Skip to content

Conversation

@barbacbd
Copy link
Contributor

No description provided.

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Oct 15, 2025
@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Oct 15, 2025

@barbacbd: This pull request references CORS-4259 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.21.0" version, but no target version was set.

In response to this:

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@barbacbd
Copy link
Contributor Author

/hold

This will require changes to CAPG version 1.10.x

@openshift-ci openshift-ci bot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Oct 15, 2025
@barbacbd
Copy link
Contributor Author

/hold cancel

@openshift-ci openshift-ci bot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Oct 16, 2025
@barbacbd barbacbd changed the title CORS-4259: Move the gcp permission check to a common file in install config. CORS-4259, CORS-4260: Move the gcp permission check to a common file in install config. Oct 16, 2025
@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Oct 16, 2025

@barbacbd: This pull request references CORS-4259 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.21.0" version, but no target version was set.

This pull request references CORS-4260 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.21.0" version, but no target version was set.

In response to this:

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@barbacbd
Copy link
Contributor Author

/jira refresh

@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Oct 16, 2025

@barbacbd: This pull request references CORS-4259 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.21.0" version, but no target version was set.

This pull request references CORS-4260 which is a valid jira issue.

In response to this:

/jira refresh

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@barbacbd
Copy link
Contributor Author

/jira refresh

@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Oct 16, 2025

@barbacbd: This pull request references CORS-4259 which is a valid jira issue.

This pull request references CORS-4260 which is a valid jira issue.

In response to this:

/jira refresh

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@barbacbd
Copy link
Contributor Author

/retest-required

@barbacbd
Copy link
Contributor Author

/retest-required

Copy link
Member

@tthvo tthvo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code looks good to me!

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Oct 23, 2025
@patrickdillon
Copy link
Contributor

/approve

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Oct 27, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: patrickdillon

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Oct 27, 2025
@tthvo
Copy link
Member

tthvo commented Nov 3, 2025

/retest

@openshift-merge-robot openshift-merge-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Nov 3, 2025
@openshift-ci openshift-ci bot removed the lgtm Indicates that a PR is ready to be merged. label Nov 4, 2025
Comment on lines 147 to 149
if p.FirewallRulesManagement == gcp.UnmanagedFirewallRules && p.Network == "" {
allErrs = append(allErrs, field.Required(fldPath.Child("network"), "a network must be specified when firewall rules are unmanaged"))
}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we also need a static validation check to make sure the user input is valid (i.e. equals Managed or Unmanaged) correct me if that's already handled but I think we need to add it explicitly

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm fine handling that in a follow up PR

@barbacbd
Copy link
Contributor Author

/retest-required

pkg/types/gcp/platform.go:

Add FirewallManagementPolicy. The policy will indicate whether the cluster or user
will manage the firewall rules.

Add validation to ensure that a network is provided when the install config
is set to Unmanaged to FirewallManagement.

pkg/types/gcp/metadata.go:

Add the management policy to the metadata so that the bootstrap destroy process
knows whether to delete the bootstrap firewall rules or not.

// validateFirewallPermissions validates that the user has firewall permissions OR when the user does not have
// permissions to create firewall rules then a network is specified.
func validateFirewallPermissions(client API, ic *types.InstallConfig, fieldPath *field.Path) field.ErrorList {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we still need this validation (or something close to it) to ensure that users that don't have firewall rules have set Unmanaged. We can do that in a follow up PR

@patrickdillon
Copy link
Contributor

/lgtm

Let's add the permission check validation in a follow up PR.

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Nov 21, 2025
Copy link
Member

@tthvo tthvo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

+1 for validations (but in another PR). I repeated the same install step and the installation worked as expected 🥳

@patrickdillon
Copy link
Contributor

/verified by @patrickdillon
local testing

@patrickdillon
Copy link
Contributor

/skip

@openshift-ci-robot openshift-ci-robot added the verified Signifies that the PR passed pre-merge verification criteria label Nov 21, 2025
@openshift-ci-robot
Copy link
Contributor

@patrickdillon: This PR has been marked as verified by @patrickdillon.

In response to this:

/verified by @patrickdillon
local testing

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@patrickdillon
Copy link
Contributor

/override ci/prow-e2e-aws-ovn ci/prow/e2e-aws-ovn-edge-zones-manifest-validation

Not relevant tests, with unrelated failures

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 21, 2025

@patrickdillon: /override requires failed status contexts, check run or a prowjob name to operate on.
The following unknown contexts/checkruns were given:

  • ci/prow-e2e-aws-ovn

Only the following failed contexts/checkruns were expected:

  • ci/prow/artifacts-images
  • ci/prow/aws-private
  • ci/prow/azure-ovn-marketplace-images
  • ci/prow/azure-private
  • ci/prow/e2e-aws-byo-subnet-role-security-groups
  • ci/prow/e2e-aws-default-config
  • ci/prow/e2e-aws-ovn
  • ci/prow/e2e-aws-ovn-edge-zones
  • ci/prow/e2e-aws-ovn-edge-zones-manifest-validation
  • ci/prow/e2e-aws-ovn-fips
  • ci/prow/e2e-aws-ovn-heterogeneous
  • ci/prow/e2e-aws-ovn-imdsv2
  • ci/prow/e2e-aws-ovn-shared-vpc-custom-security-groups
  • ci/prow/e2e-aws-ovn-shared-vpc-edge-zones
  • ci/prow/e2e-aws-ovn-single-node
  • ci/prow/e2e-azure-default-config
  • ci/prow/e2e-azure-ovn
  • ci/prow/e2e-azure-ovn-shared-vpc
  • ci/prow/e2e-azurestack
  • ci/prow/e2e-gcp-custom-dns
  • ci/prow/e2e-gcp-custom-endpoints
  • ci/prow/e2e-gcp-default-config
  • ci/prow/e2e-gcp-ovn
  • ci/prow/e2e-gcp-ovn-byo-vpc
  • ci/prow/e2e-gcp-ovn-xpn
  • ci/prow/e2e-gcp-secureboot
  • ci/prow/e2e-gcp-xpn-dedicated-dns-project
  • ci/prow/gcp-private
  • ci/prow/gofmt
  • ci/prow/golint
  • ci/prow/govet
  • ci/prow/images
  • ci/prow/okd-scos-e2e-vsphere-ovn
  • ci/prow/okd-scos-images
  • ci/prow/shellcheck
  • ci/prow/unit
  • ci/prow/verify-codegen
  • ci/prow/verify-deps
  • ci/prow/verify-vendor
  • ci/prow/yaml-lint
  • pull-ci-openshift-installer-fcos-gofmt
  • pull-ci-openshift-installer-fcos-golint
  • pull-ci-openshift-installer-fcos-govet
  • pull-ci-openshift-installer-fcos-images
  • pull-ci-openshift-installer-fcos-unit
  • pull-ci-openshift-installer-fcos-verify-codegen
  • pull-ci-openshift-installer-fcos-verify-vendor
  • pull-ci-openshift-installer-main-artifacts-images
  • pull-ci-openshift-installer-main-aws-private
  • pull-ci-openshift-installer-main-azure-ovn-marketplace-images
  • pull-ci-openshift-installer-main-azure-private
  • pull-ci-openshift-installer-main-e2e-aws-byo-subnet-role-security-groups
  • pull-ci-openshift-installer-main-e2e-aws-default-config
  • pull-ci-openshift-installer-main-e2e-aws-ovn
  • pull-ci-openshift-installer-main-e2e-aws-ovn-edge-zones
  • pull-ci-openshift-installer-main-e2e-aws-ovn-edge-zones-manifest-validation
  • pull-ci-openshift-installer-main-e2e-aws-ovn-fips
  • pull-ci-openshift-installer-main-e2e-aws-ovn-heterogeneous
  • pull-ci-openshift-installer-main-e2e-aws-ovn-imdsv2
  • pull-ci-openshift-installer-main-e2e-aws-ovn-shared-vpc-custom-security-groups
  • pull-ci-openshift-installer-main-e2e-aws-ovn-shared-vpc-edge-zones
  • pull-ci-openshift-installer-main-e2e-aws-ovn-single-node
  • pull-ci-openshift-installer-main-e2e-azure-default-config
  • pull-ci-openshift-installer-main-e2e-azure-ovn
  • pull-ci-openshift-installer-main-e2e-azure-ovn-shared-vpc
  • pull-ci-openshift-installer-main-e2e-azurestack
  • pull-ci-openshift-installer-main-e2e-gcp-custom-dns
  • pull-ci-openshift-installer-main-e2e-gcp-custom-endpoints
  • pull-ci-openshift-installer-main-e2e-gcp-default-config
  • pull-ci-openshift-installer-main-e2e-gcp-ovn
  • pull-ci-openshift-installer-main-e2e-gcp-ovn-byo-vpc
  • pull-ci-openshift-installer-main-e2e-gcp-ovn-xpn
  • pull-ci-openshift-installer-main-e2e-gcp-secureboot
  • pull-ci-openshift-installer-main-e2e-gcp-xpn-dedicated-dns-project
  • pull-ci-openshift-installer-main-gcp-private
  • pull-ci-openshift-installer-main-okd-scos-e2e-vsphere-ovn
  • pull-ci-openshift-installer-main-okd-scos-images
  • pull-ci-openshift-installer-main-shellcheck
  • pull-ci-openshift-installer-main-verify-deps
  • pull-ci-openshift-installer-main-yaml-lint
  • tide

If you are trying to override a checkrun that has a space in it, you must put a double quote on the context.

In response to this:

/override ci/prow-e2e-aws-ovn ci/prow/e2e-aws-ovn-edge-zones-manifest-validation

Not relevant tests, with unrelated failures

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@tthvo
Copy link
Member

tthvo commented Nov 21, 2025

/override ci/prow/e2e-aws-ovn

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 21, 2025

@tthvo: Overrode contexts on behalf of tthvo: ci/prow/e2e-aws-ovn

In response to this:

/override ci/prow/e2e-aws-ovn

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@tthvo
Copy link
Member

tthvo commented Nov 21, 2025

/override ci/prow/e2e-aws-ovn-edge-zones-manifest-validation

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 21, 2025

@tthvo: Overrode contexts on behalf of tthvo: ci/prow/e2e-aws-ovn-edge-zones-manifest-validation

In response to this:

/override ci/prow/e2e-aws-ovn-edge-zones-manifest-validation

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 21, 2025

@barbacbd: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/okd-scos-e2e-aws-ovn c30cc1a link false /test okd-scos-e2e-aws-ovn
ci/prow/e2e-aws-default-config 3833cec link false /test e2e-aws-default-config
ci/prow/aws-private 3833cec link false /test aws-private
ci/prow/e2e-azurestack 3833cec link false /test e2e-azurestack
ci/prow/e2e-aws-ovn-single-node 3833cec link false /test e2e-aws-ovn-single-node
ci/prow/e2e-aws-ovn-shared-vpc-custom-security-groups 3833cec link false /test e2e-aws-ovn-shared-vpc-custom-security-groups
ci/prow/e2e-aws-ovn-shared-vpc-edge-zones 3833cec link false /test e2e-aws-ovn-shared-vpc-edge-zones
ci/prow/e2e-aws-ovn-edge-zones 3833cec link false /test e2e-aws-ovn-edge-zones
ci/prow/e2e-aws-byo-subnet-role-security-groups 3833cec link false /test e2e-aws-byo-subnet-role-security-groups
ci/prow/e2e-aws-ovn-fips 3833cec link false /test e2e-aws-ovn-fips
ci/prow/e2e-gcp-custom-dns 3833cec link false /test e2e-gcp-custom-dns
ci/prow/e2e-aws-ovn-imdsv2 3833cec link false /test e2e-aws-ovn-imdsv2
ci/prow/e2e-aws-ovn-heterogeneous 3833cec link false /test e2e-aws-ovn-heterogeneous
ci/prow/e2e-gcp-xpn-dedicated-dns-project 3833cec link false /test e2e-gcp-xpn-dedicated-dns-project
ci/prow/okd-scos-e2e-vsphere-ovn 3833cec link false /test okd-scos-e2e-vsphere-ovn
ci/prow/e2e-azure-ovn-shared-vpc 3833cec link false /test e2e-azure-ovn-shared-vpc

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@openshift-ci-robot
Copy link
Contributor

/retest-required

Remaining retests: 0 against base HEAD 386dca3 and 2 for PR HEAD 3833cec in total

@patrickdillon
Copy link
Contributor

/override ci/prow/e2e-aws-ovn ci/prow/e2e-aws-ovn-edge-zones-manifest-validation

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 22, 2025

@patrickdillon: Overrode contexts on behalf of patrickdillon: ci/prow/e2e-aws-ovn, ci/prow/e2e-aws-ovn-edge-zones-manifest-validation

In response to this:

/override ci/prow/e2e-aws-ovn ci/prow/e2e-aws-ovn-edge-zones-manifest-validation

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@patrickdillon
Copy link
Contributor

/override ci/prow/e2e-azure-ovn

test passed

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 22, 2025

@patrickdillon: Overrode contexts on behalf of patrickdillon: ci/prow/e2e-azure-ovn

In response to this:

/override ci/prow/e2e-azure-ovn

test passed

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@patrickdillon
Copy link
Contributor

/override ci/prow/e2e-aws-ovn

job is irrelevant and permafailing due to rhel repo causing baremetal build failure

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 22, 2025

@patrickdillon: Overrode contexts on behalf of patrickdillon: ci/prow/e2e-aws-ovn

In response to this:

/override ci/prow/e2e-aws-ovn

job is irrelevant and permafailing due to rhel repo causing baremetal build failure

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@patrickdillon
Copy link
Contributor

/override ci/prow/e2e-aws-ovn ci/prow/e2e-aws-ovn-edge-zones-manifest-validation

job is irrelevant and permafailing due to rhel repo causing baremetal build failure

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 22, 2025

@patrickdillon: Overrode contexts on behalf of patrickdillon: ci/prow/e2e-aws-ovn, ci/prow/e2e-aws-ovn-edge-zones-manifest-validation

In response to this:

/override ci/prow/e2e-aws-ovn ci/prow/e2e-aws-ovn-edge-zones-manifest-validation

job is irrelevant and permafailing due to rhel repo causing baremetal build failure

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@openshift-merge-bot openshift-merge-bot bot merged commit 64cc933 into openshift:main Nov 22, 2025
41 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged. verified Signifies that the PR passed pre-merge verification criteria

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants