-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Provide validation for identityId with Azure pod identity & Azure AD Workload Identity in TriggerAuthentication #4696
Provide validation for identityId with Azure pod identity & Azure AD Workload Identity in TriggerAuthentication #4696
Conversation
Signed-off-by: SpiritZhou <[email protected]>
Thank you for your contribution! 🙏 We will review your PR as soon as possible. While you are waiting, make sure to:
Learn more about: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks! Would you mind adding some unit & e2e tests please?
Co-authored-by: Tom Kerkhove <[email protected]> Signed-off-by: SpiritZhou <[email protected]>
Signed-off-by: SpiritZhou <[email protected]>
Signed-off-by: SpiritZhou <[email protected]>
Signed-off-by: SpiritZhou <[email protected]>
Signed-off-by: SpiritZhou <[email protected]>
Signed-off-by: SpiritZhou <[email protected]>
Signed-off-by: SpiritZhou <[email protected]>
Signed-off-by: SpiritZhou <[email protected]>
Signed-off-by: SpiritZhou <[email protected]>
Signed-off-by: SpiritZhou <[email protected]>
Signed-off-by: SpiritZhou <[email protected]>
Could you also add some e2e tests for this new admission webhook? |
Signed-off-by: SpiritZhou <[email protected]>
Should I also add some e2e test with real identity id? If so, where can I get the real identity id info? @JorTurFer @tomkerkhove |
Signed-off-by: SpiritZhou <[email protected]>
Signed-off-by: SpiritZhou <[email protected]>
Signed-off-by: SpiritZhou <[email protected]>
What do you think @JorTurFer? I think it's OK to extend our existing e2e tests with just the negative scenario (invalid specified/empty string) as the rest should already be covered by other tests implicitly |
Signed-off-by: SpiritZhou <[email protected]>
Signed-off-by: SpiritZhou <[email protected]>
Signed-off-by: SpiritZhou <[email protected]>
Signed-off-by: SpiritZhou <[email protected]>
Co-authored-by: Tom Kerkhove <[email protected]> Signed-off-by: SpiritZhou <[email protected]>
Signed-off-by: SpiritZhou <[email protected]>
Signed-off-by: SpiritZhou <[email protected]>
Signed-off-by: SpiritZhou <[email protected]>
Signed-off-by: SpiritZhou <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM! Only one small nit in azure-monitor scaler 💪
/run-e2e |
Signed-off-by: SpiritZhou <[email protected]>
Signed-off-by: SpiritZhou <[email protected]>
/run-e2e |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Signed-off-by: SpiritZhou <[email protected]>
Thank you @SpiritZhou! @JorTurFer any idea why codeql is stuck? Do I need to queue e2e again? |
That check is the e2e test and not CodeQL... Although the e2e check is created on E2E section, IDK why the GH API adds it randomly to any other section. Why it is required again if e2e tests already passed? Because a new commit has been added 😄 if the commit require testigg you can trigger them, if not you can skip them |
Ok let's run them again! |
/run-e2e |
…Workload Identity in TriggerAuthentication (kedacore#4696) Co-authored-by: Tom Kerkhove <[email protected]> Co-authored-by: Jorge Turrado Ferrero <[email protected]>
…Workload Identity in TriggerAuthentication (kedacore#4696) Co-authored-by: Tom Kerkhove <[email protected]> Co-authored-by: Jorge Turrado Ferrero <[email protected]> Signed-off-by: anton.lysina <[email protected]>
add validation for identityId with Azure pod identity in TriggerAuthentication in case that user pass an empty application ID
and causes error.
Checklist
Relates to #4528