Skip to content

Conversation

@ack-bot
Copy link
Collaborator

@ack-bot ack-bot commented Nov 29, 2025

Update to ACK runtime v0.56.0, code-generator v0.56.0



NOTE:
This PR increments the release version of service controller from v1.2.2 to v1.3.0

Once this PR is merged, release v1.3.0 will be automatically created for sqs-controller

Please close this PR, if you do not want the new patch release for sqs-controller


stdout for make build-controller:

building ack-generate ... ok.
==== building sqs-controller ====
Copying common custom resource definitions into sqs
Building Kubernetes API objects for sqs
Generating deepcopy code for sqs
Generating custom resource definitions for sqs
Building service controller for sqs
Running GO mod tidy
Generating RBAC manifests for sqs
Running gofmt against generated code for sqs
Updating additional GitHub repository maintenance files
==== building sqs-controller release artifacts ====
Building release artifacts for sqs-v1.3.0
Generating common custom resource definitions
Generating custom resource definitions for sqs
Generating RBAC manifests for sqs

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

@ack-bot ack-bot added the prow/auto-gen PRs related to prow auto generation automation label Nov 29, 2025
@ack-prow ack-prow bot requested review from michaelhtm and rushmash91 November 29, 2025 03:37

jobs:
call-hydrate-go-proxy:
uses: aws-controllers-k8s/.github/.github/workflows/reusable-postsubmit.yaml@main

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Copilot Autofix

AI 4 days ago

The best fix is to explicitly set the permissions block for all jobs in this workflow, following the principle of least privilege. Since this workflow triggers on push to main and the only job present is a call to a reusable workflow, the likely minimum required is contents: read unless the workflow performs actions requiring broader permissions (such as write access to issues, pull requests, etc). If the reusable workflow requires more permission you can extend the block, but starting with contents: read is usually appropriate and CodeQL suggests using this as a minimal default. This change should be made by adding the following to the root of .github/workflows/postsubmit.yaml, after the name: line and typically before or after the on: block, but must precede the jobs: block. No other file or region is altered.

Suggested changeset 1
.github/workflows/postsubmit.yaml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/postsubmit.yaml b/.github/workflows/postsubmit.yaml
--- a/.github/workflows/postsubmit.yaml
+++ b/.github/workflows/postsubmit.yaml
@@ -1,5 +1,8 @@
 name: Hydrate Go Proxy
 
+permissions:
+  contents: read
+
 on:
   push:
     branches:
EOF
@@ -1,5 +1,8 @@
name: Hydrate Go Proxy

permissions:
contents: read

on:
push:
branches:
Copilot is powered by AI and may make mistakes. Always verify output.
@ack-prow
Copy link

ack-prow bot commented Nov 29, 2025

@ack-bot: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
sqs-verify-code-gen 3eb5c2b link false /test sqs-verify-code-gen

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@a-hilaly
Copy link
Member

/retest

@a-hilaly
Copy link
Member

/lgtm

@ack-prow ack-prow bot added the lgtm Indicates that a PR is ready to be merged. label Nov 29, 2025
@ack-prow
Copy link

ack-prow bot commented Nov 29, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: a-hilaly, ack-bot

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@ack-prow ack-prow bot added the approved label Nov 29, 2025
@ack-prow ack-prow bot merged commit e9b0e67 into main Nov 29, 2025
9 of 10 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved lgtm Indicates that a PR is ready to be merged. prow/auto-gen PRs related to prow auto generation automation

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants