-
Notifications
You must be signed in to change notification settings - Fork 159
OCPBUGS-29900:fix the Metric cco_credentials_mode issue #901
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
|
Skipping CI for Draft Pull Request. |
|
@jianping-shu: This pull request references Jira Issue OCPBUGS-29900, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: jianping-shu The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
ab2133a to
1206dd1
Compare
|
To use utils.IsTimedTokenCluster is a better and more efficient solution than func credRequestIsPodIdentity which is called for every CR in func processCR. And it did fix the issue. |
048c8ad to
067cc61
Compare
067cc61 to
5f9e984
Compare
Codecov Report❌ Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## master #901 +/- ##
==========================================
- Coverage 46.93% 46.81% -0.12%
==========================================
Files 97 97
Lines 11943 11931 -12
==========================================
- Hits 5605 5586 -19
- Misses 5720 5730 +10
+ Partials 618 615 -3
🚀 New features to boost your workflow:
|
|
@jianping-shu: The following tests failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
|
/cc |
jstuever
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
My apologies for taking so long to review this PR. I wanted to make sure I fully understood the manualpodidentity use case. I don't think AI provided the right solution here. It is clear that manualpodidentity is intended to show that at least one secret is actually using short term tokens. However, this solution instead shows that the cluster is configured to use short term tokens without verifying that any of the secrets are actually configured to do so.
Instead, this PR needs to figure out if credRequestIsPodIdenty() is returning false when there are short term tokens being used, and if so, resolve why that is happening. As it is currently written, there is no logic for the GCP platform.
See OCPBUGS-29900 for the details.
Try to use AI tools to facilitate the bug fix.
(1) Tried deepwiki, its answers were positioning related code functions and providing the fix suggestions
https://deepwiki.com/search/for-aws-sts-cluster-metric-cco_6fe2f619-3e29-4d31-8aeb-5c85a8f589db