-
Notifications
You must be signed in to change notification settings - Fork 601
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support auto generation of Parallel identity service account and expose in AuthStatus
#7225
Comments
hi @creydr I see you've added
|
@creydr: Please ensure the request meets the requirements listed here. If this request no longer meets these requirements, the label can be removed In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/assign |
Hello @pradnyavmw, |
hey @creydr, I will get a pr here soon |
Awesome! Thanks for letting us know |
hey @creydr, I was going through the ticket, can you specify the parallel lifecycle file where I will make the changes on sa |
Hello @prakrit55, The setup of the reconciler is done in pkg/reconciler/parallel/controller.go. In this file you need to setup the informers and configmap watchers. Does this help you to get started? |
Great.....thanks, with the referenced pr I m ready to implement it |
Hey @creydr, does the parallel generate subscriptions, IMO we need to create the SA in generated the identities acc. to the feature track and we supply it through ObjectReference So, we create the SA in |
Hey @prakrit55, |
@creydr , I got ur point so, should I create it in parallelspec in parallel_types.go ?? |
parallel_types.go contains only the type definition of the parallel. The reconciling of a Parallel resource is handled in the reconciler (parallel.go). There you would need to create the SA. There are a couple of PRs, which do the same for other resource types. If the referenced PRs from the description don't help you can also check on #7338 (which is WIP/not merged yet though) |
hey @creydr, should I configure the |
Hello @prakrit55, |
Problem
As the Eventing OIDC feature track describes, the
AuthStatus
is meant to provide the generated service account name in the resource status.After #7173 is done, we should:
authentication.oidc
feature flag #7174) is disabled:authentication.oidc
feature flag #7174) is enabled:.status.auth.serviceAccountName
The text was updated successfully, but these errors were encountered: