Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix CI failures #27

Merged
merged 8 commits into from
Apr 13, 2018
Merged

Fix CI failures #27

merged 8 commits into from
Apr 13, 2018

Conversation

gaocegege
Copy link
Member

Signed-off-by: Ce Gao gaoce@caicloud.io

@gaocegege
Copy link
Member Author

Signed-off-by: Ce Gao <gaoce@caicloud.io>
Signed-off-by: Ce Gao <gaoce@caicloud.io>
Signed-off-by: Ce Gao <gaoce@caicloud.io>
Signed-off-by: Ce Gao <gaoce@caicloud.io>
Signed-off-by: Ce Gao <gaoce@caicloud.io>
Signed-off-by: Ce Gao <gaoce@caicloud.io>
@gaocegege
Copy link
Member Author

gaocegege commented Apr 12, 2018

@jlewi

I meet with one problem when I am trying to fix CI failures. I'd appreciate it if you could have a look.

https://console.cloud.google.com/kubernetes/pod/us-east1-d/kubeflow-testing/kubeflow-test-infra/kubeflow-hp-tuning-presubmit-e2e-27-4e8c7ed-19-af0f-2710394068?project=kubeflow-ci&tab=logs&duration=PT1H&container_summary_list_tablesize=10&log_entry_list_tablesize=50

I think it may be caused by some features I don't know in GKE. I tried to hack it aacd31e but failed.

Log:

Error from server (Forbidden): error when creating "manifests/dlk/rbac.yaml": clusterroles.rbac.authorization.k8s.io "dlk-manager" is forbidden: attempt to grant extra privileges: [PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["*"]} PolicyRule{Resources:["nodes"], APIGroups:[""], Verbs:["*"]} PolicyRule{Resources:["nodes/*"], APIGroups:[""], Verbs:["*"]} PolicyRule{Resources:["pods/log"], APIGroups:[""], Verbs:["*"]} PolicyRule{Resources:["pods/status"], APIGroups:[""], Verbs:["*"]} PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["*"]} PolicyRule{Resources:["persistentvolumes"], APIGroups:[""], Verbs:["*"]} PolicyRule{Resources:["persistentvolumes/status"], APIGroups:[""], Verbs:["*"]} PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["*"]} PolicyRule{Resources:["persistentvolumeclaims/status"], APIGroups:[""], Verbs:["*"]} PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["*"]} PolicyRule{Resources:["jobs/status"], APIGroups:["batch"], Verbs:["*"]}] user=&{kubeflow-testing@kubeflow-ci.iam.gserviceaccount.com [system:authenticated] map[authenticator:[GKE]]} ownerrules=[PolicyRule{Resources:["selfsubjectaccessreviews" "selfsubjectrulesreviews"], APIGroups:["authorization.k8s.io"], Verbs:["create"]} PolicyRule{NonResourceURLs:["/api" "/api/*" "/apis" "/apis/*" "/healthz" "/swagger-2.0.0.pb-v1" "/swagger.json" "/swaggerapi" "/swaggerapi/*" "/version"], Verbs:["get"]}] ruleResolutionErrors=[]

@gaocegege gaocegege changed the title WIP: Fix CI failures Fix CI failures Apr 13, 2018
Signed-off-by: Ce Gao <gaoce@caicloud.io>
@gaocegege
Copy link
Member Author

/assign @YujiOshima

Thanks to jose5918@ , we solved the issue in GKE and CI should work now.

@YujiOshima
Copy link
Contributor

🎉🎉🎉🎉🎉🎉🎉🎉
Thank you @gaocegege @jose5918 !!!
/lgtm

@k8s-ci-robot
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: YujiOshima

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot merged commit af2c2fa into kubeflow:master Apr 13, 2018
@gaocegege gaocegege deleted the ci branch April 13, 2018 05:13
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants