Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

destroy/aws: guard against nils returned by aws #1151

Merged
merged 1 commit into from
Feb 8, 2019
Merged

destroy/aws: guard against nils returned by aws #1151

merged 1 commit into from
Feb 8, 2019

Conversation

staebler
Copy link
Contributor

Add some additional guards against nil values in objects queried from aws while destroying the cluster.

Fixes https://bugzilla.redhat.com/show_bug.cgi?id=1669925

@openshift-ci-robot openshift-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jan 30, 2019
@openshift-ci-robot openshift-ci-robot added the size/M Denotes a PR that changes 30-99 lines, ignoring generated files. label Jan 30, 2019
@staebler
Copy link
Contributor Author

/test unit

@abhinavdahiya
Copy link
Contributor

@staebler
Copy link
Contributor Author

https://docs.aws.amazon.com/sdk-for-go/api/aws/#StringValue might be useful.

It would be except that I want to log when the load balancer does not have a VPC ID. My strong suspicion is that the load balancer without a VPC ID is one that the installer created--although I haven't rationalized how one could even be created without a VPC ID. I want the log message so that the user is at least informed about the presence of the load balancer.

pkg/destroy/aws/aws.go Outdated Show resolved Hide resolved
pkg/destroy/aws/aws.go Outdated Show resolved Hide resolved
pkg/destroy/aws/aws.go Outdated Show resolved Hide resolved
pkg/destroy/aws/aws.go Outdated Show resolved Hide resolved
pkg/destroy/aws/aws.go Outdated Show resolved Hide resolved
@wking
Copy link
Member

wking commented Jan 31, 2019

I've left a few nits inline, but they should all be minor adjustments.

pkg/destroy/aws/aws.go Outdated Show resolved Hide resolved
pkg/destroy/aws/aws.go Outdated Show resolved Hide resolved
Add some additional guards against nil values in objects
queried from aws while destroying the cluster.

Fixes https://bugzilla.redhat.com/show_bug.cgi?id=1669925
@staebler
Copy link
Contributor Author

staebler commented Feb 4, 2019

@wking CI is green on this. Do you have any more outstanding concerns?

@wking
Copy link
Member

wking commented Feb 4, 2019

/lgtm

@abhinavdahiya
Copy link
Contributor

/lgtm

/lgtm

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Feb 6, 2019
@openshift-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: abhinavdahiya, staebler, wking

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:
  • OWNERS [abhinavdahiya,staebler,wking]

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@wking
Copy link
Member

wking commented Feb 7, 2019

/retest

@wking
Copy link
Member

wking commented Feb 7, 2019

e2e-aws:

Flaky tests:

[Conformance][Area:Networking][Feature:Router] The default ClusterIngress should support default wildcard reencrypt routes through external DNS [Suite:openshift/conformance/parallel/minimal]

Failing tests:

[Feature:Prometheus][Conformance] Prometheus when installed on the cluster should report telemetry if a cloud.openshift.com token is present [Suite:openshift/conformance/parallel/minimal]
[Feature:Prometheus][Conformance] Prometheus when installed on the cluster should start and expose a secured proxy and unsecured metrics [Suite:openshift/conformance/parallel/minimal]
[Feature:Prometheus][Feature:Builds] Prometheus when installed on the cluster should start and expose a secured proxy and verify build metrics [Suite:openshift/conformance/parallel]

/retest

@wking
Copy link
Member

wking commented Feb 7, 2019

e2e-aws:

Flaky tests:

[Conformance][Area:Networking][Feature:Router] The default ClusterIngress should support default wildcard reencrypt routes through external DNS [Suite:openshift/conformance/parallel/minimal]
[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] volumes should be mountable [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ext3)] volumes should be mountable [Suite:openshift/conformance/parallel] [Suite:k8s]

Failing tests:

[sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should not deadlock when a pod's predecessor fails [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should perform rolling updates and roll backs of template modifications with PVCs [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should provide basic identity [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-scheduling] Multi-AZ Clusters should spread the pods of a replication controller across zones [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-scheduling] Multi-AZ Clusters should spread the pods of a service across zones [Suite:openshift/conformance/parallel] [Suite:k8s]
[sig-storage] Dynamic Provisioning DynamicProvisioner should provision storage with different parameters [Suite:openshift/conformance/parallel] [Suite:k8s]

Flakes moving in the wrong direction ;).

/retest

@wking
Copy link
Member

wking commented Feb 7, 2019

e2e-aws:

Failing tests:

[Conformance][Area:Networking][Feature:Router] The HAProxy router should override the route host for overridden domains with a custom value [Suite:openshift/conformance/parallel/minimal]
[Conformance][Area:Networking][Feature:Router] The HAProxy router should override the route host with a custom value [Suite:openshift/conformance/parallel/minimal]
[Conformance][Area:Networking][Feature:Router] The HAProxy router should serve a route that points to two services and respect weights [Suite:openshift/conformance/parallel/minimal]
[Conformance][Area:Networking][Feature:Router] The HAProxy router should serve routes that were created from an ingress [Suite:openshift/conformance/parallel/minimal]

/retest

@wking
Copy link
Member

wking commented Feb 7, 2019

e2e-aws:

Flaky tests:

[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PVC and non-pre-bound PV: test write access [Suite:openshift/conformance/parallel] [Suite:k8s]

Failing tests:

[Conformance][Area:Networking][Feature:Router] The default ClusterIngress should support default wildcard reencrypt routes through external DNS [Suite:openshift/conformance/parallel/minimal]

/retest

@wking
Copy link
Member

wking commented Feb 7, 2019

e2e-aws hung.

/retest

@wking
Copy link
Member

wking commented Feb 8, 2019

e2e-aws:

level=error msg="\t* module.vpc.aws_route.to_nat_gw[5]: 1 error occurred:"
level=error msg="\t* aws_route.to_nat_gw.5: Error creating route: timeout while waiting for state to become 'success' (timeout: 2m0s)"

/retest

@openshift-merge-robot openshift-merge-robot merged commit 1e3d834 into openshift:master Feb 8, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged. platform/aws size/M Denotes a PR that changes 30-99 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants