Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.

Bug 1897412

Summary: [sriov]disableDrain did not be updated in CRD of manifest
Product: OpenShift Container Platform Reporter: zhaozhanqi <zzhao>
Component: NetworkingAssignee: zenghui.shi <zshi>
Networking sub component: SR-IOV QA Contact: zhaozhanqi <zzhao>
Status: CLOSED ERRATA Docs Contact:
Severity: high    
Priority: high CC: aconstan, dosmith
Version: 4.7   
Target Milestone: ---   
Target Release: 4.7.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-02-24 15:33:26 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description zhaozhanqi 2020-11-13 02:30:41 UTC
Description of problem:
for now, only https://github.com/openshift/sriov-network-operator/blob/master/config/crd/bases/sriovnetwork.openshift.io_sriovoperatorconfigs.yaml has updated the 'disableDrain'

but https://raw.githubusercontent.com/openshift/sriov-network-operator/master/manifests/4.7/sriov-network-operator-sriovoperatorconfig.crd.yaml is not updated. 

So the latest sriov bundle still not enable this feature. 

Version-Release number of selected component (if applicable):
4.7

How reproducible:
always

Steps to Reproduce:
1. setup 4.7 sriov
2. Check sriovoperatorconfig crd 
3.

Actual results:
no disableDrain

Expected results:
should include 'disableDrain'

Additional info:

Comment 2 zhaozhanqi 2020-11-23 11:12:23 UTC
Verified this bug on 4.7.0-202011202119.p0

Comment 5 errata-xmlrpc 2021-02-24 15:33:26 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: OpenShift Container Platform 4.7.0 security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2020:5633