Closed arewm closed 3 months ago
@theishshah would you be working on this before the next release (1.28). If its difficult to get in, please feel free to move it to the next one.
Issues go stale after 90d of inactivity.
Mark the issue as fresh by commenting /remove-lifecycle stale
.
Stale issues rot after an additional 30d of inactivity and eventually close.
Exclude this issue from closing by commenting /lifecycle frozen
.
If this issue is safe to close now please do so with /close
.
/lifecycle stale
/remove-lifecycle stale
@theishshah would it be possible to get this in before the next release due on July 24 (1.31). If not, please feel free to bump it to the next one.
@theishshah Is it fine if we unassign you from this issue, and add a help wanted label. It would helpful if you could mentor anyone working on this issue since you have knowledge on where the codebase lives.
Issues go stale after 90d of inactivity.
Mark the issue as fresh by commenting /remove-lifecycle stale
.
Stale issues rot after an additional 30d of inactivity and eventually close.
Exclude this issue from closing by commenting /lifecycle frozen
.
If this issue is safe to close now please do so with /close
.
/lifecycle stale
/remove-lifecycle stale
Issues go stale after 90d of inactivity.
Mark the issue as fresh by commenting /remove-lifecycle stale
.
Stale issues rot after an additional 30d of inactivity and eventually close.
Exclude this issue from closing by commenting /lifecycle frozen
.
If this issue is safe to close now please do so with /close
.
/lifecycle stale
/remove-lifecycle stale
Issues go stale after 90d of inactivity.
Mark the issue as fresh by commenting /remove-lifecycle stale
.
Stale issues rot after an additional 30d of inactivity and eventually close.
Exclude this issue from closing by commenting /lifecycle frozen
.
If this issue is safe to close now please do so with /close
.
/lifecycle stale
Stale issues rot after 30d of inactivity.
Mark the issue as fresh by commenting /remove-lifecycle rotten
.
Rotten issues close after an additional 30d of inactivity.
Exclude this issue from closing by commenting /lifecycle frozen
.
If this issue is safe to close now please do so with /close
.
/lifecycle rotten /remove-lifecycle stale
Rotten issues close after 30d of inactivity.
Reopen the issue by commenting /reopen
.
Mark the issue as fresh by commenting /remove-lifecycle rotten
.
Exclude this issue from closing again by commenting /lifecycle frozen
.
/close
@openshift-bot: Closing this issue.
Bug Report
Bundle validation passes when values within the CSV do not have appropriate types.
This has been encountered multiple times. We traced down the suspected offending lines to when the
spec.version
was a string as well as whenmetadata.annotations.*
were not strings, for example,What did you do?
Ran
opm render
andopm bundle add
resulting in an error messageWhen trying to track the source of the issue, we ran
operator-sdk bundle validate
, but no errors were raised.What did you expect to see?
An error message indicating which values have the wrong type
What did you see instead? Under which circumstances?
Validation passed without errors
Environment
Operator type:
Kubernetes cluster type:
$ operator-sdk version
$ go version
(if language is Go)$ kubectl version
Possible Solution
Additional context
These issues were encountered when trying to add bundles to an index image. We traced it down to improper types which bundle validation did not catch.
Related image in operator-registry: https://github.com/operator-framework/operator-registry/issues/1039