-
Notifications
You must be signed in to change notification settings - Fork 39.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add rancher credential provider #40160
Conversation
Hi @wlan0. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
ping @erictune |
@kubernetes/sig-auth-feature-requests |
} | ||
|
||
func init() { | ||
client, err := getRancherClient() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I can't tell if this might return an error or not. If it can, then it should not be called here because init gets called for every cloud provider. If it can't consider removing error from the function signature.
} | ||
|
||
// Assuming it's always enabled | ||
func (p *rancherProvider) Enabled() bool { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You should not be enabled if you fail to detect that you are running on Rancher (e.g. no CATTLE env vars.
eeeb873
to
30827b8
Compare
30827b8
to
03923f4
Compare
ping @erictune. I've made the changed you suggested. |
948c35d
to
0b809fe
Compare
0b809fe
to
6592ce2
Compare
I've split the PR into two commits - one for the code changes, the other for the vendor dirs. This commit has the relevant code changes - |
@wlan0: you can't request testing unless you are a kubernetes member. In response to this comment:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
/approve |
@k8s-bot ok to test |
c117166
to
7dfd7da
Compare
/lgtm |
7dfd7da
to
40051ee
Compare
This is a flake! @k8s-bot cvm gce e2e test this |
How do I add a milestone to this? This is aimed for 1.7 release, or if possible 1.6.x |
40051ee
to
ac374e4
Compare
ac374e4
to
44ab110
Compare
44ab110
to
3d58d79
Compare
The error seems to be a flake - @k8s-bot unit test this |
@k8s-bot gce etcd3 e2e test this |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: dchen1107, erictune, thockin, wlan0
Needs approval from an approver in each of these OWNERS Files:
You can indicate your approval by writing |
return registryCreds | ||
} | ||
|
||
func TestRancherCredentialsProvide(t *testing.T) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
s/Provide/Provider/
@k8s-bot gce node e2e test this The tests are already green, but Submit Queue doesn't seem to recognize it |
@wlan0: The following test(s) failed:
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Automatic merge from submit-queue |
This adds rancher as a credential provider in kubernetes.
@erictune This might be a good opportunity to discuss adding a provision for people to have their own credential providers that is similar to the new cloud provider changes (kubernetes/community#128). WDYT?