Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug 1880132: destroy/gcp: correct extract service account email from IAM policy binding member #4193

Merged
merged 1 commit into from Sep 17, 2020

Conversation

abhinavdahiya
Copy link
Contributor

/test e2e-gcp

/cc @abhinavdahiya

@openshift-ci-robot
Copy link
Contributor

@abhinavdahiya: GitHub didn't allow me to request PR reviews from the following users: abhinavdahiya.

Note that only openshift members and repo collaborators can review this PR, and authors cannot review their own PRs.

In response to this:

/test e2e-gcp

/cc @abhinavdahiya

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

…nding member

openshift@e580a61 used to prefix match member with service account email which allowed trailing `?uid`
But in openshift@5a460d2#diff-10deb10b2bb7d004df02aa4a5e123e3eR43 we moved to exact matching the member with service account email.

This skips the deleted serviceaccount as they have a `?uid={}` suffix as described in https://cloud.google.com/resource-manager/reference/rest/Shared.Types/Binding , see `members[]`

So now we extract the service account email more accurately for exact string match.
@abhinavdahiya abhinavdahiya changed the title wip destroy/gcp: correct extract service account email from IAM policy binding memberwip Sep 17, 2020
@abhinavdahiya abhinavdahiya changed the title destroy/gcp: correct extract service account email from IAM policy binding memberwip destroy/gcp: correct extract service account email from IAM policy binding member Sep 17, 2020
@abhinavdahiya
Copy link
Contributor Author

/test e2e-gcp

@abhinavdahiya abhinavdahiya changed the title destroy/gcp: correct extract service account email from IAM policy binding member Bug 1880132: destroy/gcp: correct extract service account email from IAM policy binding member Sep 17, 2020
@openshift-ci-robot openshift-ci-robot added the bugzilla/severity-urgent Referenced Bugzilla bug's severity is urgent for the branch this PR is targeting. label Sep 17, 2020
@openshift-ci-robot
Copy link
Contributor

@abhinavdahiya: This pull request references Bugzilla bug 1880132, which is valid. The bug has been moved to the POST state. The bug has been updated to refer to the pull request using the external bug tracker.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target release (4.6.0) matches configured target release for branch (4.6.0)
  • bug is in the state NEW, which is one of the valid states (NEW, ASSIGNED, ON_DEV, POST, POST)

In response to this:

Bug 1880132: destroy/gcp: correct extract service account email from IAM policy binding member

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci-robot openshift-ci-robot added the bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. label Sep 17, 2020
@abhinavdahiya
Copy link
Contributor Author

/assign @jstuever

@abhinavdahiya
Copy link
Contributor Author

/cherry-pick release-4.5

@openshift-cherrypick-robot

@abhinavdahiya: once the present PR merges, I will cherry-pick it on top of release-4.5 in a new PR and assign it to you.

In response to this:

/cherry-pick release-4.5

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@abhinavdahiya
Copy link
Contributor Author

/test e2e-gcp

@abhinavdahiya
Copy link
Contributor Author

testing locally I can see the service accounts are now getting cleaned up correctly.

./bin/openshift-install --dir dev destroy cluster --log-level debug                                                                                                                                                                                                                                                                                        DEBUG OpenShift Installer unreleased-master-3691-gf9fd06f1b01ef14a3145e36d2ac63abac8beaf5b
DEBUG Built from commit f9fd06f1b01ef14a3145e36d2ac63abac8beaf5b
INFO Credentials loaded from file "/home/adahiya/.gcp/osServiceAccount.json"
DEBUG Listing compute instances
DEBUG Found instance: adahiya-2-sw6z6-bootstrap in zone us-central1-a, status RUNNING
DEBUG Found instance: adahiya-2-sw6z6-master-0 in zone us-central1-a, status RUNNING
DEBUG Found instance: adahiya-2-sw6z6-master-1 in zone us-central1-b, status RUNNING
DEBUG Found instance: adahiya-2-sw6z6-master-2 in zone us-central1-c, status RUNNING
DEBUG Listing compute instances
DEBUG Stopping compute instance adahiya-2-sw6z6-bootstrap in zone us-central1-a
DEBUG Stopping compute instance adahiya-2-sw6z6-master-0 in zone us-central1-a
DEBUG Stopping compute instance adahiya-2-sw6z6-master-1 in zone us-central1-b
DEBUG Stopping compute instance adahiya-2-sw6z6-master-2 in zone us-central1-c
DEBUG Stop instances: 4 items pending
DEBUG Listing compute instances
DEBUG Found instance: adahiya-2-sw6z6-bootstrap in zone us-central1-a, status STOPPING
DEBUG Found instance: adahiya-2-sw6z6-master-0 in zone us-central1-a, status STOPPING
DEBUG Found instance: adahiya-2-sw6z6-master-1 in zone us-central1-b, status STOPPING
DEBUG Found instance: adahiya-2-sw6z6-master-2 in zone us-central1-c, status STOPPING
DEBUG Listing compute instances
DEBUG Stopping compute instance adahiya-2-sw6z6-bootstrap in zone us-central1-a
DEBUG Stopping compute instance adahiya-2-sw6z6-master-0 in zone us-central1-a
DEBUG Stopping compute instance adahiya-2-sw6z6-master-1 in zone us-central1-b
DEBUG Stopping compute instance adahiya-2-sw6z6-master-2 in zone us-central1-c
DEBUG Stop instances: 4 items pending
DEBUG Listing compute instances
DEBUG Found instance: adahiya-2-sw6z6-bootstrap in zone us-central1-a, status STOPPING
DEBUG Found instance: adahiya-2-sw6z6-master-0 in zone us-central1-a, status STOPPING
DEBUG Found instance: adahiya-2-sw6z6-master-1 in zone us-central1-b, status TERMINATED
DEBUG Found instance: adahiya-2-sw6z6-master-2 in zone us-central1-c, status TERMINATED
DEBUG Listing compute instances
DEBUG Stopping compute instance adahiya-2-sw6z6-master-1 in zone us-central1-b
INFO Stopped instance adahiya-2-sw6z6-master-1
DEBUG Stopping compute instance adahiya-2-sw6z6-master-2 in zone us-central1-c
INFO Stopped instance adahiya-2-sw6z6-master-2
DEBUG Stopping compute instance adahiya-2-sw6z6-bootstrap in zone us-central1-a
DEBUG Stopping compute instance adahiya-2-sw6z6-master-0 in zone us-central1-a
INFO Stopped instance adahiya-2-sw6z6-master-0
DEBUG Stop instances: 1 items pending
DEBUG Listing compute instances
DEBUG Found instance: adahiya-2-sw6z6-bootstrap in zone us-central1-a, status STOPPING
DEBUG Found instance: adahiya-2-sw6z6-master-0 in zone us-central1-a, status TERMINATED
DEBUG Found instance: adahiya-2-sw6z6-master-1 in zone us-central1-b, status TERMINATED
DEBUG Found instance: adahiya-2-sw6z6-master-2 in zone us-central1-c, status TERMINATED
DEBUG Listing compute instances
DEBUG Stopping compute instance adahiya-2-sw6z6-bootstrap in zone us-central1-a
DEBUG Stop instances: 1 items pending
DEBUG Listing compute instances
DEBUG Found instance: adahiya-2-sw6z6-master-1 in zone us-central1-b, status TERMINATED
DEBUG Found instance: adahiya-2-sw6z6-master-2 in zone us-central1-c, status TERMINATED
DEBUG Found instance: adahiya-2-sw6z6-bootstrap in zone us-central1-a, status STOPPING
DEBUG Found instance: adahiya-2-sw6z6-master-0 in zone us-central1-a, status TERMINATED
DEBUG Listing compute instances
DEBUG Stopping compute instance adahiya-2-sw6z6-bootstrap in zone us-central1-a
DEBUG Stop instances: 1 items pending
DEBUG Listing compute instances
DEBUG Found instance: adahiya-2-sw6z6-bootstrap in zone us-central1-a, status STOPPING
DEBUG Found instance: adahiya-2-sw6z6-master-0 in zone us-central1-a, status TERMINATED
DEBUG Found instance: adahiya-2-sw6z6-master-1 in zone us-central1-b, status TERMINATED
DEBUG Found instance: adahiya-2-sw6z6-master-2 in zone us-central1-c, status TERMINATED
DEBUG Listing compute instances
DEBUG Stopping compute instance adahiya-2-sw6z6-bootstrap in zone us-central1-a
DEBUG Stop instances: 1 items pending
DEBUG Listing compute instances
DEBUG Found instance: adahiya-2-sw6z6-master-1 in zone us-central1-b, status TERMINATED
DEBUG Found instance: adahiya-2-sw6z6-master-2 in zone us-central1-c, status TERMINATED
DEBUG Found instance: adahiya-2-sw6z6-bootstrap in zone us-central1-a, status STOPPING
DEBUG Found instance: adahiya-2-sw6z6-master-0 in zone us-central1-a, status TERMINATED
DEBUG Listing compute instances
DEBUG Stopping compute instance adahiya-2-sw6z6-bootstrap in zone us-central1-a
DEBUG Stop instances: 1 items pending
DEBUG Listing compute instances
DEBUG Found instance: adahiya-2-sw6z6-master-1 in zone us-central1-b, status TERMINATED
DEBUG Found instance: adahiya-2-sw6z6-master-2 in zone us-central1-c, status TERMINATED
DEBUG Found instance: adahiya-2-sw6z6-bootstrap in zone us-central1-a, status STOPPING
DEBUG Found instance: adahiya-2-sw6z6-master-0 in zone us-central1-a, status TERMINATED
DEBUG Listing compute instances
DEBUG Stopping compute instance adahiya-2-sw6z6-bootstrap in zone us-central1-a
DEBUG Stop instances: 1 items pending
DEBUG Listing compute instances
DEBUG Found instance: adahiya-2-sw6z6-bootstrap in zone us-central1-a, status STOPPING
DEBUG Found instance: adahiya-2-sw6z6-master-0 in zone us-central1-a, status TERMINATED
DEBUG Found instance: adahiya-2-sw6z6-master-1 in zone us-central1-b, status TERMINATED
DEBUG Found instance: adahiya-2-sw6z6-master-2 in zone us-central1-c, status TERMINATED
DEBUG Listing compute instances
DEBUG Stopping compute instance adahiya-2-sw6z6-bootstrap in zone us-central1-a
DEBUG Stop instances: 1 items pending
DEBUG Listing compute instances
DEBUG Found instance: adahiya-2-sw6z6-bootstrap in zone us-central1-a, status TERMINATED
DEBUG Found instance: adahiya-2-sw6z6-master-0 in zone us-central1-a, status TERMINATED
DEBUG Found instance: adahiya-2-sw6z6-master-1 in zone us-central1-b, status TERMINATED
DEBUG Found instance: adahiya-2-sw6z6-master-2 in zone us-central1-c, status TERMINATED
DEBUG Listing compute instances
DEBUG Stopping compute instance adahiya-2-sw6z6-bootstrap in zone us-central1-a
INFO Stopped instance adahiya-2-sw6z6-bootstrap
DEBUG Discovering cloud controller resources
DEBUG Listing instance groups
DEBUG Listing instance groups
DEBUG Found instance group: adahiya-2-sw6z6-bootstrap in zone us-central1-a
DEBUG Found instance group: adahiya-2-sw6z6-master-us-central1-a in zone us-central1-a
DEBUG Found instance group: adahiya-2-sw6z6-master-us-central1-b in zone us-central1-b
DEBUG Found instance group: adahiya-2-sw6z6-master-us-central1-c in zone us-central1-c
DEBUG Listing backend services
DEBUG Listing target pools
DEBUG Listing health checks
DEBUG Listing HTTP health checks
DEBUG Listing firewall rules
DEBUG Listing firewall rules
DEBUG Listing compute instances
DEBUG Found instance: adahiya-2-sw6z6-bootstrap in zone us-central1-a, status TERMINATED
DEBUG Found instance: adahiya-2-sw6z6-master-0 in zone us-central1-a, status TERMINATED
DEBUG Found instance: adahiya-2-sw6z6-master-1 in zone us-central1-b, status TERMINATED
DEBUG Found instance: adahiya-2-sw6z6-master-2 in zone us-central1-c, status TERMINATED
DEBUG Listing compute instances
DEBUG Deleting compute instance adahiya-2-sw6z6-bootstrap in zone us-central1-a
DEBUG Deleting compute instance adahiya-2-sw6z6-master-0 in zone us-central1-a
DEBUG Deleting compute instance adahiya-2-sw6z6-master-1 in zone us-central1-b
DEBUG Deleting compute instance adahiya-2-sw6z6-master-2 in zone us-central1-c
DEBUG Instances: 4 items pending
DEBUG Listing disks
DEBUG Found disk: adahiya-2-sw6z6-master-1 in zone us-central1-b
DEBUG Found disk: adahiya-2-sw6z6-bootstrap in zone us-central1-a
DEBUG Found disk: adahiya-2-sw6z6-master-0 in zone us-central1-a
DEBUG Found disk: adahiya-2-sw6z6-master-2 in zone us-central1-c
DEBUG Deleting disk adahiya-2-sw6z6-master-1 in zone us-central1-b
DEBUG failed to delete disk adahiya-2-sw6z6-master-1 in zone us-central1-b: googleapi: Error 400: The disk resource 'projects/openshift-dev-installer/zones/us-central1-b/disks/adahiya-2-sw6z6-master-1' is already being used by 'projects/openshift-dev-installer/zones/us-central1-b/instances/adahiya-2-sw6z6-master-1', resourceInUseByAnotherResource
DEBUG Deleting disk adahiya-2-sw6z6-bootstrap in zone us-central1-a
DEBUG failed to delete disk adahiya-2-sw6z6-bootstrap in zone us-central1-a: googleapi: Error 400: The disk resource 'projects/openshift-dev-installer/zones/us-central1-a/disks/adahiya-2-sw6z6-bootstrap' is already being used by 'projects/openshift-dev-installer/zones/us-central1-a/instances/adahiya-2-sw6z6-bootstrap', resourceInUseByAnotherResource
DEBUG Deleting disk adahiya-2-sw6z6-master-0 in zone us-central1-a
DEBUG failed to delete disk adahiya-2-sw6z6-master-0 in zone us-central1-a: googleapi: Error 400: The disk resource 'projects/openshift-dev-installer/zones/us-central1-a/disks/adahiya-2-sw6z6-master-0' is already being used by 'projects/openshift-dev-installer/zones/us-central1-a/instances/adahiya-2-sw6z6-master-0', resourceInUseByAnotherResource
DEBUG Deleting disk adahiya-2-sw6z6-master-2 in zone us-central1-c
DEBUG failed to delete disk adahiya-2-sw6z6-master-2 in zone us-central1-c: googleapi: Error 400: The disk resource 'projects/openshift-dev-installer/zones/us-central1-c/disks/adahiya-2-sw6z6-master-2' is already being used by 'projects/openshift-dev-installer/zones/us-central1-c/instances/adahiya-2-sw6z6-master-2', resourceInUseByAnotherResource
DEBUG Disks: 4 items pending
DEBUG Listing service accounts
DEBUG Found service account: projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw-openshift-i-wlg6p@openshift-dev-installer.iam.gserviceaccount.com
DEBUG Found service account: projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw-openshift-i-qffxm@openshift-dev-installer.iam.gserviceaccount.com
DEBUG Found service account: projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw6z6-m@openshift-dev-installer.iam.gserviceaccount.com
DEBUG Found service account: projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw-openshift-m-vwflm@openshift-dev-installer.iam.gserviceaccount.com
DEBUG Found service account: projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw6z6-w@openshift-dev-installer.iam.gserviceaccount.com
DEBUG Deleting service account projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw-openshift-i-wlg6p@openshift-dev-installer.iam.gserviceaccount.com
INFO Deleted service account projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw-openshift-i-wlg6p@openshift-dev-installer.iam.gserviceaccount.com
DEBUG Deleting service account projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw-openshift-i-qffxm@openshift-dev-installer.iam.gserviceaccount.com
INFO Deleted service account projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw-openshift-i-qffxm@openshift-dev-installer.iam.gserviceaccount.com
DEBUG Deleting service account projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw6z6-m@openshift-dev-installer.iam.gserviceaccount.com
INFO Deleted service account projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw6z6-m@openshift-dev-installer.iam.gserviceaccount.com
DEBUG Deleting service account projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw-openshift-m-vwflm@openshift-dev-installer.iam.gserviceaccount.com
INFO Deleted service account projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw-openshift-m-vwflm@openshift-dev-installer.iam.gserviceaccount.com
DEBUG Deleting service account projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw6z6-w@openshift-dev-installer.iam.gserviceaccount.com
INFO Deleted service account projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw6z6-w@openshift-dev-installer.iam.gserviceaccount.com
DEBUG Fetching project IAM policy
DEBUG candidate members to be removed: [adahiya-2-sw-openshift-i-qffxm@openshift-dev-installer.iam.gserviceaccount.com adahiya-2-sw-openshift-i-wlg6p@openshift-dev-installer.iam.gserviceaccount.com adahiya-2-sw-openshift-m-vwflm@openshift-dev-installer.iam.gserviceaccount.com adahiya-2-sw6z6-m@openshift-dev-installer.iam.gserviceaccount.com adahiya-2-sw6z6-w@openshift-dev-installer.iam.gserviceaccount.com]
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw6z6-m@openshift-dev-installer.iam.gserviceaccount.com?uid=100801591583914315368 from role roles/compute.instanceAdmin
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw-openshift-m-vwflm@openshift-dev-installer.iam.gserviceaccount.com?uid=110019031604106721421 from role roles/compute.instanceAdmin.v1
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw-openshift-m-vwflm@openshift-dev-installer.iam.gserviceaccount.com?uid=110019031604106721421 from role roles/compute.loadBalancerAdmin
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw6z6-m@openshift-dev-installer.iam.gserviceaccount.com?uid=100801591583914315368 from role roles/compute.networkAdmin
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw6z6-m@openshift-dev-installer.iam.gserviceaccount.com?uid=100801591583914315368 from role roles/compute.securityAdmin
DEBUG IAM: removing serviceAccount:adahiya-2-sw6z6-w@openshift-dev-installer.iam.gserviceaccount.com from role roles/compute.viewer
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw-openshift-i-qffxm@openshift-dev-installer.iam.gserviceaccount.com?uid=112353991163409787924 from role roles/dns.admin
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw-openshift-i-wlg6p@openshift-dev-installer.iam.gserviceaccount.com?uid=108044347228815896699 from role roles/iam.serviceAccountUser
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw-openshift-m-vwflm@openshift-dev-installer.iam.gserviceaccount.com?uid=110019031604106721421 from role roles/iam.serviceAccountUser
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw6z6-m@openshift-dev-installer.iam.gserviceaccount.com?uid=100801591583914315368 from role roles/iam.serviceAccountUser
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw-openshift-i-wlg6p@openshift-dev-installer.iam.gserviceaccount.com?uid=108044347228815896699 from role roles/storage.admin
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw6z6-m@openshift-dev-installer.iam.gserviceaccount.com?uid=100801591583914315368 from role roles/storage.admin
DEBUG IAM: removing serviceAccount:adahiya-2-sw6z6-w@openshift-dev-installer.iam.gserviceaccount.com from role roles/storage.admin
DEBUG Setting project IAM policy
DEBUG Policy bindings: 1 items pending
DEBUG Listing images
DEBUG Listing DNS Zones
DEBUG Found cluster private dns zone: adahiya-2-sw6z6-private-zone
DEBUG Found parent dns zone: installer-public-zone
DEBUG Deleting 1 recordset(s) in zone installer-public-zone
INFO Deleted 1 recordset(s) in zone installer-public-zone
DEBUG Deleting 2 recordset(s) in zone adahiya-2-sw6z6-private-zone
INFO Deleted 2 recordset(s) in zone adahiya-2-sw6z6-private-zone
DEBUG Deleting DNS zones adahiya-2-sw6z6-private-zone
INFO Deleted DNS zone adahiya-2-sw6z6-private-zone
DEBUG Listing storage buckets
DEBUG Found bucket: adahiya-2-sw6z6-bootstrap-ignition
DEBUG Listing objects for storage bucket adahiya-2-sw6z6-bootstrap-ignition
DEBUG Found storage object adahiya-2-sw6z6-bootstrap-ignition/bootstrap.ign
DEBUG Deleting storate object adahiya-2-sw6z6-bootstrap-ignition/bootstrap.ign
INFO Deleted bucket object bootstrap.ign
DEBUG Deleting storate bucket adahiya-2-sw6z6-bootstrap-ignition
INFO Deleted bucket adahiya-2-sw6z6-bootstrap-ignition
DEBUG Listing routes
DEBUG Listing firewall rules
DEBUG Found firewall rule: adahiya-2-sw6z6-api
DEBUG Found firewall rule: adahiya-2-sw6z6-bootstrap-in-ssh
DEBUG Found firewall rule: adahiya-2-sw6z6-control-plane
DEBUG Found firewall rule: adahiya-2-sw6z6-etcd
DEBUG Found firewall rule: adahiya-2-sw6z6-health-checks
DEBUG Found firewall rule: adahiya-2-sw6z6-internal-cluster
DEBUG Found firewall rule: adahiya-2-sw6z6-internal-network
DEBUG Deleting firewall rule adahiya-2-sw6z6-etcd
DEBUG Deleting firewall rule adahiya-2-sw6z6-health-checks
DEBUG Deleting firewall rule adahiya-2-sw6z6-internal-cluster
DEBUG Deleting firewall rule adahiya-2-sw6z6-internal-network
DEBUG Deleting firewall rule adahiya-2-sw6z6-api
DEBUG Deleting firewall rule adahiya-2-sw6z6-bootstrap-in-ssh
DEBUG Deleting firewall rule adahiya-2-sw6z6-control-plane
DEBUG Firewalls: 7 items pending
DEBUG Listing addresses
DEBUG Listing service accounts
DEBUG Found service account: projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw-openshift-i-wlg6p@openshift-dev-installer.iam.gserviceaccount.com
DEBUG Found service account: projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw-openshift-i-qffxm@openshift-dev-installer.iam.gserviceaccount.com
DEBUG Found service account: projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw6z6-m@openshift-dev-installer.iam.gserviceaccount.com
DEBUG Found service account: projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw-openshift-m-vwflm@openshift-dev-installer.iam.gserviceaccount.com
DEBUG Found service account: projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw6z6-w@openshift-dev-installer.iam.gserviceaccount.com
DEBUG Deleting service account projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw-openshift-i-wlg6p@openshift-dev-installer.iam.gserviceaccount.com
INFO Deleted service account projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw-openshift-i-wlg6p@openshift-dev-installer.iam.gserviceaccount.com
DEBUG Deleting service account projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw-openshift-i-qffxm@openshift-dev-installer.iam.gserviceaccount.com
INFO Deleted service account projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw-openshift-i-qffxm@openshift-dev-installer.iam.gserviceaccount.com
DEBUG Deleting service account projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw6z6-m@openshift-dev-installer.iam.gserviceaccount.com
INFO Deleted service account projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw6z6-m@openshift-dev-installer.iam.gserviceaccount.com
DEBUG Deleting service account projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw-openshift-m-vwflm@openshift-dev-installer.iam.gserviceaccount.com
INFO Deleted service account projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw-openshift-m-vwflm@openshift-dev-installer.iam.gserviceaccount.com
DEBUG Deleting service account projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw6z6-w@openshift-dev-installer.iam.gserviceaccount.com
INFO Deleted service account projects/openshift-dev-installer/serviceAccounts/adahiya-2-sw6z6-w@openshift-dev-installer.iam.gserviceaccount.com
DEBUG Fetching project IAM policy
DEBUG candidate members to be removed: [adahiya-2-sw-openshift-i-qffxm@openshift-dev-installer.iam.gserviceaccount.com adahiya-2-sw-openshift-i-wlg6p@openshift-dev-installer.iam.gserviceaccount.com adahiya-2-sw-openshift-m-vwflm@openshift-dev-installer.iam.gserviceaccount.com adahiya-2-sw6z6-m@openshift-dev-installer.iam.gserviceaccount.com adahiya-2-sw6z6-w@openshift-dev-installer.iam.gserviceaccount.com]
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw6z6-m@openshift-dev-installer.iam.gserviceaccount.com?uid=100801591583914315368 from role roles/compute.instanceAdmin
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw-openshift-m-vwflm@openshift-dev-installer.iam.gserviceaccount.com?uid=110019031604106721421 from role roles/compute.instanceAdmin.v1
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw-openshift-m-vwflm@openshift-dev-installer.iam.gserviceaccount.com?uid=110019031604106721421 from role roles/compute.loadBalancerAdmin
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw6z6-m@openshift-dev-installer.iam.gserviceaccount.com?uid=100801591583914315368 from role roles/compute.networkAdmin
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw6z6-m@openshift-dev-installer.iam.gserviceaccount.com?uid=100801591583914315368 from role roles/compute.securityAdmin
DEBUG IAM: removing serviceAccount:adahiya-2-sw6z6-w@openshift-dev-installer.iam.gserviceaccount.com from role roles/compute.viewer
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw-openshift-i-qffxm@openshift-dev-installer.iam.gserviceaccount.com?uid=112353991163409787924 from role roles/dns.admin
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw-openshift-i-wlg6p@openshift-dev-installer.iam.gserviceaccount.com?uid=108044347228815896699 from role roles/iam.serviceAccountUser
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw-openshift-m-vwflm@openshift-dev-installer.iam.gserviceaccount.com?uid=110019031604106721421 from role roles/iam.serviceAccountUser
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw6z6-m@openshift-dev-installer.iam.gserviceaccount.com?uid=100801591583914315368 from role roles/iam.serviceAccountUser
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw-openshift-i-wlg6p@openshift-dev-installer.iam.gserviceaccount.com?uid=108044347228815896699 from role roles/storage.admin
DEBUG IAM: removing deleted:serviceAccount:adahiya-2-sw6z6-m@openshift-dev-installer.iam.gserviceaccount.com?uid=100801591583914315368 from role roles/storage.admin
DEBUG IAM: removing serviceAccount:adahiya-2-sw6z6-w@openshift-dev-installer.iam.gserviceaccount.com from role roles/storage.admin
DEBUG Setting project IAM policy
DEBUG Policy bindings: 1 items pending

It now picks all the member bindings.

@jstuever
Copy link
Contributor

/lgtm
/approve

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Sep 17, 2020
@openshift-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: jstuever

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci-robot openshift-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Sep 17, 2020
@openshift-ci-robot
Copy link
Contributor

@abhinavdahiya: The following tests failed, say /retest to rerun all failed tests:

Test name Commit Details Rerun command
ci/prow/e2e-aws-upgrade f9fd06f link /test e2e-aws-upgrade
ci/prow/e2e-aws f9fd06f link /test e2e-aws
ci/prow/e2e-libvirt f9fd06f link /test e2e-libvirt
ci/prow/e2e-aws-workers-rhel7 f9fd06f link /test e2e-aws-workers-rhel7
ci/prow/e2e-crc f9fd06f link /test e2e-crc
ci/prow/e2e-gcp f9fd06f link /test e2e-gcp

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@abhinavdahiya
Copy link
Contributor Author

The gcp job finished install and had some e2e failure.
Also the destroy logs show all members being pruned.

The aws error seems like not related to this PR since it changes only gcp destroy code. So going to merge to relieve ci.

Merging

@abhinavdahiya abhinavdahiya merged commit 9657944 into openshift:master Sep 17, 2020
@openshift-ci-robot
Copy link
Contributor

@abhinavdahiya: All pull requests linked via external trackers have merged:

Bugzilla bug 1880132 has been moved to the MODIFIED state.

In response to this:

Bug 1880132: destroy/gcp: correct extract service account email from IAM policy binding member

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-cherrypick-robot

@abhinavdahiya: new pull request created: #4195

In response to this:

/cherry-pick release-4.5

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. bugzilla/severity-urgent Referenced Bugzilla bug's severity is urgent for the branch this PR is targeting. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants