-
Notifications
You must be signed in to change notification settings - Fork 580
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
WIP: ✨ Support AWS multitenancy #1919
WIP: ✨ Support AWS multitenancy #1919
Conversation
Hi @andrewmyhre. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Not sure the rebase has gone correctly? Seems to include the multi-tenancy stuff as well. |
32f0d3a
to
43a55b3
Compare
I copied the title and description from the wrong PR :) |
Cool, thanks. I'm going to be out until Tuesday, but will start reviewing then. |
/milestone v0.6.1 |
/status in-review |
/ok-to-test |
don't worry about rebasing just yet. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for this @andrewmyhre . It's a great start.
There's obviously some bits we need to finish to complete the implementation, and would be willing to help in the effort.
Should we work on a common branch, either a feature branch in this repo or your repo, work on the bits together and then PR it as one?
194c2e1
to
0db7f6b
Compare
2ae4430
to
77a95bd
Compare
I'll do the rebase and add the namespace selector tomorrow. |
@@ -8,5 +8,5 @@ spec: | |||
spec: | |||
containers: | |||
# Change the value of image field below to your controller image URL | |||
- image: gcr.io/k8s-staging-cluster-api-aws/cluster-api-aws-controller:latest | |||
- image: artifactory.cloud.capitalone.com/onekube/cluster-api-aws-controller-amd64:dev |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- image: artifactory.cloud.capitalone.com/onekube/cluster-api-aws-controller-amd64:dev | |
- image: gcr.io/k8s-staging-cluster-api-aws/cluster-api-aws-controller:latest |
awsprinciple types are now being registered, initial session test giving good fail 1713 tests for stub providers/principals implemented 1713 wire up session.go to use providers if specified update rbac permissions to allow managing *principal resources avoid nil reference error when creating a session. log creating a session creating a session logs more verbosely debugging role assumption issues pass a session with a region when requesting an stscreds.Credentials update test for new getProviderForCluster signature look for principals in specific namespaces add conversion for PrincipalRef. Add stubs for checking principal allow namespaces update conversion.go build providers into a chain load sourcePrincipalRef into provider chain update multitenancy tests change Principal types to Namespaced scope when looking up a principal default to looking in the same namespace as the cluster AWSServiceAccountPrincipals can be chained fmt/lint updates dial down logging remove unused imports from e2e test suite ignore AWSServiceAccountPrincipals for now revert change to handling an error make generate go fmt remove service account principal constructor Signed-off-by: rbtr <[email protected]>
77a95bd
to
b26838c
Compare
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
b26838c
to
7fd7d67
Compare
Signed-off-by: rbtr <[email protected]>
7fd7d67
to
e42b5fc
Compare
Completed in #2253 Credit should be copied over to the other commits. /close |
@randomvariable: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@andrewmyhre: PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
(Rebased for v0.6.0 / main)
What this PR does / why we need it: Allows the use of multiple credentials from as single deployment of CAPA. Static credentials and IAM roles are both support. These can be provided as custom resources along with a CAPx spec.
Fixes #1552
TODO: