Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

test atlantis with a trivial change #7522

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

upodroid
Copy link
Member

Atlantis is unauthenticated intentionally.

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Nov 14, 2024
@k8s-ci-robot k8s-ci-robot added area/infra Infrastructure management, infrastructure design, code in infra/ area/infra/gcp Issues or PRs related to Kubernetes GCP infrastructure area/terraform Terraform modules, testing them, writing more of them, code in infra/gcp/clusters/ sig/k8s-infra Categorizes an issue or PR as relevant to SIG K8s Infra. labels Nov 14, 2024
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: upodroid

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added approved Indicates a PR has been approved by an approver from all required OWNERS files. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels Nov 14, 2024
@k8s-infra-ci-robot
Copy link
Contributor

Ran Plan for dir: infra/gcp/terraform/k8s-infra-ii-sandbox workspace: default

Plan Error

running "/atlantis/bin/terraform1.3.10 init -input=false -upgrade" in "/atlantis/repos/kubernetes/k8s.io/7522/default/infra/gcp/terraform/k8s-infra-ii-sandbox": exit status 1

Initializing the backend...
╷
│ Error: Failed to get existing workspaces: querying Cloud Storage failed: googleapi: Error 403: Caller does not have storage.objects.list access to the Google Cloud Storage bucket. Permission 'storage.objects.list' denied on resource (or it may not exist)., forbidden
│ 
│ 
╵


@mahamed91
Copy link

/atlantis apply

@k8s-infra-ci-robot
Copy link
Contributor

Did you mean to use atlantis instead of /atlantis?

@mahamed91
Copy link

atlantis plan

@k8s-infra-ci-robot
Copy link
Contributor

Error: User @mahamed91 does not have permissions to execute 'plan' command.

@upodroid
Copy link
Member Author

atlantis plan

@k8s-infra-ci-robot
Copy link
Contributor

Error: User @upodroid does not have permissions to execute 'plan' command.

@upodroid
Copy link
Member Author

atlantis plan

@k8s-infra-ci-robot
Copy link
Contributor

Error: User @upodroid does not have permissions to execute 'plan' command.

@upodroid
Copy link
Member Author

atlantis plan

@k8s-infra-ci-robot
Copy link
Contributor

Ran Plan for dir: infra/gcp/terraform/k8s-infra-ii-sandbox workspace: default

Plan Error

running "/atlantis/bin/terraform1.3.10 init -input=false -upgrade" in "/atlantis/repos/kubernetes/k8s.io/7522/default/infra/gcp/terraform/k8s-infra-ii-sandbox": exit status 1

Initializing the backend...
╷
│ Error: Failed to get existing workspaces: querying Cloud Storage failed: googleapi: Error 403: Caller does not have storage.objects.list access to the Google Cloud Storage bucket. Permission 'storage.objects.list' denied on resource (or it may not exist)., forbidden
│ 
│ 
╵


@upodroid upodroid mentioned this pull request Nov 24, 2024
@upodroid
Copy link
Member Author

upodroid commented Dec 4, 2024

atlantis plan

@k8s-infra-ci-robot
Copy link
Contributor

Ran Plan for dir: infra/gcp/terraform/k8s-infra-ii-sandbox workspace: default

Plan Error

running "/atlantis/bin/terraform1.3.10 init -input=false -upgrade" in "/atlantis/repos/kubernetes/k8s.io/7522/default/infra/gcp/terraform/k8s-infra-ii-sandbox": exit status 1

Initializing the backend...

Successfully configured the backend "gcs"! Terraform will automatically
use this backend unless the backend configuration changes.
Error loading state: Failed to open state file at gs://k8s-infra-tf-sandbox-ii/k8s-infra-ii-sandbox/default.tfstate: googleapi: got HTTP response code 403 with body: <?xml version='1.0' encoding='UTF-8'?><Error><Code>AccessDenied</Code><Message>Access denied.</Message><Details>atlantis@k8s-infra-seed.iam.gserviceaccount.com does not have storage.objects.get access to the Google Cloud Storage object. Permission 'storage.objects.get' denied on resource (or it may not exist).</Details></Error>

@upodroid
Copy link
Member Author

upodroid commented Dec 4, 2024

atlantis plan

@k8s-infra-ci-robot
Copy link
Contributor

Ran Plan for dir: infra/gcp/terraform/k8s-infra-ii-sandbox workspace: default

Plan Error

running "/atlantis/bin/terraform1.3.10 init -input=false -upgrade" in "/atlantis/repos/kubernetes/k8s.io/7522/default/infra/gcp/terraform/k8s-infra-ii-sandbox": exit status 1

Initializing the backend...
Error loading state: Failed to open state file at gs://k8s-infra-tf-sandbox-ii/k8s-infra-ii-sandbox/default.tfstate: googleapi: got HTTP response code 403 with body: <?xml version='1.0' encoding='UTF-8'?><Error><Code>AccessDenied</Code><Message>Access denied.</Message><Details>atlantis@k8s-infra-seed.iam.gserviceaccount.com does not have storage.objects.get access to the Google Cloud Storage object. Permission 'storage.objects.get' denied on resource (or it may not exist).</Details></Error>

@upodroid
Copy link
Member Author

upodroid commented Dec 4, 2024

atlantis plan

@k8s-infra-ci-robot
Copy link
Contributor

Ran Plan for dir: infra/gcp/terraform/k8s-infra-ii-sandbox workspace: default

Plan Error

Show Output
running "/atlantis/bin/terraform1.3.10 plan -input=false -refresh -out \"/atlantis/repos/kubernetes/k8s.io/7522/default/infra/gcp/terraform/k8s-infra-ii-sandbox/default.tfplan\"" in "/atlantis/repos/kubernetes/k8s.io/7522/default/infra/gcp/terraform/k8s-infra-ii-sandbox": exit status 1
data.google_billing_account.account: Reading...
data.google_organization.org: Reading...
google_service_account.asn_etl: Refreshing state... [id=projects/k8s-infra-ii-sandbox/serviceAccounts/asn-etl@k8s-infra-ii-sandbox.iam.gserviceaccount.com]
╷
│ Error: Error when reading or editing Billing Account Not Found : 018801-93540E-22A20E: googleapi: Error 403: Cloud Billing API has not been used in project 270672962129 before or it is disabled. Enable it by visiting https://console.developers.google.com/apis/api/cloudbilling.googleapis.com/overview?project=270672962129 then retry. If you enabled this API recently, wait a few minutes for the action to propagate to our systems and retry.
│ Details:
│ [
│   {
│     "@type": "type.googleapis.com/google.rpc.Help",
│     "links": [
│       {
│         "description": "Google developers console API activation",
│         "url": "https://console.developers.google.com/apis/api/cloudbilling.googleapis.com/overview?project=270672962129"
│       }
│     ]
│   },
│   {
│     "@type": "type.googleapis.com/google.rpc.ErrorInfo",
│     "domain": "googleapis.com",
│     "metadata": {
│       "consumer": "projects/270672962129",
│       "service": "cloudbilling.googleapis.com"
│     },
│     "reason": "SERVICE_DISABLED"
│   }
│ ]
│ , accessNotConfigured
│ 
│   with data.google_billing_account.account,
│   on main.tf line 22, in data "google_billing_account" "account":
│   22: data "google_billing_account" "account" {
│ 
╵
╷
│ Error: Error reading organization: googleapi: Error 403: Cloud Resource Manager API has not been used in project 270672962129 before or it is disabled. Enable it by visiting https://console.developers.google.com/apis/api/cloudresourcemanager.googleapis.com/overview?project=270672962129 then retry. If you enabled this API recently, wait a few minutes for the action to propagate to our systems and retry.
│ Details:
│ [
│   {
│     "@type": "type.googleapis.com/google.rpc.Help",
│     "links": [
│       {
│         "description": "Google developers console API activation",
│         "url": "https://console.developers.google.com/apis/api/cloudresourcemanager.googleapis.com/overview?project=270672962129"
│       }
│     ]
│   },
│   {
│     "@type": "type.googleapis.com/google.rpc.ErrorInfo",
│     "domain": "googleapis.com",
│     "metadata": {
│       "consumer": "projects/270672962129",
│       "service": "cloudresourcemanager.googleapis.com"
│     },
│     "reason": "SERVICE_DISABLED"
│   }
│ ]
│ , accessNotConfigured
│ 
│   with data.google_organization.org,
│   on main.tf line 26, in data "google_organization" "org":
│   26: data "google_organization" "org" {
│ 
╵

@upodroid
Copy link
Member Author

upodroid commented Dec 4, 2024

atlantis plan

@k8s-infra-ci-robot
Copy link
Contributor

Ran Plan for dir: infra/gcp/terraform/k8s-infra-ii-sandbox workspace: default

Plan Error

Show Output
running "/atlantis/bin/terraform1.3.10 plan -input=false -refresh -out \"/atlantis/repos/kubernetes/k8s.io/7522/default/infra/gcp/terraform/k8s-infra-ii-sandbox/default.tfplan\"" in "/atlantis/repos/kubernetes/k8s.io/7522/default/infra/gcp/terraform/k8s-infra-ii-sandbox": exit status 1
data.google_billing_account.account: Reading...
data.google_organization.org: Reading...
google_service_account.asn_etl: Refreshing state... [id=projects/k8s-infra-ii-sandbox/serviceAccounts/asn-etl@k8s-infra-ii-sandbox.iam.gserviceaccount.com]
data.google_billing_account.account: Read complete after 0s [id=018801-93540E-22A20E]
╷
│ Error: Error reading organization: googleapi: Error 403: Cloud Resource Manager API has not been used in project 270672962129 before or it is disabled. Enable it by visiting https://console.developers.google.com/apis/api/cloudresourcemanager.googleapis.com/overview?project=270672962129 then retry. If you enabled this API recently, wait a few minutes for the action to propagate to our systems and retry.
│ Details:
│ [
│   {
│     "@type": "type.googleapis.com/google.rpc.Help",
│     "links": [
│       {
│         "description": "Google developers console API activation",
│         "url": "https://console.developers.google.com/apis/api/cloudresourcemanager.googleapis.com/overview?project=270672962129"
│       }
│     ]
│   },
│   {
│     "@type": "type.googleapis.com/google.rpc.ErrorInfo",
│     "domain": "googleapis.com",
│     "metadata": {
│       "consumer": "projects/270672962129",
│       "service": "cloudresourcemanager.googleapis.com"
│     },
│     "reason": "SERVICE_DISABLED"
│   }
│ ]
│ , accessNotConfigured
│ 
│   with data.google_organization.org,
│   on main.tf line 26, in data "google_organization" "org":
│   26: data "google_organization" "org" {
│ 
╵

@upodroid
Copy link
Member Author

upodroid commented Dec 4, 2024

atlantis plan

@k8s-infra-ci-robot
Copy link
Contributor

Ran Plan for dir: infra/gcp/terraform/k8s-infra-ii-sandbox workspace: default

Show Output
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create
- destroy

Terraform will perform the following actions:

  # google_project_service.project["artifactregistry.googleapis.com"] will be created
+ resource "google_project_service" "project" {
      + disable_on_destroy = true
      + id                 = (known after apply)
      + project            = "projects/k8s-infra-ii-sandbox"
      + service            = "artifactregistry.googleapis.com"
    }

  # google_project_service.project["bigquery.googleapis.com"] will be destroyed
  # (because key ["bigquery.googleapis.com"] is not in for_each map)
- resource "google_project_service" "project" {
      - disable_on_destroy = true -> null
      - id                 = "k8s-infra-ii-sandbox/bigquery.googleapis.com" -> null
      - project            = "k8s-infra-ii-sandbox" -> null
      - service            = "bigquery.googleapis.com" -> null
    }

  # google_project_service.project["compute.googleapis.com"] will be destroyed
  # (because key ["compute.googleapis.com"] is not in for_each map)
- resource "google_project_service" "project" {
      - disable_on_destroy = true -> null
      - id                 = "k8s-infra-ii-sandbox/compute.googleapis.com" -> null
      - project            = "k8s-infra-ii-sandbox" -> null
      - service            = "compute.googleapis.com" -> null
    }

Plan: 1 to add, 0 to change, 2 to destroy.
  • ▶️ To apply this plan, comment:
    atlantis apply -d infra/gcp/terraform/k8s-infra-ii-sandbox
  • 🚮 To delete this plan and lock, click here
  • 🔁 To plan this project again, comment:
    atlantis plan -d infra/gcp/terraform/k8s-infra-ii-sandbox

Plan: 1 to add, 0 to change, 2 to destroy.


  • ⏩ To apply all unapplied plans from this Pull Request, comment:
    atlantis apply
  • 🚮 To delete all plans and locks from this Pull Request, comment:
    atlantis unlock

@k8s-infra-ci-robot
Copy link
Contributor

Plan Error

running git clone --depth=1 --branch test-atlantis --single-branch https://k8s-infra-ci-robot:<redacted>@github.com/borg-land/k8s.io.git /atlantis/repos/kubernetes/k8s.io/7522/default: Cloning into '/atlantis/repos/kubernetes/k8s.io/7522/default'...
: signal: terminated

@upodroid
Copy link
Member Author

upodroid commented Dec 4, 2024

atlantis plan

@k8s-infra-ci-robot
Copy link
Contributor

Ran Plan for dir: infra/gcp/terraform/k8s-infra-ii-sandbox workspace: default

Show Output
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create

Terraform will perform the following actions:

  # google_project_service.project["artifactregistry.googleapis.com"] will be created
+ resource "google_project_service" "project" {
      + disable_on_destroy = true
      + id                 = (known after apply)
      + project            = "projects/k8s-infra-ii-sandbox"
      + service            = "artifactregistry.googleapis.com"
    }

Plan: 1 to add, 0 to change, 0 to destroy.
  • ▶️ To apply this plan, comment:
    atlantis apply -d infra/gcp/terraform/k8s-infra-ii-sandbox
  • 🚮 To delete this plan and lock, click here
  • 🔁 To plan this project again, comment:
    atlantis plan -d infra/gcp/terraform/k8s-infra-ii-sandbox

Plan: 1 to add, 0 to change, 0 to destroy.


  • ⏩ To apply all unapplied plans from this Pull Request, comment:
    atlantis apply
  • 🚮 To delete all plans and locks from this Pull Request, comment:
    atlantis unlock

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. area/infra/gcp Issues or PRs related to Kubernetes GCP infrastructure area/infra Infrastructure management, infrastructure design, code in infra/ area/terraform Terraform modules, testing them, writing more of them, code in infra/gcp/clusters/ cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. sig/k8s-infra Categorizes an issue or PR as relevant to SIG K8s Infra. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants