Skip to content

Conversation

@cloud-team-rebase-bot
Copy link

No description provided.

sbueringer and others added 30 commits October 30, 2025 16:47
…concileUnhealthyMachines

Signed-off-by: Stefan Büringer buringerst@vmware.com
…machines-flake

🌱 Fix flakes in syncMachines unit test
…flake-race

🌱 Fix race conditions with global scheme in TestMachineSetReconciler_reconcileUnhealthyMachines
Signed-off-by: Lennart Jern <lennart.jern@est.tech>
* Call new lifecycle hooks for chained-upgrades

* Address comments

* More feedback
…12903)

* call GenerateUpgradePlanRequest Runtime Extension

Signed-off-by: sivchari <shibuuuu5@gmail.com>

* add unit test for UpgradePlan extension

Signed-off-by: sivchari <shibuuuu5@gmail.com>

* fix lint error

Signed-off-by: sivchari <shibuuuu5@gmail.com>

* fix review findings

Signed-off-by: sivchari <shibuuuu5@gmail.com>

---------

Signed-off-by: sivchari <shibuuuu5@gmail.com>
…yflake

🌱 add DisableCertPrivateKey function for clustercache for test flake
…c-reconcile

🌱 machinehealthcheck: no longer requeue when remediation is not allowed
…ecreate-container-if-not-running

🌱 CAPD: recreate container if we re-enter reconciliation and it exists but is not running
…-doc-timeouts

📖 Document e2e test timeout changes in v1.11-to-v1.12 migration doc
✨ Add EncryptionAlgorithm to Kubeadmconfig
…he-after-apply

🌱 Add items to cache immediately after apply
Signed-off-by: Alexandr Demicev <alexandr.demicev@suse.com>
… 3 updates

Bumps the all-go-mod-patch-and-minor group with 1 update in the / directory: [sigs.k8s.io/controller-runtime](https://github.com/kubernetes-sigs/controller-runtime).
Bumps the all-go-mod-patch-and-minor group with 3 updates in the /hack/tools directory: [sigs.k8s.io/controller-runtime](https://github.com/kubernetes-sigs/controller-runtime), [cloud.google.com/go/storage](https://github.com/googleapis/google-cloud-go) and [google.golang.org/api](https://github.com/googleapis/google-api-go-client).
Bumps the all-go-mod-patch-and-minor group with 1 update in the /test directory: [sigs.k8s.io/controller-runtime](https://github.com/kubernetes-sigs/controller-runtime).


Updates `sigs.k8s.io/controller-runtime` from 0.22.3 to 0.22.4
- [Release notes](https://github.com/kubernetes-sigs/controller-runtime/releases)
- [Changelog](https://github.com/kubernetes-sigs/controller-runtime/blob/main/RELEASE.md)
- [Commits](kubernetes-sigs/controller-runtime@v0.22.3...v0.22.4)

Updates `sigs.k8s.io/controller-runtime` from 0.22.3 to 0.22.4
- [Release notes](https://github.com/kubernetes-sigs/controller-runtime/releases)
- [Changelog](https://github.com/kubernetes-sigs/controller-runtime/blob/main/RELEASE.md)
- [Commits](kubernetes-sigs/controller-runtime@v0.22.3...v0.22.4)

Updates `cloud.google.com/go/storage` from 1.57.0 to 1.57.1
- [Release notes](https://github.com/googleapis/google-cloud-go/releases)
- [Changelog](https://github.com/googleapis/google-cloud-go/blob/main/CHANGES.md)
- [Commits](googleapis/google-cloud-go@spanner/v1.57.0...storage/v1.57.1)

Updates `google.golang.org/api` from 0.253.0 to 0.254.0
- [Release notes](https://github.com/googleapis/google-api-go-client/releases)
- [Changelog](https://github.com/googleapis/google-api-go-client/blob/main/CHANGES.md)
- [Commits](googleapis/google-api-go-client@v0.253.0...v0.254.0)

Updates `sigs.k8s.io/controller-runtime` from 0.22.3 to 0.22.4
- [Release notes](https://github.com/kubernetes-sigs/controller-runtime/releases)
- [Changelog](https://github.com/kubernetes-sigs/controller-runtime/blob/main/RELEASE.md)
- [Commits](kubernetes-sigs/controller-runtime@v0.22.3...v0.22.4)

---
updated-dependencies:
- dependency-name: sigs.k8s.io/controller-runtime
  dependency-version: 0.22.4
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all-go-mod-patch-and-minor
- dependency-name: sigs.k8s.io/controller-runtime
  dependency-version: 0.22.4
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all-go-mod-patch-and-minor
- dependency-name: cloud.google.com/go/storage
  dependency-version: 1.57.1
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all-go-mod-patch-and-minor
- dependency-name: google.golang.org/api
  dependency-version: 0.254.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: all-go-mod-patch-and-minor
- dependency-name: sigs.k8s.io/controller-runtime
  dependency-version: 0.22.4
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: all-go-mod-patch-and-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
🌱 Check for error before checking reconcile result
…bot/go_modules/all-go-mod-patch-and-minor-a3eca44266

🌱 Bump the all-go-mod-patch-and-minor group across 3 directories with 3 updates
…necontroller

✨ Add in-place updates support for machine controller
Signed-off-by: Stefan Büringer buringerst@vmware.com
Signed-off-by: Stefan Büringer buringerst@vmware.com
…ating-to-machine-ready

🌱 Consider updating condition when computing Machine's ready condition
* add-in-place-to-machineset-controller

* Fix review findings

Signed-off-by: Stefan Büringer buringerst@vmware.com

* Address comments

---------

Signed-off-by: Stefan Büringer buringerst@vmware.com
Co-authored-by: Stefan Bueringer <buringerst@vmware.com>
…pdating-phase

🌱 Implement Updating Machine phase
@openshift-ci openshift-ci bot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Dec 11, 2025
@openshift-ci
Copy link

openshift-ci bot commented Dec 11, 2025

Hi @cloud-team-rebase-bot[bot]. Thanks for your PR.

I'm waiting for a github.com member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@openshift-ci openshift-ci bot requested review from chrischdi and mdbooth December 11, 2025 12:13
@openshift-ci
Copy link

openshift-ci bot commented Dec 11, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: cloud-team-rebase-bot[bot]
Once this PR has been reviewed and has the lgtm label, please assign radekmanak for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the do-not-merge/invalid-owners-file Indicates that a PR should not merge because it has an invalid OWNERS file in it. label Dec 11, 2025
@damdo
Copy link
Member

damdo commented Dec 11, 2025

/ok-to-test

@openshift-ci openshift-ci bot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Dec 11, 2025
@damdo
Copy link
Member

damdo commented Dec 12, 2025

This is failing because the core CAPI manifests need updating

invalid argument "MachinePool=true,ClusterResourceSet=true,ClusterTopology=false,RuntimeSDK=false,MachineSetPreflightChecks=false" for "--feature-gates" flag: unrecognized feature gate: ClusterResourceSet

ref:
https://gcsweb-ci.apps.ci.l2s4.p1.openshiftapps.com/gcs/test-platform-results/pr-logs/pull/openshift_cluster-api/255/pull-ci-openshift-cluster-api-master-e2e-gcp-capi-techpreview/1999154317008834560/artifacts/e2e-gcp-capi-techpreview/gather-extra/artifacts/pods/openshift-cluster-api_capi-controller-manager-6889b9f8d4-wm6pt_manager.log

@damdo damdo force-pushed the rebase-bot-master branch from 03150af to a7cb6fa Compare December 12, 2025 20:20
@damdo
Copy link
Member

damdo commented Dec 12, 2025

/label rebase/manual

@openshift-ci openshift-ci bot added the rebase/manual Indicates the PR should not be rebased by the rebasebot. label Dec 12, 2025
@damdo
Copy link
Member

damdo commented Dec 12, 2025

Updated here: e8611ec

@openshift-ci
Copy link

openshift-ci bot commented Dec 12, 2025

The following users are mentioned in OWNERS file(s) but are untrusted for the following reasons. One way to make the user trusted is to add them as members of the openshift org. You can then trigger verification by writing /verify-owners in a comment.

  • cluster-api-reviewers
    • User is not a member of the org. User is not a collaborator. Satisfy at least one of these conditions to make the user trusted.
  • cluster-api-machinepool-reviewers
    • User is not a member of the org. User is not a collaborator. Satisfy at least one of these conditions to make the user trusted.
  • cluster-api-machinepool-maintainers
    • User is not a member of the org. User is not a collaborator. Satisfy at least one of these conditions to make the user trusted.

@damdo
Copy link
Member

damdo commented Dec 16, 2025

/test e2e-aws-capi-techpreview e2e-aws-serial-1of2

@openshift-ci
Copy link

openshift-ci bot commented Dec 16, 2025

@cloud-team-rebase-bot[bot]: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-aws-capi-techpreview a7cb6fa link true /test e2e-aws-capi-techpreview

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@damdo
Copy link
Member

damdo commented Dec 16, 2025

I think the change in kubernetes-sigs#12959 (which this bump brings in)
broke some assumptions in our e2e around deletion propagation.
I am investigating

@openshift-merge-robot openshift-merge-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Dec 21, 2025
@openshift-merge-robot
Copy link

PR needs rebase.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

do-not-merge/invalid-owners-file Indicates that a PR should not merge because it has an invalid OWNERS file in it. needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. rebase/manual Indicates the PR should not be rebased by the rebasebot.

Projects

None yet

Development

Successfully merging this pull request may close these issues.