Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release 1.28.6 #16668

Merged
Merged

Conversation

justinsb
Copy link
Member

Release 1.28.6

@justinsb justinsb added the tide/merge-method-squash Denotes a PR that should be squashed by tide when it merges. label Jul 13, 2024
@k8s-ci-robot k8s-ci-robot added this to the v1.28 milestone Jul 13, 2024
@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. labels Jul 13, 2024
@k8s-ci-robot k8s-ci-robot added lgtm "Looks good to me", indicates that a PR is ready to be merged. approved Indicates a PR has been approved by an approver from all required OWNERS files. labels Jul 13, 2024
@k8s-triage-robot
Copy link

The Kubernetes project has merge-blocking tests that are currently too flaky to consistently pass.

This bot retests PRs for certain kubernetes repos according to the following rules:

  • The PR does have any do-not-merge/* labels
  • The PR does not have the needs-ok-to-test label
  • The PR is mergeable (does not have a needs-rebase label)
  • The PR is approved (has cncf-cla: yes, lgtm, approved labels)
  • The PR is failing tests required for merge

You can:

/retest

@rifelpet
Copy link
Member

/hold

@justinsb looks like some permissions need adjusting given the prow cluster migration

@k8s-ci-robot k8s-ci-robot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Jul 13, 2024
@justinsb
Copy link
Member Author

Thanks @rifelpet

I think it's specific to the release-1.28 branch, because the 1.28 pull request CI jobs are trying to upload to kops-ci, which broke in the move to the prow community cluster. Newer branches have a different default for pull requests (because of #15981), so I proposed a cherry-pick to 1.28 of that PR to 1.28: #16678

There may well be other problems, we do seem to be using a mix of kops-ci markers and k8s-staging-kops markers, but I figure we can start here!

@k8s-ci-robot k8s-ci-robot removed the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Jul 17, 2024
@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Jul 17, 2024
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: rifelpet

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@rifelpet
Copy link
Member

/hold

actually can we get one more cherrypick in? #16673

@hakman
Copy link
Member

hakman commented Jul 17, 2024

/unhold
/test all

@k8s-ci-robot k8s-ci-robot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Jul 17, 2024
@hakman
Copy link
Member

hakman commented Jul 17, 2024

/retest

@hakman
Copy link
Member

hakman commented Jul 17, 2024

/hold

@k8s-ci-robot k8s-ci-robot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Jul 17, 2024
@hakman
Copy link
Member

hakman commented Jul 17, 2024

@ameukam Seems we need delete permission on the CI bucket:

AccessDeniedException: 403 prow-build@k8s-infra-prow-build.iam.gserviceaccount.com does not have storage.objects.delete access to the Google Cloud Storage object.
make: *** [Makefile:270: gcs-publish-ci] Error 1

@ameukam
Copy link
Member

ameukam commented Jul 17, 2024

@ameukam Seems we need delete permission on the CI bucket:

AccessDeniedException: 403 prow-build@k8s-infra-prow-build.iam.gserviceaccount.com does not have storage.objects.delete access to the Google Cloud Storage object.
make: *** [Makefile:270: gcs-publish-ci] Error 1

I thought we fixed this. IIRC @upodroid updated the permissions for this bucket.

@hakman
Copy link
Member

hakman commented Jul 17, 2024

/hold

@hakman
Copy link
Member

hakman commented Jul 17, 2024

I thought we fixed this. IIRC @upodroid updated the permissions for this bucket.

Not sure if delete was also part of the permissions...

@upodroid
Copy link
Member

It was just object creator, let me switch it to object admin

@justinsb
Copy link
Member Author

Thanks for looking at it...

gsutil -h "Cache-Control:private, max-age=0, no-transform" cp /home/prow/go/src/k8s.io/kops/.build/upload/latest-ci.txt gs://k8s-staging-kops/pulls/pull-kops-e2e-k8s-aws-calico-1-28/pull-fdc9e9ca4416e65161a6716cd9125d46480178c3/
Copying file:///home/prow/go/src/k8s.io/kops/.build/upload/latest-ci.txt [Content-Type=text/plain]...
/ [0 files][    0.0 B/  165.0 B]                                                
AccessDeniedException: 403 prow-build@k8s-infra-prow-build.iam.gserviceaccount.com does not have storage.objects.delete access to the Google Cloud Storage object.

We are uploading to a per-job, per-sha directory. So I'm guessing this only needs delete when we are re-running the job. If delete is a problem, I could also rebase or tweak the commit comment to try to force a different SHA. Though I agree that we probably need delete permission... although it would be nice to catch instances where we try to upload the same GCS file twice, I think in practice there might be too many places where we do that legitimately.

@upodroid
Copy link
Member

/retest

it's fixed now

@hakman
Copy link
Member

hakman commented Jul 17, 2024

/unhold

@k8s-ci-robot k8s-ci-robot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Jul 17, 2024
@k8s-ci-robot k8s-ci-robot merged commit 4e8f4b8 into kubernetes:release-1.28 Jul 17, 2024
13 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. tide/merge-method-squash Denotes a PR that should be squashed by tide when it merges.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants