Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug 2059669: Delete manifestwork for application namespace #348

Merged
merged 6 commits into from
Sep 7, 2024

Conversation

abhijeet219
Copy link

Changes:

  • Update open-cluster-management to version v0.13.0
  • Delete namespace manifestwork for applications
  • Unit test changes to verify deletion of namespace manifestwork

The changeset includes a new DeleteNamespaceManifestWork() func to delete the manifestwork for namespace. It first checks if the mw.Spec has delete option or if it already has a DeletionTimestamp. Accordingly, it proceeds to delete the
namespace manifestwork.
Also introduces updating of the namespace manifestwork with the deleteOption and propogationPolicy of type orphan, whenever the createOrUpdateNamespaceManifest() func is called.

Fixes: Bug 2059669

ELENAGER and others added 6 commits September 6, 2024 19:44
Signed-off-by: Elena Gershkovich <[email protected]>
(cherry picked from commit b870966)
Signed-off-by: Elena Gershkovich <[email protected]>
(cherry picked from commit f24f0a8)
Updating kubernetes-csi-addon version demands also update in rook, because csi 0.9.0 requires sidecar 0.9.0 and cephcsi 3.12.0, that is rook 1.15 is bringing.

Signed-off-by: Elena Gershkovich <[email protected]>
(cherry picked from commit 0223e05)
Signed-off-by: Abhijeet Shakya <[email protected]>
(cherry picked from commit 223d74a)
The changeset includes a new DeleteNamespaceManifestWork() func,
which first checks if the mw.Spec has delete option or if it already
has a DeletionTimestamp. Accordingly, it proceeds to delete the
namespace manifestwork.
It also updates the namespace manifestwork with the deleteOption and
propogationPolicy of type orphan, whenever the createOrUpdateNamespaceManifest()
func is called.

Fixes: [Bug 2059669](https://bugzilla.redhat.com/show_bug.cgi?id=2059669)
Signed-off-by: Abhijeet Shakya <[email protected]>
(cherry picked from commit 9ffef9c)
Signed-off-by: Abhijeet Shakya <[email protected]>
(cherry picked from commit 91ebfba)
Copy link

openshift-ci bot commented Sep 6, 2024

@abhijeet219: This pull request references Bugzilla bug 2059669, which is invalid:

  • expected the bug to target the "ODF 4.17.0" release, but it targets "---" instead

Comment /bugzilla refresh to re-evaluate validity if changes to the Bugzilla bug are made, or edit the title of this pull request to link to a different bug.

In response to this:

Bug 2059669: Delete manifestwork for application namespace

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Copy link

openshift-ci bot commented Sep 6, 2024

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: abhijeet219

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@abhijeet219 abhijeet219 marked this pull request as ready for review September 6, 2024 14:25
@ShyamsundarR
Copy link

/bugzilla refresh

Copy link

openshift-ci bot commented Sep 7, 2024

@ShyamsundarR: This pull request references Bugzilla bug 2059669, which is valid. The bug has been moved to the POST state. The bug has been updated to refer to the pull request using the external bug tracker.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target release (ODF 4.17.0) matches configured target release for branch (ODF 4.17.0)
  • bug is in the state ASSIGNED, which is one of the valid states (NEW, ASSIGNED, ON_DEV, POST, POST)

Requesting review from QA contact:
/cc @keemano

In response to this:

/bugzilla refresh

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Copy link

openshift-ci bot commented Sep 7, 2024

@openshift-ci[bot]: GitHub didn't allow me to request PR reviews from the following users: keemano.

Note that only red-hat-storage members and repo collaborators can review this PR, and authors cannot review their own PRs.

In response to this:

@ShyamsundarR: This pull request references Bugzilla bug 2059669, which is valid. The bug has been moved to the POST state. The bug has been updated to refer to the pull request using the external bug tracker.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target release (ODF 4.17.0) matches configured target release for branch (ODF 4.17.0)
  • bug is in the state ASSIGNED, which is one of the valid states (NEW, ASSIGNED, ON_DEV, POST, POST)

Requesting review from QA contact:
/cc @keemano

In response to this:

/bugzilla refresh

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@ShyamsundarR ShyamsundarR merged commit 3ca5e4f into red-hat-storage:release-4.17 Sep 7, 2024
15 of 16 checks passed
Copy link

openshift-ci bot commented Sep 7, 2024

@abhijeet219: All pull requests linked via external trackers have merged:

Bugzilla bug 2059669 has been moved to the MODIFIED state.

In response to this:

Bug 2059669: Delete manifestwork for application namespace

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants