci bot commented Sep 23, 2025

@sairameshv: The /test command needs one or more targets.
The following commands are available to trigger required jobs:

/test build
/test e2e-aws-ovn
/test e2e-aws-ovn-hypershift
/test e2e-aws-ovn-hypershift-conformance
/test e2e-aws-ovn-techpreview
/test e2e-aws-serial-1of2
/test e2e-aws-serial-2of2
/test e2e-aws-serial-techpreview-1of2
/test e2e-aws-serial-techpreview-2of2
/test e2e-azure
/test e2e-gcp
/test e2e-upgrade
/test e2e-upgrade-out-of-change
/test images
/test integration
/test lint
/test minor-e2e-upgrade-minor
/test minor-images
/test okd-scos-images
/test unit
/test verify
/test verify-client-go
/test verify-crd-schema
/test verify-crdify
/test verify-deps
/test verify-feature-promotion

The following commands are available to trigger optional jobs:

/test okd-scos-e2e-aws-ovn

Use /test all to run the following jobs that were automatically triggered:

pull-ci-openshift-api-master-build
pull-ci-openshift-api-master-images
pull-ci-openshift-api-master-integration
pull-ci-openshift-api-master-lint
pull-ci-openshift-api-master-minor-e2e-upgrade-minor
pull-ci-openshift-api-master-minor-images
pull-ci-openshift-api-master-okd-scos-e2e-aws-ovn
pull-ci-openshift-api-master-okd-scos-images
pull-ci-openshift-api-master-unit
pull-ci-openshift-api-master-verify
pull-ci-openshift-api-master-verify-client-go
pull-ci-openshift-api-master-verify-crd-schema
pull-ci-openshift-api-master-verify-crdify
pull-ci-openshift-api-master-verify-deps
pull-ci-openshift-api-master-verify-feature-promotion

In response to this:

/test

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

productScope(kubernetes).
enhancementPR("https://github.com/kubernetes/enhancements/issues/4381").
enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade).
enableIn(configv1.Default, configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade).
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm kinda leaning on just dropping this and inheriting the built-in kube features, similar to my leanings here

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

like the only reason I can think to keep it is if we ever want to disable it, which I don't think we even can because it's GA now...

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

the other reason being we're nesting other beta features under this overarching feature, which could be reason to keep it cc @tkashem

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ack

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I am in favor of removing the feature gate so the default promotion/mechanism can kick in, this seems easier to maintain and debug imo

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Addressed, Could you PTAL again?

@sairameshv
Copy link
Member Author

/test e2e-gcp

@openshift-ci openshift-ci bot added size/L Denotes a PR that changes 100-499 lines, ignoring generated files. and removed size/XL Denotes a PR that changes 500-999 lines, ignoring generated files. labels Sep 24, 2025
@sairameshv sairameshv marked this pull request as ready for review September 24, 2025 11:13
@sairameshv sairameshv changed the title WIP: OCPBUGS-61381: Enable DRA(DynamicResourceAllocation) featuregate by default OCPBUGS-61381: Enable DRA(DynamicResourceAllocation) featuregate by default Sep 24, 2025
@openshift-ci openshift-ci bot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Sep 24, 2025
Comment on lines 105 to 111
FeatureGateDynamicResourceAllocation = newFeatureGate("DynamicResourceAllocation").
reportProblemsToJiraComponent("scheduling").
contactPerson("jchaloup").
productScope(kubernetes).
enhancementPR("https://github.com/kubernetes/enhancements/issues/4381").
enableIn(configv1.DevPreviewNoUpgrade, configv1.TechPreviewNoUpgrade).
mustRegister()
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We have downstream fields depending on this gate, can you try instead the promotion process instead of removal?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sure, makes sense
Is there a way to deprecate the featuregate and finally remove it going forward?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

is the typical promotion process is to add it in the Default set and remove from tech and dev preview?
I believe, it would be cleaner and easier to maintain for us if we can remove the o/api gate. (In 1.34 the feature is GA and enabled by default)

I did a quick scan of the openshift org with "DynamicResourceAllocation", and found the following references:

b) https://github.com/openshift/cluster-kube-scheduler-operator/blob/2345371abed5896006ac4a60c7d555fc25502c0a/pkg/operator/targetconfigcontroller/targetconfigcontroller.go#L213

c) https://github.com/openshift/multus-cni/blob/cf0f68ec2b5fe9bc72d0da325e02cf63968747fe/e2e/setup_cluster.sh#L37
(this is an argument to kubelet, so no need to remove, we only remove it when the featuregate is removed from upstream)

d) hypershift:
https://github.com/openshift/hypershift/blob/6e412e3e6bc73b7a021edeb48cc8749716d8be4c/api/hypershift/v1beta1/featuregates/featureGate-Hypershift-Default.yaml#L44
https://github.com/openshift/hypershift/blob/6e412e3e6bc73b7a021edeb48cc8749716d8be4c/api/hypershift/v1beta1/zz_generated.featuregated-crd-manifests.yaml#L98

e) https://github.com/openshift/kubernetes-autoscaler/blob/d883d0e6dbb74f0839631ebc7a584669f0e955a3/cluster-autoscaler/config/autoscaling_options.go#L309
(I don't think it's relevant to the feature gate in o/api)

we can run payload/aggregation job with this pr and other PRs that remove the references to get signal, does that sound reasonable?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think at some point(may be in future as well), we should be removing the featuregate references from the downstream. I'm fine with raising PRs to other repos now. I'm just looking for any way defined/followed for any featuregate that's deprecated/removed.
cc: @JoelSpeed

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

is the typical promotion process is to add it in the Default set and remove from tech and dev preview?

Normally, for a downstream only feature we would promote it to default (as well as TP and DP). Once that promotion has shipped, we can then remove the gate completely from the product.

For this, you have created a downstream API, so I'd expect you to follow the same process as if this were a downstream gate.

Is there any DRA testing that shows in sippy that the feature is working?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Joel is out through next Friday I believe.

This sounds like a predicament we put ourselves in by defining a feature gate for an upstream feature so we can control the conditions in which it is enabled in OpenShift and then relying on that feature gate in a downstream-only API (the reference I found:

// profileCustomizations contains configuration for modifying the default behavior of existing scheduler profiles.
// +openshift:enable:FeatureGate=DynamicResourceAllocation
// +optional
ProfileCustomizations ProfileCustomizations `json:"profileCustomizations"`
).

I agree with Joel here that because we clearly have downstream functionality depending on this feature gate, the appropriate approach to promote this would be to have the appropriate automated regression testing to cover the downstream-specific behaviors before promoting this. That would entail putting the appropriate CI tests in openshift/origin and meeting the same promotion criteria that every other feature on OpenShift has to meet.

Regarding the blocking of the 1.34 rebase - is it possible to configure the DRA tests to only be run when we detect the feature gate is enabled? We would essentially skip DRA testing in the default jobs and only run them in TPNU jobs?

If not, an alternative that we might want to discuss is adding a new TPNU gate to keep the downstream-only changes gated so there is a gap where the upstream feature may be enabled on the cluster but nothing downstream will be utilizing that functionality unless $newGate is enabled. That being said, I'm newer to the feature-gate promotion realm and I have no idea what the nuances here may be. I'd probably recommend getting some thoughts from the openshift architects on this approach if we decide we need to consider going this direction.

Regarding https://github.com/openshift/cluster-kube-apiserver-operator/blob/6333489fd7d8d3494372cb830efba40eb28e45c1/pkg/operator/configobservation/apienablement/observe_runtime_config.go#L23-L27 - is there anything special we need to do here when promoting to ensure that we are properly serving the stable API as opposed to the alpha/beta APIs?

I seem to recall we had an issue related to accidentally serving the beta API still when we promoted the ValidatingAdmissionPolicy gate that led to us needing to do some heavier lifting to remove it (see #2306)

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Also I'm not sure if this is how it has historically been done, but it certainly seems like we should try to avoid cases where we have an upstream specific feature gate explicitly tied to downstream-specific functionality. Instead, it seems we should be using separate gates from the start.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree with Joel here that because we clearly have downstream functionality depending on this feature gate, the appropriate approach to promote this would be to have the appropriate automated regression testing to cover the downstream-specific behaviors before promoting this. That would entail putting the appropriate CI tests in openshift/origin and meeting the same promotion criteria that every other feature on OpenShift has to meet.

Okay

Regarding the blocking of the 1.34 rebase - is it possible to configure the DRA tests to only be run when we detect the feature gate is enabled? We would essentially skip DRA testing in the default jobs and only run them in TPNU jobs?

Sure, as of now the tests can be skipped in the default jobs and can be enabled for TPNU jobs to unblock the rebase. Once we get some sign from the job runs, we can plan to get this PR in. I would work on that

Also I'm not sure if this is how it has historically been done, but it certainly seems like we should try to avoid cases where we have an upstream specific feature gate explicitly tied to downstream-specific functionality. Instead, it seems we should be using separate gates from the start.

Yes, I agree with using atleast a different name from that of the upstream featuregate to avoid such situations. I don't know if it is makes sense and possible, but it would be great to have a way to fetch the upstream featuregates up-front and validate the new featuregate names.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we should try to avoid cases where we have an upstream specific feature gate explicitly tied to downstream-specific functionality

Our operators that deploy the components that use upstream feature gates need to consume the same gates when operational decisions depend on them. For example, the MutatingAdmissionPolicy feature is consumed by API servers and requires that kube-apiserver serves non-default API group versions to function (https://kubernetes.io/docs/reference/access-authn-authz/mutating-admission-policy/):

To use the feature, enable the MutatingAdmissionPolicy feature gate (which is off by default) and set --runtime-config=admissionregistration.k8s.io/v1beta1=true on the kube-apiserver.

The MutatingAdmissionPolicy feature gate is 1:1 with the operator behavior, and introducing a second feature gate for the operator to consume only introduces the possibility of skew between the operator and operand.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the additional context on why we need to use a shared gate - TIL.

Outside of that semantic, the rest of the requirement still holds for promotion.

- DRA has been graduated to GA in upstream 1.34 downstream
- This is also required to unblok the e2e test failures encountered during the
OCP-4.21 rebase
Reference for the failure: https://issues.redhat.com/browse/OCPBUGS-61381

Signed-off-by: Sai Ramesh Vanka <[email protected]>
@openshift-ci openshift-ci bot added size/XL Denotes a PR that changes 500-999 lines, ignoring generated files. and removed size/L Denotes a PR that changes 100-499 lines, ignoring generated files. labels Sep 24, 2025
Copy link
Contributor

openshift-ci bot commented Sep 24, 2025

@sairameshv: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/okd-scos-e2e-aws-ovn 6650897 link false /test okd-scos-e2e-aws-ovn
ci/prow/verify-feature-promotion 6650897 link true /test verify-feature-promotion
ci/prow/minor-e2e-upgrade-minor 6650897 link true /test minor-e2e-upgrade-minor

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@sairameshv
Copy link
Member Author

Just FYI,
I see the e2e tests related to DRA are present with two different tags:

  1. DynamicResourceAllocation : These tests are by default disabled in our o/k repository. These are not even running on the TPNU clusters. Raised a PR to enable these jobs to get signal
  2. DRA : These are the new set of tests that are failing on non TPNU/default cluster type jobs but passing on the TPNU jobs(ref) as the upstream DRA is graduated to GA and the downstream "DynamicResourceAllocation" feature gate is enabled only for TPNU and not the default cluster types

Following is the output of DRA jobs passing for reference from the output log of the techpreview job

started: 0/33/652 "[sig-node] [DRA] control plane [ConformanceCandidate] supports init containers [Suite:openshift/conformance/parallel] [Suite:k8s]"
passed: (15.2s) 2025-09-30T07:15:24 "[sig-node] [DRA] control plane [ConformanceCandidate] supports init containers [Suite:openshift/conformance/parallel] [Suite:k8s]"
started: 0/156/652 "[sig-node] [DRA] control plane [ConformanceCandidate] supports simple pod referencing external resource claim [Suite:openshift/conformance/parallel] [Suite:k8s]"
started: 0/177/652 "[sig-node] [DRA] control plane supports count/resourceclaims.resource.k8s.io ResourceQuota [ConformanceCandidate] [Suite:openshift/conformance/parallel] [Suite:k8s]"
passed: (12.9s) 2025-09-30T07:16:28 "[sig-node] [DRA] control plane [ConformanceCandidate] supports simple pod referencing external resource claim [Suite:openshift/conformance/parallel] [Suite:k8s]"
passed: (10.1s) 2025-09-30T07:16:36 "[sig-node] [DRA] control plane supports count/resourceclaims.resource.k8s.io ResourceQuota [ConformanceCandidate] [Suite:openshift/conformance/parallel] [Suite:k8s]"
started: 0/235/652 "[sig-node] [DRA] ResourceSlice Controller creates slices [ConformanceCandidate] [Suite:openshift/conformance/parallel] [Suite:k8s]"
started: 0/236/652 "[sig-node] [DRA] control plane [ConformanceCandidate] supports claim and class parameters [Suite:openshift/conformance/parallel] [Suite:k8s]"
passed: (14s) 2025-09-30T07:17:16 "[sig-node] [DRA] control plane [ConformanceCandidate] supports claim and class parameters [Suite:openshift/conformance/parallel] [Suite:k8s]"
started: 0/294/652 "[sig-node] [DRA] control plane [ConformanceCandidate] supports inline claim referenced by multiple containers [Suite:openshift/conformance/parallel] [Suite:k8s]"
passed: (15.7s) 2025-09-30T07:18:03 "[sig-node] [DRA] control plane [ConformanceCandidate] supports inline claim referenced by multiple containers [Suite:openshift/conformance/parallel] [Suite:k8s]"
passed: (1m14s) 2025-09-30T07:18:16 "[sig-node] [DRA] ResourceSlice Controller creates slices [ConformanceCandidate] [Suite:openshift/conformance/parallel] [Suite:k8s]"
started: 0/388/652 "[sig-node] [DRA] control plane [ConformanceCandidate] supports sharing a claim concurrently [Suite:openshift/conformance/parallel] [Suite:k8s]"
started: 0/394/652 "[sig-node] [DRA] control plane [ConformanceCandidate] supports external claim referenced by multiple containers of multiple pods [Suite:openshift/conformance/parallel] [Suite:k8s]"
passed: (13.9s) 2025-09-30T07:18:55 "[sig-node] [DRA] control plane [ConformanceCandidate] supports sharing a claim concurrently [Suite:openshift/conformance/parallel] [Suite:k8s]"
passed: (12.6s) 2025-09-30T07:18:58 "[sig-node] [DRA] control plane [ConformanceCandidate] supports external claim referenced by multiple containers of multiple pods [Suite:openshift/conformance/parallel] [Suite:k8s]"
started: 0/420/652 "[sig-node] [DRA] control plane [ConformanceCandidate] supports simple pod referencing inline resource claim [Suite:openshift/conformance/parallel] [Suite:k8s]"
started: 0/435/652 "[sig-node] [DRA] control plane [ConformanceCandidate] supports reusing resources [Suite:openshift/conformance/parallel] [Suite:k8s]"
passed: (13s) 2025-09-30T07:19:14 "[sig-node] [DRA] control plane [ConformanceCandidate] supports simple pod referencing inline resource claim [Suite:openshift/conformance/parallel] [Suite:k8s]"
started: 0/470/652 "[sig-node] [DRA] control plane validate ResourceClaimTemplate and ResourceClaim for admin access [FeatureGate:DRAAdminAccess] [Beta] [Suite:openshift/conformance/parallel] [Suite:k8s]"
passed: (18.2s) 2025-09-30T07:19:26 "[sig-node] [DRA] control plane [ConformanceCandidate] supports reusing resources [Suite:openshift/conformance/parallel] [Suite:k8s]"
passed: (6.4s) 2025-09-30T07:19:32 "[sig-node] [DRA] control plane validate ResourceClaimTemplate and ResourceClaim for admin access [FeatureGate:DRAAdminAccess] [Beta] [Suite:openshift/conformance/parallel] [Suite:k8s]"
started: 0/498/652 "[sig-node] [DRA] control plane truncates the name of a generated resource claim [ConformanceCandidate] [Suite:openshift/conformance/parallel] [Suite:k8s]"
passed: (11.1s) 2025-09-30T07:19:49 "[sig-node] [DRA] control plane truncates the name of a generated resource claim [ConformanceCandidate] [Suite:openshift/conformance/parallel] [Suite:k8s]"
started: 0/525/652 "[sig-node] [DRA] control plane [ConformanceCandidate] supports external claim referenced by multiple pods [Suite:openshift/conformance/parallel] [Suite:k8s]"
passed: (13.6s) 2025-09-30T07:20:15 "[sig-node] [DRA] control plane [ConformanceCandidate] supports external claim referenced by multiple pods [Suite:openshift/conformance/parallel] [Suite:k8s]"
started: 0/639/652 "[sig-node] [DRA] control plane must apply per-node permission checks [ConformanceCandidate] [Suite:openshift/conformance/parallel] [Suite:k8s]"
passed: (9.4s) 2025-09-30T07:21:46 "[sig-node] [DRA] control plane must apply per-node permission checks [ConformanceCandidate] [Suite:openshift/conformance/parallel] [Suite:k8s]"

I'm also monitoring the o/k PR's techpreview jobs to get the results of the DynamicResourceAllocation tagged e2e tests here

cc: @JoelSpeed @everettraven @tkashem

@everettraven
Copy link
Contributor

everettraven commented Oct 1, 2025

Regarding the multiple different naming conventions, can we use anything similar to the logic outlined in https://github.com/openshift-eng/openshift-tests-extension/blob/d81c090588352f8cd80934dc61e10b443feca7d7/cmd/example-tests/main.go#L89-L120 to do some labelling/renaming so that all the tests follow enablement/disablement based on the state of the feature gate? Our test tooling should already know how to filter tests based on enabled/disabled feature gates as long as the test spec names are correctly annotated with the feature gate.

Having the correct annotations injected would also make it so that the tests report into Sippy in a way that verify-feature-promotion can detect

- ""
- LowNodeUtilization
- HighNodeUtilization
- NoScoring
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

they don't seem to be related to DynamicResourceAllocation, is it safe for these to be deleted? does it have any impact on the upgrade? cc @ingvagabund

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@benluddy
Copy link
Contributor

benluddy commented Oct 1, 2025

/hold

Please don't merge this until we merge @tkashem's cluster-kube-apiserver-operator PRs. We could end up in another situation where OpenShift serves default-disabled APIs in a GA build.

@openshift-merge-robot openshift-merge-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Oct 1, 2025
@openshift-merge-robot
Copy link
Contributor

PR needs rebase.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@openshift-ci openshift-ci bot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Oct 1, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. size/XL Denotes a PR that changes 500-999 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

9 participants