-
Notifications
You must be signed in to change notification settings - Fork 505
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
the image for kube-apiserver v1.19.0-rc.2 contains a binary of unknown origin #1438
Comments
/priority critical-urgent can we capture the rc2 build/release logs before they expire? @kubernetes/release-engineering |
Links to logs for each run are here: kubernetes/sig-release#1156 |
#1428 probably deserves a second look ... (or perhaps a first, from new eyes uhhh) |
Tim merged that one for anago to finish transitioning the artifacts from stage to release, everything was already built by that point. If it was caused by a hack, it should be one of the earlier ones (there were several that day). |
The wrong commit is the release commit from the mock staging bucket. If we look into the (mock) staged sources, then we can see:
To me it looks like that we pushed the wrong container image into the registry. The build image during nomock stage contains the right git commit SHA (verified locally). If I re-pull k8s.gcr.io/kube-apiserver-amd64:v1.19.0-rc.2 then it truly contains the image from the mock stage bucket… |
OK, then that means that the wrong image got referenced in the promoter manifest somehow, right? The digest in the manifest matches the image in the staging registry. Let's investigate one further step back. |
Looking in diffoscope at the binaries produced for x86_64 linux and comparing with a local build (stripped) from the 1.19.0-rc.2 tag, they look like they're functionally equivalent and indirectly affirming the suspicion that the re-re-re-build&releases had local, non-pushed changelog commits and thus different commitids. |
Looks like we have the same issue with rc.3:
then:
Now, let's look at the
then:
9ee7e7c2c15d6148abcbef79276c67230100de14 is the right commit. TLDR; I still think that we push/promote the images from |
Catching up from some OOO days and the threads in Slack (https://kubernetes.slack.com/archives/CJH2GBF7Y/p1596014847435000?thread_ts=1596006315.427000&cid=CJH2GBF7Y, https://kubernetes.slack.com/archives/CJH2GBF7Y/p1596217066459900)... I'll summarize what happened and what I believe should be next steps. On 7/20, the vanity domain flip (VDF) was kicked off, which changed the backing registries for The release process runs on the The GCB service account for this project has direct access to push images to the following registries:
Given the promotion process for community-owned images, we do not have the same ability to push container images directly to new production (nor do we need it). To get around this, we skipped the image push on official releases and instead do a validation that the images have been promoted. You can see that added in #1199. The trouble with this is the timing is off. Here's what I think needs to happen: MockMock stageBuild and dry-run push to Mock releaseValidate image manifests from the mock push location as one of the prerequisites. OfficialOfficial stageBuild and push to Image promotionAfter the official stage is complete:
Official releaseValidate image manifests have been promoted as one of the prerequisites. I'll take a look at this since I've touched most of the code paths around container images most recently. /assign |
Opened a fix in #1455. |
What happened:
https://kubernetes.slack.com/archives/CJH2GBF7Y/p1595600184366100
@aanm deployed a v1.19.0-rc.2 kubeadm based cluster and discovered that the kube-apiserver reports a build SHA
dd1511ca82c2e08847a1e4f712f4f1924f5babc8
, which is unknown (not a commit in k/k).What you expected to happen:
the binary inside the kube-apiserver image to match the Anago release commit:
kubernetes/kubernetes@27bb2a4
How to reproduce it (as minimally and precisely as possible):
Notes
https://storage.googleapis.com/kubernetes-release/release/${RELEASE}/bin/linux/amd64/${BIN}
have the correct commit SHA./kind bug
The text was updated successfully, but these errors were encountered: