-
Notifications
You must be signed in to change notification settings - Fork 126
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CNTRLPLANE-112: Add new Azure authentication type for managed Azure HCP for cluster-image-registry #1174
base: main
Are you sure you want to change the base?
Conversation
@bryan-cox: This pull request references CNTRLPLANE-112 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.19.0" version, but no target version was set. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
Skipping CI for Draft Pull Request. |
This PR is needed before this PR can be merged - openshift/hypershift#5621. |
Thanks for this, looks great! Can you have a look at the
https://pkg.go.dev/github.com/gordonklaus/ineffassign#section-readme |
ae5baa9
to
c6ed87f
Compare
/test all |
@bryan-cox: This pull request references CNTRLPLANE-112 which is a valid jira issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
c6ed87f
to
f152c59
Compare
This commit adds the msi-dataplane library to the go.mod for managed Azure HCP. Signed-off-by: Bryan Cox <[email protected]>
This commit adds a context function parameter to getCreds. This will be needed for the new authentication type being used for managed Azure HCP. Signed-off-by: Bryan Cox <[email protected]>
This commit adds a new authentication type for managed Azure HCP called UserAssignedIdentityCredentials. This new authentication type replaces the previous authentication method for managed Azure HCP. Signed-off-by: Bryan Cox <[email protected]>
f152c59
to
2abed34
Compare
/test all |
/test e2e-aws-ovn |
/retest |
/test hypershift-e2e-aks |
1 similar comment
/test hypershift-e2e-aks |
Hey @flavianmissi - I tested this PR successfully locally yesterday in conjunction with openshift/hypershift#5655. Once this PR merges, I can merge openshift/hypershift#5655 and after it merges I will open a new PR to remove the old auth method/filewatcher. We need both auth methods at the moment to keep e2es passing.
|
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: bryan-cox, flavianmissi The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@Patryk-Stefanski and/or I will look into that failing aks test. It should not be failing since he merged in the fix for the issue earlier today. |
/retest-required |
/test hypershift-e2e-aks |
Let's try and see if we can get /test e2e-azure-operator |
@bryan-cox it also looks like you're going to need QE, docs and PX approvals. Let me know if you need help getting those. |
/test e2e-azure-operator |
2 similar comments
/test e2e-azure-operator |
/test e2e-azure-operator |
@bryan-cox: The following test failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
Hmm it's concerning that the Can you have a look @bryan-cox? These suits are in the operator repository itself. They also don't gather artifacts as the e2e tests in openshift/release repository do, so we have to rely on whatever the test output gives us for troubleshooting... (sorry about that, it's legacy stuff). It might be easier to run it locally in your own cluster. Let me know if you need any more info. I'll put this PR on hold for now until we can understand why these tests are flaking more than usual. |
FTR I've triggered |
Hey folks 👋🏻 - could I get some help with getting these labels for this PR please?
|
/label docs-approved |
After running /override ci/prow/e2e-azure-operator |
@flavianmissi: Overrode contexts on behalf of flavianmissi: ci/prow/e2e-azure-operator In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
@wewang58 could you help us with getting the QE approved label please? |
/label px-approved |
This PR:
getCreds