-
Notifications
You must be signed in to change notification settings - Fork 71
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Integrate Non-Admin Controller (NAC) with OADP #1370
feat: Integrate Non-Admin Controller (NAC) with OADP #1370
Conversation
Skipping CI for Draft Pull Request. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There are still unresolved "resolved" issues, but otherwise this lgtm.
Signed-off-by: Mateus Oliveira <[email protected]>
Signed-off-by: Mateus Oliveira <[email protected]>
Signed-off-by: Mateus Oliveira <[email protected]>
Signed-off-by: Mateus Oliveira <[email protected]>
Signed-off-by: Mateus Oliveira <[email protected]>
Signed-off-by: Mateus Oliveira <[email protected]>
Signed-off-by: Mateus Oliveira <[email protected]>
21d40db
to
9a8749f
Compare
|
||
func (r *DPAReconciler) buildNonAdminDeployment(deploymentObject *appsv1.Deployment, dpa *oadpv1alpha1.DataProtectionApplication) error { | ||
// TODO https://github.com/openshift/oadp-operator/pull/1316 | ||
nonAdminImage := r.getNonAdminImage(dpa) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Lets move this function call to ensureRequiredSpecs
func and modify the ensureRequiredSpecs
function to just accept the deploymentObject
as the only parmeter.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That would need to make ensureRequiredSpecs
a method of DPAReconciler
, because today, get image function needs DPA
I believe is better to be like this
In the end, we only call buildNonAdminDeployment
function, and after Sachin's PR that function will accept the deploymentObject
as the only parmeter
Signed-off-by: Mateus Oliveira <[email protected]>
/lgtm |
Let's get the details on the virt test, doesn't appear like a flake to me. Please rerun ci/prow/4.14-e2e-test-kubevirt-aws Azure tests can be overridden at this time. |
- apiGroups: | ||
- velero.io | ||
resources: | ||
- backups |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Where are the roles for restore?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
restore is not yet in.. just backup
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
waiting this one merge to unblock this work for migtools/oadp-non-admin#42
deployment *appsv1.Deployment | ||
} | ||
|
||
func createTestDeployment(namespace string) *appsv1.Deployment { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would call this createTestDeploymentNeedingUpdate
or something to signify that this deployment is not the final expected result.
/retest see if azure works. |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: kaovilai, mateusoliveira43, mpryc, sseago The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/override ci/prow/4.13-e2e-test-azure |
@sseago: Overrode contexts on behalf of sseago: ci/prow/4.13-e2e-test-azure In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@mateusoliveira43: all tests passed! Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Why the changes were made
Add Non-Admin Controller (NAC) to OADP to start testing it. Fixes migtools/oadp-non-admin#19
How the changes were made
Studied how to "reverse engineered" this PR #1171
Then applied necessary changes to
migtools/oadp-non-admin
repoCreated command to update non admin controller Kubernetes objects
How to test the changes made
Read migtools/oadp-non-admin#16
To test update command, change anything in newly added files in
config/
folder and runChanges should be reverted
Also, check if all necessary files from NAC were included here.
Run
make deploy-olm
and create DPA with new featureYou should be able to:
spec.features.nonAdmin.enable
true)spec.features.nonAdmin.enable
false or unset)To create custom image, run