Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

🐛 Add missing update permissions for HostUpdatePolicy CR to BMH controller #2099

Merged
merged 2 commits into from
Dec 9, 2024

Conversation

pszczerbik
Copy link
Contributor

This PR fixes node servicing by adding a missing update permission for HostUpdatePolicy CR to BMH controller.

Fixes #2097

…conciler

BareMetalHostReconciler requires update permissions for HostUpdatePolicy
CR in order to set owner reference on it.

Signed-off-by: Przemyslaw Szczerbik <[email protected]>
Signed-off-by: Przemyslaw Szczerbik <[email protected]>
@metal3-io-bot metal3-io-bot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Dec 4, 2024
@metal3-io-bot
Copy link
Contributor

Hi @pszczerbik. Thanks for your PR.

I'm waiting for a metal3-io member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@metal3-io-bot metal3-io-bot added the size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. label Dec 4, 2024
@pszczerbik
Copy link
Contributor Author

Hi @rhjanders @iurygregory @dtantsur. Based on git log you have been recently working on node servicing support. Could you take a look at this PR?

Thanks,
Przemek

@dtantsur
Copy link
Member

dtantsur commented Dec 4, 2024

/ok-to-test

@metal3-io-bot metal3-io-bot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Dec 4, 2024
@dtantsur
Copy link
Member

dtantsur commented Dec 4, 2024

/approve

@metal3-io-bot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: dtantsur

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@metal3-io-bot metal3-io-bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Dec 4, 2024
@iurygregory
Copy link
Member

/lgtm

@metal3-io-bot metal3-io-bot added the lgtm Indicates that a PR is ready to be merged. label Dec 4, 2024
@pszczerbik
Copy link
Contributor Author

/retest

@pszczerbik
Copy link
Contributor Author

@dtantsur it seems that Live ISO test is timing-out:

[FAILED] Timed out after 600.001s. The function passed to Eventually failed at /home/runner/work/baremetal-operator/baremetal-operator/test/e2e/common.go:83 with: Expected <v1alpha1.ProvisioningState>: provisioning to equal <v1alpha1.ProvisioningState>: provisioned

I don't think this failure is related to my change. Perhaps wait-provisioned time out value needs to be increased.
How do you want to proceed? Should I just keep re-testing until it passes?

@tuminoid
Copy link
Member

tuminoid commented Dec 5, 2024

@dtantsur it seems that Live ISO test is timing-out:

[FAILED] Timed out after 600.001s. The function passed to Eventually failed at /home/runner/work/baremetal-operator/baremetal-operator/test/e2e/common.go:83 with: Expected <v1alpha1.ProvisioningState>: provisioning to equal <v1alpha1.ProvisioningState>: provisioned

I don't think this failure is related to my change. Perhaps wait-provisioned time out value needs to be increased. How do you want to proceed? Should I just keep re-testing until it passes?

We're debugging the live-iso test. E2E reports:

[Updated Event] live-iso-ops-0y2mh3/ProvisioningError-rb67j
	resource: metal3.io/v1alpha1/BareMetalHost/live-iso-ops
	reason: ProvisioningError
	message: Image provisioning failed: Deploy step deploy.deploy failed: The requested image is not valid for use..

since 2 days ago.

So hang on a while, and we'll get it sorted out.

@tuminoid
Copy link
Member

tuminoid commented Dec 5, 2024

So hang on a while, and we'll get it sorted out.

It should be fixed when #2103 merges and you rebase.

@tuminoid
Copy link
Member

tuminoid commented Dec 9, 2024

So hang on a while, and we'll get it sorted out.

It should be fixed when #2103 merges and you rebase.

Fix is actually done upstream Ironic side, but workaround #2112 has been merged. Please rebase.

@metal3-io-bot metal3-io-bot merged commit ca8e696 into metal3-io:main Dec 9, 2024
15 checks passed
@metal3-io-bot metal3-io-bot added this to the BMO - v0.9 milestone Dec 9, 2024
@tuminoid
Copy link
Member

tuminoid commented Dec 9, 2024

So hang on a while, and we'll get it sorted out.

It should be fixed when #2103 merges and you rebase.

Fix is actually done upstream Ironic side, but workaround #2112 has been merged. Please rebase.

OK, workflow pulled the latest definitions from head, no rebase needed. Cheers!

@pszczerbik
Copy link
Contributor Author

So hang on a while, and we'll get it sorted out.

It should be fixed when #2103 merges and you rebase.

Fix is actually done upstream Ironic side, but workaround #2112 has been merged. Please rebase.

OK, workflow pulled the latest definitions from head, no rebase needed. Cheers!

I was in a process of doing rebase, but Metal3 bot was faster than me. Cheers!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Node servicing fails due to missing update permissions for HostUpdatePolicy CR
6 participants