Skip to content

Conversation

@ack-bot
Copy link
Collaborator

@ack-bot ack-bot commented Nov 23, 2025

Update to ACK runtime v0.54.1, code-generator v0.54.0



NOTE:
This PR increments the release version of service controller from v1.3.1 to v1.3.2

Once this PR is merged, release v1.3.2 will be automatically created for cloudwatch-controller

Please close this PR, if you do not want the new patch release for cloudwatch-controller


stdout for make build-controller:

building ack-generate ... ok.
==== building cloudwatch-controller ====
Copying common custom resource definitions into cloudwatch
Building Kubernetes API objects for cloudwatch
Generating deepcopy code for cloudwatch
Generating custom resource definitions for cloudwatch
Building service controller for cloudwatch
Running GO mod tidy
Generating RBAC manifests for cloudwatch
Running gofmt against generated code for cloudwatch
Updating additional GitHub repository maintenance files
==== building cloudwatch-controller release artifacts ====
Building release artifacts for cloudwatch-v1.3.2
Generating common custom resource definitions
Generating custom resource definitions for cloudwatch
Generating RBAC manifests for cloudwatch

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

@ack-bot ack-bot added the prow/auto-gen PRs related to prow auto generation automation label Nov 23, 2025
@ack-prow ack-prow bot requested review from a-hilaly and knottnt November 23, 2025 09:18
@ack-prow
Copy link

ack-prow bot commented Nov 23, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: ack-bot
Once this PR has been reviewed and has the lgtm label, please assign a-hilaly for approval by writing /assign @a-hilaly in a comment. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment


jobs:
call-hydrate-go-proxy:
uses: aws-controllers-k8s/.github/.github/workflows/reusable-postsubmit.yaml@main

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Copilot Autofix

AI 5 days ago

To fix the problem, add an explicit permissions key to the root of the workflow or to the job definition in .github/workflows/postsubmit.yaml. As a delegator workflow, the minimal starting point is to use the most restrictive option, which is permissions: {} at the root level. This ensures the GITHUB_TOKEN has no permissions (unless the called workflow/job needs more; then you would grant only what's required). The recommended least-privilege block for delegator workflows is:

permissions: {}

This should be added after the name: and before on: (or before jobs:), applying to all jobs by default.


Suggested changeset 1
.github/workflows/postsubmit.yaml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/postsubmit.yaml b/.github/workflows/postsubmit.yaml
--- a/.github/workflows/postsubmit.yaml
+++ b/.github/workflows/postsubmit.yaml
@@ -1,4 +1,5 @@
 name: Hydrate Go Proxy
+permissions: {}
 
 on:
   push:
EOF
@@ -1,4 +1,5 @@
name: Hydrate Go Proxy
permissions: {}

on:
push:
Copilot is powered by AI and may make mistakes. Always verify output.
@ack-prow
Copy link

ack-prow bot commented Nov 23, 2025

@ack-bot: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
cloudwatch-verify-code-gen d5e8fd9 link false /test cloudwatch-verify-code-gen

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

prow/auto-gen PRs related to prow auto generation automation

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant