-
Notifications
You must be signed in to change notification settings - Fork 65
✨ (deps): import kubernetes-sigs/crdify for performing CRD upgrade safety checks #2054
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
✨ (deps): import kubernetes-sigs/crdify for performing CRD upgrade safety checks #2054
Conversation
✅ Deploy Preview for olmv1 ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #2054 +/- ##
==========================================
- Coverage 73.82% 72.47% -1.35%
==========================================
Files 81 77 -4
Lines 7365 7056 -309
==========================================
- Hits 5437 5114 -323
- Misses 1588 1600 +12
- Partials 340 342 +2
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
390e72a
to
d486316
Compare
…ty checks Signed-off-by: Bryce Palmer <bpalmer@redhat.com>
d486316
to
fe34799
Compare
/approve The primary purpose seems to replace github.com/openshift/crd-schema-checker with k8s-sigs/crdify? |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: tmshort The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Hi @everettraven ! |
Deny. #2010 is for the check in CI that runs against the OLMv1 APIs. This PR imports it for use within OLMv1 for OLMv1's CRD upgrade safety check validations |
@tmshort The removal of The primary purpose is to have OLM stop using its own checks and instead use this centralized place where there is active development and discussion with sig-api-machinery folks on what rules should be codified when evaluating CRD schema changes for compatibility. |
Description
Removes all custom CRD upgrade pre-flight check validations in favor of importing validation logic from kubernetes-sigs/crdify.
This allows OLM to stay consistent with what is deemed "safe" by an more formal library that performs validation checks. As was the previous behavior, OLM configures the validation to be as strict as reasonably possible and to continue failing closed on unhandled changes.
While it is still possible to implement custom validations with this approach (by adding them to the registry), it would be awesome to see OLM maintainers get involved in discussions with the maintainers of kubernetes-sigs/crdify and contribute new validations there first and pull them in through dependency updates.
Reviewer Checklist