Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug 2022813: GCP credentials reporting networksecurity.googleapis.com API disabled #952

Conversation

openshift-cherrypick-robot

This is an automated cherry-pick of #949

/assign wking

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 12, 2021

@openshift-cherrypick-robot: Bugzilla bug 2021731 has been cloned as Bugzilla bug 2022813. Retitling PR to link against new bug.
/retitle [release-4.9] Bug 2022813: GCP credentials reporting networksecurity.googleapis.com API disabled

In response to this:

[release-4.9] Bug 2021731: GCP credentials reporting networksecurity.googleapis.com API disabled

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci openshift-ci bot changed the title [release-4.9] Bug 2021731: GCP credentials reporting networksecurity.googleapis.com API disabled [release-4.9] Bug 2022813: GCP credentials reporting networksecurity.googleapis.com API disabled Nov 12, 2021
@openshift-ci openshift-ci bot added bugzilla/severity-high Referenced Bugzilla bug's severity is high for the branch this PR is targeting. bugzilla/invalid-bug Indicates that a referenced Bugzilla bug is invalid for the branch this PR is targeting. labels Nov 12, 2021
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 12, 2021

@openshift-cherrypick-robot: This pull request references Bugzilla bug 2022813, which is invalid:

  • expected dependent Bugzilla bug 2021731 to be in one of the following states: VERIFIED, RELEASE_PENDING, CLOSED (ERRATA), CLOSED (CURRENTRELEASE), but it is MODIFIED instead

Comment /bugzilla refresh to re-evaluate validity if changes to the Bugzilla bug are made, or edit the title of this pull request to link to a different bug.

In response to this:

[release-4.9] Bug 2022813: GCP credentials reporting networksecurity.googleapis.com API disabled

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@wking
Copy link
Member

wking commented Nov 12, 2021

No need to track 4.9-ness in the PR title; GitHub keeps the target branch as structured metadata.

/retitle Bug 2022813: GCP credentials reporting networksecurity.googleapis.com API disabled

@openshift-ci openshift-ci bot changed the title [release-4.9] Bug 2022813: GCP credentials reporting networksecurity.googleapis.com API disabled Bug 2022813: GCP credentials reporting networksecurity.googleapis.com API disabled Nov 12, 2021
@sdodson
Copy link
Member

sdodson commented Nov 12, 2021

/lgtm
/approve
/label backport-risk-asessed

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 12, 2021

@sdodson: The label(s) /label backport-risk-asessed cannot be applied. These labels are supported: platform/aws, platform/azure, platform/baremetal, platform/google, platform/libvirt, platform/openstack, ga, tide/merge-method-merge, tide/merge-method-rebase, tide/merge-method-squash, px-approved, docs-approved, qe-approved, downstream-change-needed, backport-risk-assessed, cherry-pick-approved

In response to this:

/lgtm
/approve
/label backport-risk-asessed

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Nov 12, 2021
@sdodson sdodson added bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. approved Indicates a PR has been approved by an approver from all required OWNERS files. backport-risk-assessed Indicates a PR to a release branch has been evaluated and considered safe to accept. cherry-pick-approved Indicates a cherry-pick PR into a release branch has been approved by the release branch manager. and removed bugzilla/invalid-bug Indicates that a referenced Bugzilla bug is invalid for the branch this PR is targeting. labels Nov 12, 2021
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 12, 2021

[APPROVALNOTIFIER] This PR is APPROVED

Approval requirements bypassed by manually added approval.

This pull-request has been approved by: sdodson

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@sdodson
Copy link
Member

sdodson commented Nov 12, 2021

This remediates a recent cloud provider change which broke installation, overriding necessary labels to continue the backport process.

@openshift-bot
Copy link
Contributor

/retest-required

Please review the full test history for this PR and help us cut down flakes.

2 similar comments
@openshift-bot
Copy link
Contributor

/retest-required

Please review the full test history for this PR and help us cut down flakes.

@openshift-bot
Copy link
Contributor

/retest-required

Please review the full test history for this PR and help us cut down flakes.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 12, 2021

@openshift-cherrypick-robot: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-azure 8b76b6c link false /test e2e-azure
ci/prow/e2e-gcp-operator 8b76b6c link false /test e2e-gcp-operator

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@openshift-bot
Copy link
Contributor

/retest-required

Please review the full test history for this PR and help us cut down flakes.

1 similar comment
@openshift-bot
Copy link
Contributor

/retest-required

Please review the full test history for this PR and help us cut down flakes.

@sdodson
Copy link
Member

sdodson commented Nov 12, 2021

/override ci/prow/e2e-aws-operator
/override ci/prow/e2e-aws-upgrade
Irrelevant.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 12, 2021

@sdodson: Overrode contexts on behalf of sdodson: ci/prow/e2e-aws-operator, ci/prow/e2e-aws-upgrade

In response to this:

/override ci/prow/e2e-aws-operator
/override ci/prow/e2e-aws-upgrade
Irrelevant.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-merge-robot openshift-merge-robot merged commit 849bd73 into openshift:release-4.9 Nov 12, 2021
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 12, 2021

@openshift-cherrypick-robot: All pull requests linked via external trackers have merged:

Bugzilla bug 2022813 has been moved to the MODIFIED state.

In response to this:

Bug 2022813: GCP credentials reporting networksecurity.googleapis.com API disabled

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. backport-risk-assessed Indicates a PR to a release branch has been evaluated and considered safe to accept. bugzilla/severity-high Referenced Bugzilla bug's severity is high for the branch this PR is targeting. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. cherry-pick-approved Indicates a cherry-pick PR into a release branch has been approved by the release branch manager. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants