Closed knabben closed 6 days ago
Hi @knabben. Thanks for your PR.
I'm waiting for a kubernetes-csi member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test
on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.
Once the patch is verified, the new status will be reflected by the ok-to-test
label.
I understand the commands that are listed here.
/assign @mauriciopoppe
/ok-to-test
@jsturtevant: Cannot trigger testing until a trusted user reviews the PR and leaves an /ok-to-test
message.
/ok-to-test
I believe CI is failing because the kubernetes startup script on GCE instances is not working for Windows, cc @anishshah
I had filed kubernetes/kubernetes#124047 to track sig-windows-gce test job failures.
/retest
@mauriciopoppe any news in the gcp windows testing?
Thanks for following up, our CI infra is up and running but a presubmit within Github Actions failed with tests unrelated with this change:
=== RUN TestSmbAPIGroup/v1alpha1SmbTests
smb_v1alpha1_test.go:30: TestSmbAPIGroup setupUser failed: exit status 1, output: "ConvertTo-SecureString : The 'ConvertTo-SecureString' command was found in the module 'Microsoft.PowerShell.Security', \r\nbut the module could not be loaded. For more information, run 'Import-Module Microsoft.PowerShell.Security'.\r\nAt line:1 char:10\r\n+ $PWord = ConvertTo-SecureString $Env:password -AsPlainText -Force;New ...\r\n+ ~~~~~~~~~~~~~~~~~~~~~~\r\n + CategoryInfo : ObjectNotFound: (ConvertTo-SecureString:String) [], CommandNotFoundException\r\n + FullyQualifiedErrorId : CouldNotAutoloadMatchingModule\r\n \r\nNew-LocalUser : Cannot validate argument on parameter 'Password'. The argument is null. Provide a valid value for the \r\nargument, and then try running the command again.\r\nAt line:1 char:132\r\n+ ... w-Localuser -name $Env:username -accountneverexpires*** ~~~~~~\r\n + CategoryInfo : InvalidData: (:) [New-LocalUser], ParameterBindingValidationException\r\n + FullyQualifiedErrorId : ParameterArgumentValidationError,Microsoft.PowerShell.Commands.NewLocalUserCommand\r\n \r\n"
The failure above (only CI setup in Github actions) would need to be fixed in another PR and then we can retrigger presubmit tests in this PR to finally get it merged.
The Kubernetes project currently lacks enough contributors to adequately respond to all PRs.
This bot triages PRs according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the PR is closedYou can:
/remove-lifecycle stale
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
/remove-lifecycle stale
Closing and reopening to trigger presubmit checks.
/lgtm /approved
/approve
[APPROVALNOTIFIER] This PR is APPROVED
This pull-request has been approved by: knabben, mauriciopoppe
The full list of commands accepted by this bot can be found here.
The pull request process is described here
/retest
Seems like Prow is refusing to merge because of a Github Action run that's obsolete but that it's still considering for merge
Failing closed after maximum retry is achieved to avoid inf recursion error integration_tests (1.20, windows-latest) https://github.com/kubernetes-csi/csi-proxy/actions/runs/9211146453/job/26152630597
@knabben would it be possible to force push a new commit without any changes? I think that'd force Prow to check new Github Action runs.
/lgtm
/hold
Would it be possible to squash the commits? I think we should be able to cherrypick the commit to the library branch for CSI Proxy v2 after that.
/remove hold /lgtm
/remove-hold
What type of PR is this?
What this PR does / why we need it: Adding a maximum retry for the CSI to find the volume target from a mountpath.
Which issue(s) this PR fixes:
Fixes #193
Special notes for your reviewer: Tracking the recursion call trace here: https://github.com/kubernetes-csi/csi-proxy/issues/193#issuecomment-2059665463
Does this PR introduce a user-facing change?: