Skip to content

Conversation

@AmitSahastra
Copy link
Contributor

@AmitSahastra AmitSahastra commented Sep 26, 2022

State

READY

What is the purpose of the pull request

deletion fails for aws cluster with vpc limit exceeded

Implementation

Issue: In case cluster creation didn't go through due to the VPC limit being exceeded, the VPC ID will be nil and during deletion of the such cluster, the AWS client will give the error.

│ E0907 09:53:16.390472       1 network.go:89] controller/awscluster "msg"="non-fatal: VPC ID is missing, " "error"=null "cluster"="am-cluster-123-4" "name"="am-cluster-123-4" "namespace"="am-cluster-123-4" "reco │
│ nciler group"="infrastructure.cluster.x-k8s.io" "reconciler 

Fix: Check the error code during VPC deletion and skip it if the error code is "MissingParameter"

What type of PR is this?

What this PR does / why we need it:

Which issue(s) this PR fixes (optional, in fixes #<issue number>(, fixes #<issue_number>, ...) format, will close the issue(s) when PR gets merged):
Fixes #

Special notes for your reviewer:

Checklist:

  • squashed commits
  • includes documentation
  • adds unit tests
  • adds or updates e2e tests

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. needs-priority labels Sep 26, 2022
@k8s-ci-robot
Copy link
Contributor

Hi @AmitSahastra. Thanks for your PR.

I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels Sep 26, 2022
@Skarlso
Copy link
Contributor

Skarlso commented Sep 26, 2022

/ok-to-test

Thank you for your contribution! Please include a unit test for your change. :) Thanks!

@k8s-ci-robot k8s-ci-robot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Sep 26, 2022
@Ankitasw
Copy link
Member

/test ?

@k8s-ci-robot
Copy link
Contributor

@Ankitasw: The following commands are available to trigger required jobs:

  • /test pull-cluster-api-provider-aws-build
  • /test pull-cluster-api-provider-aws-test
  • /test pull-cluster-api-provider-aws-verify

The following commands are available to trigger optional jobs:

  • /test pull-cluster-api-provider-aws-apidiff-main
  • /test pull-cluster-api-provider-aws-e2e
  • /test pull-cluster-api-provider-aws-e2e-blocking
  • /test pull-cluster-api-provider-aws-e2e-clusterclass
  • /test pull-cluster-api-provider-aws-e2e-conformance
  • /test pull-cluster-api-provider-aws-e2e-conformance-with-ci-artifacts
  • /test pull-cluster-api-provider-aws-e2e-eks

Use /test all to run the following jobs that were automatically triggered:

  • pull-cluster-api-provider-aws-apidiff-main
  • pull-cluster-api-provider-aws-build
  • pull-cluster-api-provider-aws-test
  • pull-cluster-api-provider-aws-verify

In response to this:

/test ?

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@Ankitasw
Copy link
Member

/test pull-cluster-api-provider-aws-e2e

@richardcase
Copy link
Member

@AmitSahastra - would you be able to add a test to cover this scenario?

@richardcase
Copy link
Member

/milestone v2.0.0

@k8s-ci-robot k8s-ci-robot added this to the v2.0.0 milestone Oct 25, 2022
@Ankitasw
Copy link
Member

@AmitSahastra would you be able to continue with the test scenario?

@AmitSahastra
Copy link
Contributor Author

@AmitSahastra would you be able to continue with the test scenario?

Hi, I am held up with a few things and unable to take time to finish UTs to cover test scenarios. I can close this PR for some time and reopen it with updated tests.

@Ankitasw
Copy link
Member

Ankitasw commented Nov 7, 2022

@richardcase I can raise a separate issue to write E2E test for this scenario, and merge this PR, if that's ok?

@richardcase
Copy link
Member

@Ankitasw - ok, lets go with creating an issue to do the e2e test as a follow-up and get this in

@Ankitasw
Copy link
Member

Ankitasw commented Nov 7, 2022

/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added lgtm "Looks good to me", indicates that a PR is ready to be merged. approved Indicates a PR has been approved by an approver from all required OWNERS files. labels Nov 7, 2022
@Ankitasw
Copy link
Member

Ankitasw commented Nov 7, 2022

@AmitSahastra I think you might have to rebase the PR, I have created separate issue for E2E tests that we can address later, but this needs to fixed now.

@k8s-ci-robot k8s-ci-robot added do-not-merge/contains-merge-commits and removed lgtm "Looks good to me", indicates that a PR is ready to be merged. labels Nov 8, 2022
@AmitSahastra
Copy link
Contributor Author

/test pull-cluster-api-provider-aws-e2e

@AmitSahastra
Copy link
Contributor Author

@Ankitasw have rebased it, pls do review it again.

@Ankitasw
Copy link
Member

Ankitasw commented Nov 8, 2022

Also, please squash the commits.

@AmitSahastra AmitSahastra requested review from Ankitasw and removed request for Skarlso and richardcase November 8, 2022 07:37
@Ankitasw
Copy link
Member

Ankitasw commented Nov 8, 2022

@AmitSahastra thanks will merge it once the prow failures resolve

@Ankitasw
Copy link
Member

Ankitasw commented Nov 8, 2022

@AmitSahastra could you push a blank commit, such that jobs run again?

@Ankitasw
Copy link
Member

Ankitasw commented Nov 8, 2022

/retest

@Ankitasw
Copy link
Member

Ankitasw commented Nov 8, 2022

/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Nov 8, 2022
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: Ankitasw

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot merged commit 86b6f43 into kubernetes-sigs:main Nov 8, 2022
@k8s-ci-robot k8s-ci-robot modified the milestones: v2.0.0, v1.x Nov 8, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. needs-priority ok-to-test Indicates a non-member PR verified by an org member that is safe to test. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants