-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
🐛 Ensure all GitHub releases are fetched when searching provider versions #8240
🐛 Ensure all GitHub releases are fetched when searching provider versions #8240
Conversation
Hi @abhay-krishna. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
cc005d0
to
58218ec
Compare
58218ec
to
beff6dc
Compare
4b6c891
to
b24dbc9
Compare
2e01f37
to
ba7016e
Compare
2dcfdd5
to
cd146bf
Compare
@sbueringer @ykakarap If I rebase and push, it'll remove the |
I don't see any conflicts and looks like all the commits are squashed. Is there a need to rebase? |
/assign @fabriziopandini |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/approve
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: CecileRobertMichon The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@CecileRobertMichon @ykakarap Does it make sense to backport this as a bug fix? |
@sbueringer You didn't ask for my opinion, but here it is anyways :) @killianmuldoon said in the issue description:
That suggests a backport to the set of branches that can cut patch releases for "supported versions", right? |
Always appreciated :) Sounds good |
/cherry-pick release-1.4 |
/cherry-pick release-1.3 |
/cherry-pick release-1.2 |
@sbueringer: new pull request created: #8329 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@sbueringer: #8240 failed to apply on top of branch "release-1.3":
In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@sbueringer: #8240 failed to apply on top of branch "release-1.2":
In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Would be great if someone can create cherry-picks for 1.3 and 1.2 |
1.3 is merging now, this leaves 1.2 |
I can do the release-1.2 cherry-pick. |
/area clusterctl |
What this PR does / why we need it:
This PR improves the logic of fetching GitHub releases when looking for versions in provider repositories. The
ListReleases
API call is paginated and returns only the latest 30 releases. So we need to issue multiple calls in series to fetch all releases for a repository.Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes #8233 (NOTE: This PR handles only GitHub, it doesn't include a GitLab fix.)