-
Notifications
You must be signed in to change notification settings - Fork 4.7k
[Feature:Builds] forcePull should affect pulling builder images ForcePull test case execution docker #17596
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@jim-minter this seems likely to be a race condition since we're modifying the system wide cluster role to perform this test. We need to find a different way to do it. |
actually I guess we're just modifying the user. A simple retry might be sufficient here, though I also kinda wonder if we should even be exposed to this or if RBAC should be handling it for us. @enj ? we're running
and getting
|
(Is the race here that our call has to update the system:build-strategy-custom object to add our user? If so, should oc adm policy be handling that via an apply instead?) |
@deads2k ^^ |
@adelton @mrogers950 @simo5 any thoughts on adding some generic conflict handling to the policy commands? They already handle races with regards to creation of objects. |
@enj I have no objection if this is not going to cause unexpected (fail open) results |
I think we should try writing a patch first. If a patch won't work (I suspect compound merge keys don't work), then I'm ok retrying on a remove, but not on an add. For adds, we should start using the |
Oh, this is in a test? Don't change the command then. Go and update the test to create its own clusterrolebinding and delete its own clusterrolebinding. That's more in keeping with upstream and where we're going. |
@deads2k it's in a test, but this behavior hurts everyone, why wouldn't we improve the behavior?
The test is running this command:
Switching the test to not use the commands we expect administrators to use, instead of fixing those commands so they can work in a parallel environment, seems user hostile to me. |
why does it matter? it's all race conditions. Whether you retry, or the admin happened to run the add slightly after someone else did the remove, either way the result is the same. If you want guarantees about who has what access in a policy, you need to either have only a single person making changes, or the changes need to be coordinated/ordered. As soon as you have 2 different people running policy update commands independently(which is how you get the conflict in the first place), you've got no guarantee of the outcome whether or not the command retries conflicts itself or not. Expecting a conflict error to catch the mistake you were about to make is a hail mary. |
Automatic merge from submit-queue. avoid conflict updating custom build role fixes #17596 (I don't really consider this a proper fix, but apparently oc adm isn't going to get the proper fix so this is as close as we're getting).
https://openshift-gce-devel.appspot.com/build/origin-ci-test/pr-logs/pull/17534/test_pull_request_origin_extended_conformance_gce/12371/
/sig developer-experience
/kind test-flake
/assign bparees
The text was updated successfully, but these errors were encountered: