-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Release 1.28.6 #16668
Release 1.28.6 #16668
Conversation
The Kubernetes project has merge-blocking tests that are currently too flaky to consistently pass. This bot retests PRs for certain kubernetes repos according to the following rules:
You can:
/retest |
/hold @justinsb looks like some permissions need adjusting given the prow cluster migration |
Thanks @rifelpet I think it's specific to the release-1.28 branch, because the 1.28 pull request CI jobs are trying to upload to kops-ci, which broke in the move to the prow community cluster. Newer branches have a different default for pull requests (because of #15981), so I proposed a cherry-pick to 1.28 of that PR to 1.28: #16678 There may well be other problems, we do seem to be using a mix of kops-ci markers and k8s-staging-kops markers, but I figure we can start here! |
5708249
to
fdc9e9c
Compare
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: rifelpet The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/hold actually can we get one more cherrypick in? #16673 |
/unhold |
/retest |
/hold |
@ameukam Seems we need delete permission on the CI bucket:
|
I thought we fixed this. IIRC @upodroid updated the permissions for this bucket. |
/hold |
Not sure if delete was also part of the permissions... |
It was just object creator, let me switch it to object admin |
Thanks for looking at it...
We are uploading to a per-job, per-sha directory. So I'm guessing this only needs delete when we are re-running the job. If delete is a problem, I could also rebase or tweak the commit comment to try to force a different SHA. Though I agree that we probably need delete permission... although it would be nice to catch instances where we try to upload the same GCS file twice, I think in practice there might be too many places where we do that legitimately. |
/retest it's fixed now |
/unhold |
Release 1.28.6