Skip to content

chore: bump controller image to 20a1a90#100

Merged
bdchatham merged 1 commit intomainfrom
chore/bump-controller-image-20a1a90
Apr 17, 2026
Merged

chore: bump controller image to 20a1a90#100
bdchatham merged 1 commit intomainfrom
chore/bump-controller-image-20a1a90

Conversation

@bdchatham
Copy link
Copy Markdown
Collaborator

@bdchatham bdchatham commented Apr 17, 2026

Picks up the post-#99 controller binary that introduced the SeiNodeDeployment.status.internalService field and the per-deployment ClusterIP Service for stateless in-cluster access.

What changes in-cluster

  • SeiNodeDeployment controller starts provisioning a per-deployment {name}-internal ClusterIP Service selecting all child node pods (rpc/evm-http/rest ports only — stateful protocols deliberately excluded).
  • .status.internalService.{name,namespace,ports.*} is now populated.
  • Purely additive for existing deployments; no behavior change to .spec.networking-driven external exposure.

Why

Unblocks the autobake workflow in sei-protocol/platform (M2b) which reads .status.internalService.name to dial the chain's RPC.

Image

189176372795.dkr.ecr.us-east-2.amazonaws.com/sei/sei-k8s-controller:20a1a9038725109d434f3940797200afaf75aa44
sha256:05ee5a60d3541c10e0409086381284a1e1695aabd771a14b049de170e1ac0a37
pushed: 2026-04-17T12:30:04Z

Verified in ECR via aws ecr describe-images.

🤖 Generated with Claude Code

…only ports)

Picks up the post-#99 controller binary:
- new SeiNodeDeployment.status.internalService field
- per-deployment ClusterIP Service with the stateless HTTP port set
  (rpc/evm-http/rest only — evm-ws and grpc deliberately excluded)
- internal Service lifecycle is independent of .spec.networking

Unblocks the autobake workflow (platform repo, M2b) which reads
status.internalService.name to dial the chain's RPC.

Image:
  189176372795.dkr.ecr.us-east-2.amazonaws.com/sei/sei-k8s-controller:20a1a9038725109d434f3940797200afaf75aa44
  sha256:05ee5a60d3541c10e0409086381284a1e1695aabd771a14b049de170e1ac0a37

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
@bdchatham bdchatham merged commit 938e26c into main Apr 17, 2026
2 checks passed
bdchatham added a commit that referenced this pull request Apr 17, 2026
Controller pods crash on startup with:

  Failed to initialize OTel MeterProvider
  error: building OTel resource: conflicting Schema URL:
    https://opentelemetry.io/schemas/1.40.0 and
    https://opentelemetry.io/schemas/1.26.0

resource.Merge rejects merging resources whose schema URLs differ.
resource.Default() reports schema v1.40.0 (embedded in the SDK at
v1.43.0), while cmd/telemetry.go hardcoded semconv/v1.26.0 as the
schema for the custom resource overlay.

Bump the semconv import to v1.40.0 so the two schema URLs agree.
All three symbols in use here (semconv.SchemaURL, ServiceName,
ServiceVersion) are stable across semconv versions — drop-in
substitution.

Unblocks the controller image bump that #100 landed. Post-#99
controller pods stop CrashLoopBackOff and roll out cleanly, which
in turn unblocks SeiNodeDeployment.status.internalService for the
autobake workflow.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
bdchatham added a commit that referenced this pull request Apr 17, 2026
Controller pods crash on startup with:

  Failed to initialize OTel MeterProvider
  error: building OTel resource: conflicting Schema URL:
    https://opentelemetry.io/schemas/1.40.0 and
    https://opentelemetry.io/schemas/1.26.0

resource.Merge rejects merging resources whose schema URLs differ.
resource.Default() reports schema v1.40.0 (embedded in the SDK at
v1.43.0), while cmd/telemetry.go hardcoded semconv/v1.26.0 as the
schema for the custom resource overlay.

Bump the semconv import to v1.40.0 so the two schema URLs agree.
All three symbols in use here (semconv.SchemaURL, ServiceName,
ServiceVersion) are stable across semconv versions — drop-in
substitution.

Unblocks the controller image bump that #100 landed. Post-#99
controller pods stop CrashLoopBackOff and roll out cleanly, which
in turn unblocks SeiNodeDeployment.status.internalService for the
autobake workflow.

Co-authored-by: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant