Skip to content

Conversation

@blublinsky
Copy link
Contributor

Description

Type of change

  • [ x] Refactor
  • New feature
  • Bug fix
  • CVE fix
  • Optimization
  • Documentation Update
  • Configuration Update
  • Bump-up dependent library

Related Tickets & Documents

Checklist before requesting a review

  • I have performed a self-review of my code.
  • PR has passed all pre-merge test jobs.
  • If it is a core feature, I have added thorough tests.

Testing

  • Please provide detailed steps to perform tests related to this code change.
  • How were the fix/results from this change verified? Please provide relevant screenshots or results.

continue
}
// Use consistent path structure: /etc/mcp/headers/<secretName>/header
headerValue = path.Join(utils.MCPHeadersMountRoot, header.ValueFrom.SecretRef.Name, utils.MCPSECRETDATAPATH)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

would it be better to let user configure which key in the secret is the header?
they may prefer host multiple header values in the same secret.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ideally yes, but can be more complex. I would preffer to keep it simple for now. Do not expect to have many MCP servers of this type

.PHONY: manifests
manifests: controller-gen ## Generate WebhookConfiguration, ClusterRole and CustomResourceDefinition objects.
$(CONTROLLER_GEN) rbac:roleName=manager-role crd webhook paths="./..." output:crd:artifacts:config=config/crd/bases
$(CONTROLLER_GEN) rbac:roleName=manager-role crd:allowDangerousTypes=true webhook paths="./..." output:crd:artifacts:config=config/crd/bases
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lol which type is dangerous?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have no idea. This is generated

@raptorsun
Copy link
Contributor

/lgtm

looks good.
to coordinate with @xrajesh working on the current release.

@openshift-ci openshift-ci bot added lgtm Indicates that a PR is ready to be merged. and removed lgtm Indicates that a PR is ready to be merged. labels Jan 23, 2026
@blublinsky blublinsky force-pushed the new-mcp branch 2 times, most recently from 0a1a0b0 to 56469f0 Compare January 23, 2026 17:35
@raptorsun
Copy link
Contributor

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Jan 23, 2026
@xrajesh
Copy link
Contributor

xrajesh commented Jan 23, 2026

/hold
Until release

@openshift-ci openshift-ci bot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Jan 23, 2026
@blublinsky
Copy link
Contributor Author

/retest

// The embedding model is not exposed as it's handled by the container image.
// +kubebuilder:validation:XValidation:rule="self.alpha >= 0.0 && self.alpha <= 1.0",message="alpha must be between 0.0 and 1.0"
// +kubebuilder:validation:XValidation:rule="self.threshold >= 0.0 && self.threshold <= 1.0",message="threshold must be between 0.0 and 1.0"
type ToolFilteringConfig struct {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If we are exposing this without a feature gate, it would be great to add a little bit more explanation about what these parameters are and how they are influencing the results.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Each parameter is clearly annotated. We can create a document on what toolsRag is and how it works. Sort of described here https://github.com/blublinsky/tools_rag. But this file is definetly not the right spot for it

@openshift-merge-robot openshift-merge-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jan 30, 2026
@openshift-ci openshift-ci bot removed the lgtm Indicates that a PR is ready to be merged. label Feb 4, 2026
@openshift-merge-robot openshift-merge-robot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Feb 4, 2026
@JoaoFula
Copy link
Contributor

JoaoFula commented Feb 5, 2026

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Feb 5, 2026
@blublinsky
Copy link
Contributor Author

/override "Red Hat Konflux / console-tests-pf5 / ols-bundle"
/override "Red Hat Konflux / console-tests-pf6 / ols-bundle"
/override "Red Hat Konflux / operator-e2e-tests-419 / ols-bundle"
/override "Red Hat Konflux / service-e2e-tests-419 / ols-bundle"

@openshift-ci
Copy link

openshift-ci bot commented Feb 5, 2026

@blublinsky: Overrode contexts on behalf of blublinsky: Red Hat Konflux / console-tests-pf5 / ols-bundle, Red Hat Konflux / console-tests-pf6 / ols-bundle, Red Hat Konflux / operator-e2e-tests-419 / ols-bundle, Red Hat Konflux / service-e2e-tests-419 / ols-bundle

Details

In response to this:

/override "Red Hat Konflux / console-tests-pf5 / ols-bundle"
/override "Red Hat Konflux / console-tests-pf6 / ols-bundle"
/override "Red Hat Konflux / operator-e2e-tests-419 / ols-bundle"
/override "Red Hat Konflux / service-e2e-tests-419 / ols-bundle"

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@blublinsky
Copy link
Contributor Author

/approve

@openshift-ci
Copy link

openshift-ci bot commented Feb 5, 2026

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: blublinsky

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Feb 5, 2026
@openshift-ci
Copy link

openshift-ci bot commented Feb 5, 2026

@blublinsky: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@blublinsky
Copy link
Contributor Author

/unhold

@openshift-ci openshift-ci bot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Feb 5, 2026
@openshift-merge-bot openshift-merge-bot bot merged commit 4e29cab into openshift:main Feb 5, 2026
19 of 23 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants