Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Prow /approve not cleared on push #1215

Closed
tumido opened this issue Apr 30, 2021 · 9 comments
Closed

Prow /approve not cleared on push #1215

tumido opened this issue Apr 30, 2021 · 9 comments
Labels
human_intervention_required kind/bug Categorizes issue or PR as related to a bug.

Comments

@tumido
Copy link
Member

tumido commented Apr 30, 2021

Describe the bug
If a contributor force-pushes or pushes into a PR which has an /approve label on it, this label is not cleared - the approve plugin of Prow doesn't support this. This is in contrast with /lgtm where this label get's cleared. See linked issues for details.

This issue is created to raise awareness of this + seek guidance on how we should use the /approve command... Our current setup merges a PR if there's an approve label, no matter if there's an lgtm.

To Reproduce
See: operate-first/operate-first-twitter#10

Expected behavior
Approve label is either removed or the merge is blocked.

Additional context
Upstream bug (closed as WONTFIX): kubernetes/test-infra#17698
operate-first/operate-first-twitter#7 (comment)

@tumido tumido added the kind/bug Categorizes issue or PR as related to a bug. label Apr 30, 2021
@tumido
Copy link
Member Author

tumido commented Apr 30, 2021

@goern it merged the operate-first/operate-first-twitter#10 PR 😕

@goern
Copy link
Member

goern commented Apr 30, 2021

Well, I would go with kubernetes/test-infra#17698 (comment) Is there a reason we want to deviate from the kubernetes behavior/workflow?

/label triage/needs-information

@sesheta sesheta added the triage/needs-information Indicates an issue needs more information in order to work on it. label Apr 30, 2021
@tumido
Copy link
Member Author

tumido commented Apr 30, 2021

@goern the thing is that we probably don't understand the kubernetes behavior/workflow in detail enough to follow it to point. For me, this behavior is an unpleasant surprise that exposes approved PRs to be exploited to get nonapproved changes into the repo.

This made me think if we have anything to do about this or if we're lacking any documentation in place how we should handle this. I have no idea if there's a code-change required here or rather a policy change or it's just about raising awareness of this and making sure that once a PR is approved it's monitored until merged to make sure there's no commits comming in (which still leaves the loophole exposed, but at least we know about it)...

@tumido
Copy link
Member Author

tumido commented Apr 30, 2021

Since /lgtm gets cleared on commit push, can we make it a requirement for tide to consider a PR for merge? Like configure Tide to merge only if there's both lgtm and approve labels? That would solve the issue I think...

@tumido
Copy link
Member Author

tumido commented Apr 30, 2021

cc @HumairAK @4n4nd @durandom for awareness

@tumido
Copy link
Member Author

tumido commented Apr 30, 2021

attempting to fix this via #1216

@tumido
Copy link
Member Author

tumido commented Apr 30, 2021

It seems the change #1216 worked as intended. At least for operate-first org this is fixed.

Second test PR behaved properly: operate-first/operate-first-twitter#12

@goern goern removed the triage/needs-information Indicates an issue needs more information in order to work on it. label May 25, 2021
@goern
Copy link
Member

goern commented May 25, 2021

From our point of view we should follow the Kubernetes workflows as close as possible, this will give us the highest leverage on using Prow. I will close this on for the moment, if some new requirements come out of the ADR creation, feel free to re-open.

/close

@sesheta
Copy link
Member

sesheta commented May 25, 2021

@goern: Closing this issue.

In response to this:

From our point of view we should follow the Kubernetes workflows as close as possible, this will give us the highest leverage on using Prow. I will close this on for the moment, if some new requirements come out of the ADR creation, feel free to re-open.

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@sesheta sesheta closed this as completed May 25, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
human_intervention_required kind/bug Categorizes issue or PR as related to a bug.
Projects
None yet
Development

No branches or pull requests

3 participants