Skip to content

NO-JIRA: DownStream Merge [04-29-2026]#3168

Closed
openshift-pr-manager[bot] wants to merge 33 commits intomasterfrom
d/s-merge-04-29-2026
Closed

NO-JIRA: DownStream Merge [04-29-2026]#3168
openshift-pr-manager[bot] wants to merge 33 commits intomasterfrom
d/s-merge-04-29-2026

Conversation

@openshift-pr-manager
Copy link
Copy Markdown

Automated merge of upstream/master → master.

Note: This PR includes an automated sync of openshift/go.mod with upstream dependencies (go mod tidy).

booxter and others added 30 commits April 21, 2026 14:51
Assisted-by: gpt-5.4 xhigh
Signed-off-by: Ihar Hrachyshka <ihrachyshka@nvidia.com>
Assisted-by: gpt-5.4 xhigh
Signed-off-by: Ihar Hrachyshka <ihrachyshka@nvidia.com>
This mode is used to replace namespace address set usage. it will not
select hostnetwork pod IPs and will include
config.Kubernetes.HostNetworkNamespace address set IPs when that
namespace is matched with an empty pod selector.
Update gress_policy: now address sets are always created during
configuration, the previous exception was for namespace selector
that didn't match any namespaces.

Add HostNetworkNamespace update calls for addresssetManager.

Signed-off-by: Nadia Pinaeva <n.m.pinaeva@gmail.com>
This behaviour was long copied form the old netpol code, on restart we
should EnsureAddressSet to preserve existing IPs, and then reconcile
instead of setting ips to nil

Signed-off-by: Nadia Pinaeva <n.m.pinaeva@gmail.com>
It won't cause a random addr set creation anymore, unless explicitly
used.

Signed-off-by: Nadia Pinaeva <n.m.pinaeva@gmail.com>
This is to stay in line with demo version.

Signed-off-by: Ihar Hrachyshka <ihrachyshka@nvidia.com>
Fixes #6299

Signed-off-by: Ihar Hrachyshka <ihrachyshka@nvidia.com>
Signed-off-by: Nadia Pinaeva <n.m.pinaeva@gmail.com>
Signed-off-by: Nadia Pinaeva <n.m.pinaeva@gmail.com>
This was required to introduce a startup test, because fake address set
factory is hard to initialize, and using proper db is better.
The inial sync test now also checks updates for requested address sets.

Signed-off-by: Nadia Pinaeva <n.m.pinaeva@gmail.com>
Also scan udn-layer2-node-gateway-router-lrp-tunnel-ids when
discovering stale networks, since L2 primary UDNs with IC don't
write node-subnets.

Signed-off-by: Yun Zhou <yunz@nvidia.com>
Replace the last namespace address set usage in netpol with addressset manager
Bump frr to 10.6.0 to fix additional coredumps
Limits allocation of subnets and layer 2 tunnel ID for nodes based on if
the node is active for a UDN.

Removes udnPolicy interface that was a temporary bandaid until cluster
manager had dynamic UDN support.

Signed-off-by: Tim Rozet <trozet@nvidia.com>
The test was expecting that allocation should fail when the subnet is
too small for the number of nodes, we expect the opposite behavior with
Dynamic UDN.

Signed-off-by: Tim Rozet <trozet@nvidia.com>
There is a race exposed with this test:
when namespace without pods is being deleted, should delete NAD in that namespace

where CM will create the NAD for a UDN, however the informer for the CM
is not updated immediately. If during the window while it created the
NAD, but has not updated the informer, a delete event comes for the
namespace...then CM will see there is no NAD in the informer cache and
skip deleting it. Which leaves it hanging around. As a fallback, this
commit uses the k8s client to see if the NAD is truly deleted when it is
missing from the informer cache during NAD deletion check.

Fixes: #6281

Signed-off-by: Tim Rozet <trozet@nvidia.com>
NADs without CUDN/UDN ownership should be excluded from Dynamic UDN
filtering. However, there was controller/node manager specific filtering
that did not apply to cluster manager. Therefore cluster manager was not
igorning bare NADs. This commit moves the logic into NodeHasNetwork to
make it universal.

Includes other fixes to unit tests where the wrong zone name was being
used for controllers in tests.

Signed-off-by: Tim Rozet <trozet@nvidia.com>
This commit addresses 2 issues:
- EF was being applied before a pod was created. When EF is applied it
  checks for status to see it was applied. However with Dynamic UDN, if
  no node is active, this status will never be set. Updated the tests to
  create the source pod before applying the EF.
- EF tests were using a primary NAD rather than a CUDN/UDN. Dynamic UDN
  ignores primary NADs not owned by CUDN/UDN. Change the tests to use a
  UDN so we can exercise the UDN path as originally intended.

Signed-off-by: Tim Rozet <trozet@nvidia.com>
Status manager was waiting for all zones to report before reporting an
overall status. This change adds a relevantZoneProvider which
resourceManagers may implement to determine dynamically which zones it
shoudl care about (active/inactive with dynamic UDN).

Signed-off-by: Tim Rozet <trozet@nvidia.com>
Before we were just storing node, and acting as if all networks were
active in the tests. Make it more aligned with real network manager and
make it per network.

Signed-off-by: Tim Rozet <trozet@nvidia.com>
cleanup stale L2 primary UDN tunnel ID annotations on restart
Bumps the go_modules group with 2 updates in the /go-controller directory: [github.com/go-jose/go-jose/v4](https://github.com/go-jose/go-jose) and [github.com/moby/spdystream](https://github.com/moby/spdystream).
Bumps the go_modules group with 1 update in the /test/conformance directory: [github.com/moby/spdystream](https://github.com/moby/spdystream).
Bumps the go_modules group with 1 update in the /test/e2e directory: [github.com/moby/spdystream](https://github.com/moby/spdystream).


Updates `github.com/go-jose/go-jose/v4` from 4.1.3 to 4.1.4
- [Commits](go-jose/go-jose@v4.1.3...v4.1.4)

Updates `github.com/moby/spdystream` from 0.5.0 to 0.5.1
- [Commits](moby/spdystream@v0.5.0...v0.5.1)

Updates `github.com/moby/spdystream` from 0.5.0 to 0.5.1
- [Commits](moby/spdystream@v0.5.0...v0.5.1)

Updates `github.com/moby/spdystream` from 0.5.0 to 0.5.1
- [Commits](moby/spdystream@v0.5.0...v0.5.1)

Updates `github.com/moby/spdystream` from 0.5.0 to 0.5.1
- [Commits](moby/spdystream@v0.5.0...v0.5.1)

Updates `github.com/moby/spdystream` from 0.5.0 to 0.5.1
- [Commits](moby/spdystream@v0.5.0...v0.5.1)

Updates `github.com/moby/spdystream` from 0.5.0 to 0.5.1
- [Commits](moby/spdystream@v0.5.0...v0.5.1)

Updates `github.com/moby/spdystream` from 0.5.0 to 0.5.1
- [Commits](moby/spdystream@v0.5.0...v0.5.1)

Updates `github.com/moby/spdystream` from 0.5.0 to 0.5.1
- [Commits](moby/spdystream@v0.5.0...v0.5.1)

Updates `github.com/moby/spdystream` from 0.5.0 to 0.5.1
- [Commits](moby/spdystream@v0.5.0...v0.5.1)

---
updated-dependencies:
- dependency-name: github.com/go-jose/go-jose/v4
  dependency-version: 4.1.4
  dependency-type: indirect
- dependency-name: github.com/moby/spdystream
  dependency-version: 0.5.1
  dependency-type: indirect
- dependency-name: github.com/moby/spdystream
  dependency-version: 0.5.1
  dependency-type: indirect
- dependency-name: github.com/moby/spdystream
  dependency-version: 0.5.1
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
Without this, eBGP peers sharing the same ASN reject each other's
routes due to AS-loop detection. Adding "allowas-in origin" per
neighbor allows routes originated by same-ASN peers while still
preventing actual routing loops. The directive is a no-op for iBGP
and is applied unconditionally to support future dynamic ASN
scenarios.

Signed-off-by: Jaime Caamaño Ruiz <jcaamano@redhat.com>
…-controller/go_modules-5c9d2901cb

Bump the go_modules group across 3 directories with 2 updates
EVPN: add allowas-in origin for BGP neighbors
newClusterManagerNodeController was removed in c1e81f8,
use nodecontroller.NewController instead.

Signed-off-by: Patryk Diak <pdiak@redhat.com>
fix UDN unit test to use new node controller constructor
Seed the default-network pod annotation on the pod object before
passing it to startWithDBSetup, instead of updating it via the API
server after informers have already started. This eliminates a race
where WatchPods reads the pod from the informer cache before it
reflects the post-startup Update, causing the UDN controller to
overwrite the 'default' annotation with only the secondary network.

Fixes #6280

Signed-off-by: Enrique Llorente <ellorent@redhat.com>
npinaeva and others added 3 commits April 28, 2026 16:56
test: fix layer2 UDN controller test flake in kubevirt live-migration
- go mod tidy

Automated sync after downstream merge to keep openshift/go.mod
in sync with transitive dependencies from go-controller and test/e2e.
@openshift-pr-manager
Copy link
Copy Markdown
Author

/ok-to-test
/payload 5.0 ci blocking
/payload 5.0 nightly blocking

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Apr 29, 2026
@openshift-ci-robot
Copy link
Copy Markdown
Contributor

@openshift-pr-manager[bot]: This pull request explicitly references no jira issue.

Details

In response to this:

Automated merge of upstream/master → master.

Note: This PR includes an automated sync of openshift/go.mod with upstream dependencies (go mod tidy).

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented Apr 29, 2026

@openshift-pr-manager[bot]: trigger 5 job(s) of type blocking for the ci release of OCP 5.0

  • periodic-ci-openshift-release-main-ci-5.0-upgrade-from-stable-4.22-e2e-aws-ovn-upgrade
  • periodic-ci-openshift-release-main-ci-5.0-upgrade-from-stable-4.22-e2e-azure-ovn-upgrade
  • periodic-ci-openshift-release-main-ci-5.0-e2e-gcp-ovn-upgrade
  • periodic-ci-openshift-hypershift-release-5.0-periodics-e2e-aks
  • periodic-ci-openshift-hypershift-release-5.0-periodics-e2e-aws-ovn

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/7adc0af0-43c7-11f1-948d-728ee689306a-0

trigger 13 job(s) of type blocking for the nightly release of OCP 5.0

  • periodic-ci-openshift-release-main-ci-5.0-e2e-aws-upgrade-ovn-single-node
  • periodic-ci-openshift-release-main-nightly-5.0-e2e-aws-ovn-upgrade-fips
  • periodic-ci-openshift-release-main-ci-5.0-e2e-azure-ovn-upgrade
  • periodic-ci-openshift-release-main-ci-5.0-upgrade-from-stable-4.22-e2e-gcp-ovn-rt-upgrade
  • periodic-ci-openshift-hypershift-release-5.0-periodics-e2e-aws-ovn-conformance
  • periodic-ci-openshift-release-main-nightly-5.0-e2e-aws-ovn-serial-1of2
  • periodic-ci-openshift-release-main-nightly-5.0-e2e-aws-ovn-serial-2of2
  • periodic-ci-openshift-release-main-ci-5.0-e2e-aws-ovn-techpreview
  • periodic-ci-openshift-release-main-ci-5.0-e2e-aws-ovn-techpreview-serial-1of3
  • periodic-ci-openshift-release-main-ci-5.0-e2e-aws-ovn-techpreview-serial-2of3
  • periodic-ci-openshift-release-main-ci-5.0-e2e-aws-ovn-techpreview-serial-3of3
  • periodic-ci-openshift-release-main-nightly-5.0-e2e-metal-ipi-ovn-ipv4
  • periodic-ci-openshift-release-main-nightly-5.0-e2e-metal-ipi-ovn-ipv6

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/7adc0af0-43c7-11f1-948d-728ee689306a-1

@openshift-ci openshift-ci Bot added the ok-to-test Indicates a non-member PR verified by an org member that is safe to test. label Apr 29, 2026
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented Apr 29, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: openshift-pr-manager[bot]
Once this PR has been reviewed and has the lgtm label, please assign kyrtapz for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@jluhrsen
Copy link
Copy Markdown
Contributor

/test e2e-aws-ovn
/test e2e-aws-ovn-edge-zones
/test e2e-aws-ovn-fdp-qe
/test e2e-aws-ovn-rhcos10-techpreview
/test e2e-aws-ovn-upgrade
/test e2e-aws-ovn-upgrade-local-gateway
/test e2e-azure-ovn-upgrade
/test e2e-gcp-ovn-techpreview
/test e2e-metal-ipi-ovn-dualstack-bgp

@jluhrsen
Copy link
Copy Markdown
Contributor

/payload-job periodic-ci-openshift-release-main-nightly-5.0-e2e-aws-ovn-serial-2of2
/payload-job periodic-ci-openshift-release-main-nightly-5.0-e2e-metal-ipi-ovn-ipv6

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented Apr 29, 2026

@jluhrsen: trigger 2 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-release-main-nightly-5.0-e2e-aws-ovn-serial-2of2
  • periodic-ci-openshift-release-main-nightly-5.0-e2e-metal-ipi-ovn-ipv6

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/ce5a1f50-43f4-11f1-89f4-c61ef1ba8429-0

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented Apr 29, 2026

@openshift-pr-manager[bot]: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-aws-ovn-upgrade-local-gateway 36b7ab5 link true /test e2e-aws-ovn-upgrade-local-gateway
ci/prow/e2e-aws-ovn-upgrade 36b7ab5 link true /test e2e-aws-ovn-upgrade
ci/prow/e2e-metal-ipi-ovn-dualstack-bgp 36b7ab5 link true /test e2e-metal-ipi-ovn-dualstack-bgp
ci/prow/e2e-aws-ovn-rhcos10-techpreview 36b7ab5 link false /test e2e-aws-ovn-rhcos10-techpreview
ci/prow/e2e-azure-ovn-upgrade 36b7ab5 link true /test e2e-azure-ovn-upgrade
ci/prow/e2e-aws-ovn-fdp-qe 36b7ab5 link true /test e2e-aws-ovn-fdp-qe
ci/prow/security 36b7ab5 link false /test security

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@jluhrsen
Copy link
Copy Markdown
Contributor

/test e2e-aws-ovn-fdp-qe
/test e2e-aws-ovn-rhcos10-techpreview
/test e2e-aws-ovn-upgrade
/test e2e-aws-ovn-upgrade-local-gateway
/test e2e-azure-ovn-upgrade
/test e2e-metal-ipi-ovn-dualstack-bgp

@jluhrsen
Copy link
Copy Markdown
Contributor

/payload-job periodic-ci-openshift-release-main-ci-5.0-upgrade-from-stable-4.22-e2e-azure-ovn-upgrade
/payload-job periodic-ci-openshift-release-main-nightly-5.0-e2e-metal-ipi-ovn-ipv6
/payload-job periodic-ci-openshift-release-main-ci-5.0-upgrade-from-stable-4.22-e2e-gcp-ovn-rt-upgrade
/payload-job periodic-ci-openshift-release-main-ci-5.0-upgrade-from-stable-4.22-e2e-aws-ovn-upgrade

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented Apr 30, 2026

@jluhrsen: trigger 4 job(s) for the /payload-(with-prs|job|aggregate|job-with-prs|aggregate-with-prs) command

  • periodic-ci-openshift-release-main-ci-5.0-upgrade-from-stable-4.22-e2e-azure-ovn-upgrade
  • periodic-ci-openshift-release-main-nightly-5.0-e2e-metal-ipi-ovn-ipv6
  • periodic-ci-openshift-release-main-ci-5.0-upgrade-from-stable-4.22-e2e-gcp-ovn-rt-upgrade
  • periodic-ci-openshift-release-main-ci-5.0-upgrade-from-stable-4.22-e2e-aws-ovn-upgrade

See details on https://pr-payload-tests.ci.openshift.org/runs/ci/c6b47a90-4438-11f1-8dd3-31f74d7a655f-0

@jluhrsen
Copy link
Copy Markdown
Contributor

/test e2e-metal-ipi-ovn-dualstack-bgp

@arkadeepsen
Copy link
Copy Markdown
Member

@jluhrsen the upstream fix for the address set transaction issue merged: ovn-kubernetes/ovn-kubernetes#6310
Closing this one to get the fix in as well.

/close

@openshift-ci openshift-ci Bot closed this Apr 30, 2026
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented Apr 30, 2026

@arkadeepsen: Closed this PR.

Details

In response to this:

@jluhrsen the upstream fix for the address set transaction issue merged: ovn-kubernetes/ovn-kubernetes#6310
Closing this one to get the fix in as well.

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. ok-to-test Indicates a non-member PR verified by an org member that is safe to test.

Projects

None yet

Development

Successfully merging this pull request may close these issues.