-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cloud-provider-azure 1.23.2 CA dependency is broken #4875
Comments
I think the long term solution (aka point 3) should be to just stop using vendor, just created #4878 for this. |
I agree. Point 3 should be stopped. Apologies for #4689
<#4689>. I remember creating a
change in cloud-provider-azure.
In my opinion, we should update cloud-provider-azure dependency to a
version with a fix and verify that tests don't fail.
The alternative is to carry the fix in the vendor would be a quick fix but
will cause other issues as mentioned above.
…On Tue, May 10, 2022 at 7:32 AM Daniel Kłobuszewski < ***@***.***> wrote:
I think the long term solution (aka point 3) should be to just stop using
vendor, just created #4878
<#4878> for this.
—
Reply to this email directly, view it on GitHub
<#4875 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ARQAMBUZ5C4ZOVV2MS33RZLVJJXQVANCNFSM5VRM2UXQ>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
The cloudprovider version should be bumped to v1.24.x which contains this fix. The fix seems to be in 1.23.11 as well. |
Bumping cloudprovider to either 1.23.11 or 1.24 causes compilation error in CA azure cloudprovider. I'm guessing they shouldn't be very hard to fix, but I don't want to make last minute changes in cloudprovider I don't know and have no way of testing. I'm leaning towards manually fixing this in vendor/, listing the import problem as a know issue and fixing it in a follow-up patch release. Unless you want to open a PR bumping the version of cloud-provider-azure and you have enough confidence that those changes are safe enough to include in 1.24.0? |
Manually removed the update to vendor/sigs.k8s.io/cloud-provider-azure/pkg/provider/doc.go as per discussion in kubernetes#4875.
I've updated #4871 to carry the fix in vendor. If there are no comments against this approach and / or alternative PRs with version update for Azure by tomorrow, I'd like to merge it tomorrow to unblock 1.24.0 release. |
Okay, sounds good. I'll work on updating the vendor version in parallel.
Thank you.
…On Wed, May 11, 2022 at 6:44 AM MaciekPytel ***@***.***> wrote:
I've updated #4871 <#4871>
to carry the fix in vendor. If there are no comments against this approach
and / or alternative PRs with version update for Azure by tomorrow, I'd
like to merge it tomorrow to unblock 1.24.0 release.
—
Reply to this email directly, view it on GitHub
<#4875 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ARQAMBWV63X766SMBO6AM73VJO2UHANCNFSM5VRM2UXQ>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
I created this PR: #4883
fixing version issue in CA.
On Wed, May 11, 2022 at 8:24 AM Prachi Gandhi ***@***.***>
wrote:
… Okay, sounds good. I'll work on updating the vendor version in parallel.
Thank you.
On Wed, May 11, 2022 at 6:44 AM MaciekPytel ***@***.***>
wrote:
> I've updated #4871 <#4871>
> to carry the fix in vendor. If there are no comments against this approach
> and / or alternative PRs with version update for Azure by tomorrow, I'd
> like to merge it tomorrow to unblock 1.24.0 release.
>
> —
> Reply to this email directly, view it on GitHub
> <#4875 (comment)>,
> or unsubscribe
> <https://github.com/notifications/unsubscribe-auth/ARQAMBWV63X766SMBO6AM73VJO2UHANCNFSM5VRM2UXQ>
> .
> You are receiving this because you were mentioned.Message ID:
> ***@***.***>
>
|
cherry-picking above PR to 1.22 and 1.23.
I'll push these changes onto 1.24 after release?
On Wed, May 11, 2022 at 12:14 PM Prachi Gandhi ***@***.***>
wrote:
… I created this PR: #4883
fixing version issue in CA.
On Wed, May 11, 2022 at 8:24 AM Prachi Gandhi ***@***.***>
wrote:
> Okay, sounds good. I'll work on updating the vendor version in parallel.
> Thank you.
>
> On Wed, May 11, 2022 at 6:44 AM MaciekPytel ***@***.***>
> wrote:
>
>> I've updated #4871 <#4871>
>> to carry the fix in vendor. If there are no comments against this approach
>> and / or alternative PRs with version update for Azure by tomorrow, I'd
>> like to merge it tomorrow to unblock 1.24.0 release.
>>
>> —
>> Reply to this email directly, view it on GitHub
>> <#4875 (comment)>,
>> or unsubscribe
>> <https://github.com/notifications/unsubscribe-auth/ARQAMBWV63X766SMBO6AM73VJO2UHANCNFSM5VRM2UXQ>
>> .
>> You are receiving this because you were mentioned.Message ID:
>> ***@***.***>
>>
>
|
Manually removed the update to vendor/sigs.k8s.io/cloud-provider-azure/pkg/provider/doc.go as per discussion in kubernetes#4875. # Conflicts: # vertical-pod-autoscaler/vendor/k8s.io/api/certificates/v1/register.go # vertical-pod-autoscaler/vendor/k8s.io/api/events/v1beta1/zz_generated.prerelease-lifecycle.go # vertical-pod-autoscaler/vendor/k8s.io/api/flowcontrol/v1beta1/doc.go # vertical-pod-autoscaler/vendor/k8s.io/api/node/v1/zz_generated.deepcopy.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/applyconfigurations/batch/v1/job.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/applyconfigurations/core/v1/podip.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/applyconfigurations/extensions/v1beta1/ipblock.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/applyconfigurations/extensions/v1beta1/networkpolicystatus.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/informers/apiserverinternal/v1alpha1/storageversion.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/informers/policy/v1/interface.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/kubernetes/typed/apiserverinternal/v1alpha1/apiserverinternal_client.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/kubernetes/typed/apiserverinternal/v1alpha1/doc.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/kubernetes/typed/apiserverinternal/v1alpha1/fake/doc.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/kubernetes/typed/autoscaling/v2/generated_expansion.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/kubernetes/typed/certificates/v1/fake/fake_certificates_client.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/listers/node/v1/expansion_generated.go
Manually removed the update to vendor/sigs.k8s.io/cloud-provider-azure/pkg/provider/doc.go as per discussion in kubernetes#4875. # Conflicts: # vertical-pod-autoscaler/vendor/k8s.io/api/certificates/v1/register.go # vertical-pod-autoscaler/vendor/k8s.io/api/events/v1beta1/zz_generated.prerelease-lifecycle.go # vertical-pod-autoscaler/vendor/k8s.io/api/flowcontrol/v1beta1/doc.go # vertical-pod-autoscaler/vendor/k8s.io/api/node/v1/zz_generated.deepcopy.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/applyconfigurations/batch/v1/job.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/applyconfigurations/core/v1/podip.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/applyconfigurations/extensions/v1beta1/ipblock.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/applyconfigurations/extensions/v1beta1/networkpolicystatus.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/informers/apiserverinternal/v1alpha1/storageversion.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/informers/policy/v1/interface.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/kubernetes/typed/apiserverinternal/v1alpha1/apiserverinternal_client.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/kubernetes/typed/apiserverinternal/v1alpha1/doc.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/kubernetes/typed/apiserverinternal/v1alpha1/fake/doc.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/kubernetes/typed/autoscaling/v2/generated_expansion.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/kubernetes/typed/certificates/v1/fake/fake_certificates_client.go # vertical-pod-autoscaler/vendor/k8s.io/client-go/listers/node/v1/expansion_generated.go
Manually removed the update to vendor/sigs.k8s.io/cloud-provider-azure/pkg/provider/doc.go as per discussion in kubernetes#4875.
Manually removed the update to vendor/sigs.k8s.io/cloud-provider-azure/pkg/provider/doc.go as per discussion in kubernetes#4875.
Manually removed the update to vendor/sigs.k8s.io/cloud-provider-azure/pkg/provider/doc.go as per discussion in kubernetes#4875.
Manually removed the update to vendor/sigs.k8s.io/cloud-provider-azure/pkg/provider/doc.go as per discussion in kubernetes#4875.
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
this should be fixed already |
@feiskyer: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
CA has a dependency on cloud-provider-azure 1.23.2, which contains a file with mismatched quotes that breaks CA tests.
Interestingly the file in CA vendor directory doesn't have the same bug. The problematic file was first introduced to CA vendor in #4689, without the bug. The only way I can think for how this would be possible is if the problem was manually fixed directly in the vendor directory (but the PR doesn't even mention anything like this).
@gandhipr @marwanad @feiskyer
The text was updated successfully, but these errors were encountered: