-
Notifications
You must be signed in to change notification settings - Fork 88
fix: support getting sasToken, msiSecret, SPN from secret #867
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: support getting sasToken, msiSecret, SPN from secret #867
Conversation
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: andyzhangx The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
5432180
to
20598ec
Compare
/retest |
1 similar comment
/retest |
20598ec
to
3599c2d
Compare
/retest |
@@ -21,9 +21,9 @@ rollout_and_wait() { | |||
|
|||
APPNAME=$(kubectl apply -f $1 | grep -E "^(:?daemonset|deployment|statefulset|pod)" | awk '{printf $1}') | |||
if [[ -n $(expr "${APPNAME}" : "\(daemonset\|deployment\|statefulset\)" || true) ]]; then | |||
kubectl rollout status $APPNAME --watch --timeout=5m | |||
kubectl rollout status $APPNAME --watch --timeout=20m |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is making timeout longer helpful? Seems like e2e test still failed. If it was not, we should undo this change.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
it's helpful sometimes since after a while, the nfs connection is ok per my investigation, not sure why. let's keep it.
pkg/blob/blob.go
Outdated
@@ -460,7 +465,7 @@ func (d *Driver) GetAuthEnv(ctx context.Context, volumeID, protocol string, attr | |||
if secretName != "" && !strings.EqualFold(azureStorageAuthType, "msi") { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
should remove !strings.EqualFold(azureStorageAuthType, "msi")
condition since not only account key will be stored in secret.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
good catch, could you take a look at the modified code? thanks.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hello there. I think this change introduced the bug #926
4bf9d90
to
636a8e6
Compare
/kind bug |
/cherrypick release-1.20 |
@andyzhangx: #867 failed to apply on top of branch "release-1.20":
In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
What type of PR is this?
/kind feature
What this PR does / why we need it:
feat: support getting sasToken, msiSecret, SPN from secret
This PR could support reading sasToken, msiSecret, SPN from inline volume
Which issue(s) this PR fixes:
Fixes #840, #863
Requirements:
Special notes for your reviewer:
Release note: