-
Notifications
You must be signed in to change notification settings - Fork 9.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
go get cloud.google.com/go/[email protected] #32203
Conversation
Replacing this PR where I updated more dependencies than necessary: #32202 |
I'm not sure what the solution is for the failing consistency test is (I've run make generate & make protobuf) - requested review for a bit of help! |
Hi @SarahFrench! I'm just looking at the consistency check failure here first, since I don't think I have sufficient context to do a broader review of this (I'm not really familiar with the GCP backend). I think we've run into something like this before when making changes to our protobuf tooling. I think what's happening here is that we have two different tools with different opinions about what this generated code ought to look like:
I think we'll need to eventually fix this properly by making the protobuf generation script also run the Go formatter on its results so that it's always generating code that will pass formatting. In the meantime though, I looked back at the last PR where I encountered this (#31655) and it looks like I made it work by running |
7843110
to
01152a8
Compare
I just force pushed new commits after I checked out the latest commit on main (I preferred that idea vs handling merge conflicts in go.sum etc) and ran these commands using go1.19.3.
I think me upgrading to go 1.19 helps with the issue above that led to failing checks- when I run I'll wait to see if the checks on this PR want me to run |
@apparentlymart - Thanks for posting the above context, I wasn't aware of differences in Go 1.19's fmt! After I upgraded from 1.18 to 1.19 locally I've been able to get the current consistency checks to be happy 😀 Also, I believe that bumping this dependency is enough to address the issue I linked in the PR description and no further code changes are needed. The existing acceptance tests for the gcs backend pass when they are run off this PR's branch, so I don't think there's any need for a broader review that required knowledge of the gcs backend. Is it ok for me to merge these changes into main? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not familiar enough with the GCP backend to be able to review this beyond the shallow level of "yes, this does indeed upgrade this dependency to v1.28.0" 😀 but I trust that you've tested it in the ways that make sense for this backend and so I've no objection to merging it.
In terms of testing I've:
I've edited the release note to be more conservative and just describe the release bump instead of the expected result that it helps with the issue linked in the PR description. I think there should still be a release note as the change is possibly user-facing if it fixes that issue. With all this I'm as confident as I can be that the dependency bump isn't going to cause issues, and I've tried to avoid over promising the bump's effect on GCP identity federation (as I don't have the resources to test that fully). |
Reminder for the merging maintainer: if this is a user-visible change, please update the changelog on the appropriate release branch. |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active contributions. |
Bumping the version of the
cloud.google.com/go/storage
dependency, used in thegcs
backend.This upgrade should allow users to use GCP identity federation, described in the linked issue below:
Possible fix for #29656
Replaces this out-dated PR: #30276
Target Release
1.3.x, 1.4.x
Draft CHANGELOG entry
ENHANCEMENTS