Skip to content

OCPBUGS-79358: pkg/cvo/egress: Disable Proxy respect on HyperShift#1357

Open
wking wants to merge 1 commit intoopenshift:mainfrom
wking:ignore-proxy-on-hypershift
Open

OCPBUGS-79358: pkg/cvo/egress: Disable Proxy respect on HyperShift#1357
wking wants to merge 1 commit intoopenshift:mainfrom
wking:ignore-proxy-on-hypershift

Conversation

@wking
Copy link
Member

@wking wking commented Mar 23, 2026

Since 4.14, HostedCluster has had spec.configuration.proxy to configure the data-plane egress 1. In 4.18, the HyperShift API began documenting that setting as specific to data-plane egress 2. However, the cluster-version operator running on the management-cluster control plane has assumed that hosted-cluster Proxy resource should configure its own egress as well. I’m not sure how folks expect management-cluster-side control-plane egress to be configured, but we don’t want it to respect spec.configuration.proxy, because management-cluster networking and data-plane-compute networking are very different environments. For now, just ignore the knob on HyperShift, to avoid data-plane-specific-network-config breaking Update Service access, with ClusterVersionRetrievedUpdates messages like:

Unable to retrieve available updates: Get "https://api.openshift.com/api/upgrades_info/v1/graph?...": proxyconnect tcp: dial tcp: lookup ... on ...:53: no such host

Since 4.14, HostedCluster has had spec.configuration.proxy to
configure the data-plane egress [1].  In 4.18, the HyperShift API
began documenting that setting as specific to data-plane egress [2].
However, the cluster-version operator running on the
management-cluster control plane has assumed that hosted-cluster Proxy
resource should configure its own egress as well.  I’m not sure how
folks expect management-cluster-side control-plane egress to be
configured, but we don’t want it to respect spec.configuration.proxy,
because management-cluster networking and data-plane-compute
networking are very different environments.  For now, just ignore the
knob on HyperShift, to avoid data-plane-specific-network-config
breaking Update Service access, with ClusterVersionRetrievedUpdates
messages like:

  Unable to retrieve available updates: Get "https://api.openshift.com/api/upgrades_info/v1/graph?...": proxyconnect tcp: dial tcp: lookup ... on ...:53: no such host

[1]: https://github.com/openshift/hypershift/blame/b11c804b44516f34e50344eeb94901936018d9d1/api/v1beta1/hostedcluster_types.go#L2165-L2167
[2]: https://github.com/openshift/hypershift/blame/0d2075c649ed99657f6c5f90a0d273b8f99e9bc2/api/hypershift/v1beta1/hostedcluster_types.go#L1719-L1727
@openshift-ci-robot openshift-ci-robot added jira/severity-moderate Referenced Jira bug's severity is moderate for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. labels Mar 23, 2026
@openshift-ci-robot
Copy link
Contributor

@wking: This pull request references Jira Issue OCPBUGS-79358, which is valid. The bug has been moved to the POST state.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.22.0) matches configured target version for branch (4.22.0)
  • bug is in the state New, which is one of the valid states (NEW, ASSIGNED, POST)

The bug has been updated to refer to the pull request using the external bug tracker.

Details

In response to this:

Since 4.14, HostedCluster has had spec.configuration.proxy to configure the data-plane egress 1. In 4.18, the HyperShift API began documenting that setting as specific to data-plane egress 2. However, the cluster-version operator running on the management-cluster control plane has assumed that hosted-cluster Proxy resource should configure its own egress as well. I’m not sure how folks expect management-cluster-side control-plane egress to be configured, but we don’t want it to respect spec.configuration.proxy, because management-cluster networking and data-plane-compute networking are very different environments. For now, just ignore the knob on HyperShift, to avoid data-plane-specific-network-config breaking Update Service access, with ClusterVersionRetrievedUpdates messages like:

Unable to retrieve available updates: Get "https://api.openshift.com/api/upgrades_info/v1/graph?...": proxyconnect tcp: dial tcp: lookup ... on ...:53: no such host

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@coderabbitai
Copy link

coderabbitai bot commented Mar 23, 2026

No actionable comments were generated in the recent review. 🎉

ℹ️ Recent review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: 731825f9-a11f-4903-a9ce-58ae65c6a601

📥 Commits

Reviewing files that changed from the base of the PR and between 0276666 and 895233f.

📒 Files selected for processing (1)
  • pkg/cvo/egress.go

Walkthrough

The getProxyConfig function in the cluster version operator's egress configuration module now returns (nil, nil) early when hypershift is enabled, skipping proxy configuration queries that are unnecessary in hypershift deployments.

Changes

Cohort / File(s) Summary
Egress Configuration
pkg/cvo/egress.go
Added early return in getProxyConfig when hypershift is enabled to avoid unnecessary proxy lister queries.

Estimated code review effort

🎯 2 (Simple) | ⏱️ ~8 minutes

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests

Comment @coderabbitai help to get the list of available commands and usage tips.

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Mar 23, 2026
@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Mar 23, 2026
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 23, 2026

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: fao89, wking

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Mar 23, 2026

@wking: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-hypershift-conformance 895233f link true /test e2e-hypershift-conformance
ci/prow/e2e-agnostic-operator 895233f link true /test e2e-agnostic-operator
ci/prow/e2e-hypershift 895233f link true /test e2e-hypershift
ci/prow/e2e-agnostic-ovn-techpreview-serial-2of3 895233f link true /test e2e-agnostic-ovn-techpreview-serial-2of3

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/severity-moderate Referenced Jira bug's severity is moderate for the branch this PR is targeting. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants