-
Notifications
You must be signed in to change notification settings - Fork 431
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow skipping Linux profile on managed clusters #3677
Conversation
What do you think about this approach? I was also considering adding another field like Edit: Not sure if the solution from above is possible as we would need to make Edit 2: Another idea that comes to my mind is detecting if there is existing cluster that does not have SSH key, if that is the case then autogenerate could be skipped. As above, we would need to make cc @jackfrancis |
Codecov ReportPatch coverage:
Additional details and impacted files@@ Coverage Diff @@
## main #3677 +/- ##
==========================================
- Coverage 54.09% 54.05% -0.04%
==========================================
Files 185 186 +1
Lines 18751 18839 +88
==========================================
+ Hits 10143 10184 +41
- Misses 8063 8107 +44
- Partials 545 548 +3
☔ View full report in Codecov by Sentry. |
Is there anything that I can do to push it forward? /retest |
@maciaszczykm I think the remaining open items are:
Once all of this is resolved, please squash commits |
/test ls |
@CecileRobertMichon: The specified target(s) for
The following commands are available to trigger optional jobs:
Use
In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Also going to start an apiversion upgrade test: /test pull-cluster-api-provider-azure-apiversion-upgrade |
@CecileRobertMichon E2E failure might just be flaky test. I will rerun it a few times as I saw similar thing in my other PRs. /test pull-cluster-api-provider-azure-e2e-aks |
One more question, the implemented UX of this PR looks a little cramped to me(although completely justified). Do you think we could add a new field Its just a thought but I am completely ok with this current implementation as well. |
86de5c6
to
f6d5660
Compare
@nawazkh I considered adding new field in my comment above:
But after thinking longer about it, all fields that are part of control plane spec map somehow to AKS fields. This would be used only by CAPZ and it would be used only once during init, after that it would be redundant. I prefer current solution but if you would like then I can change it. Both ways should work. |
/retest |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just one final suggestion from my end :) Everything else looks great to me! Thank you
"This would be used only by CAPZ and it would be used only once during init, after that it would be redundant." Makes sense, thanks for sharing the context again! |
fe93e3b
to
29822b1
Compare
@nawazkh Done, PTAL. |
29822b1
to
67d25cd
Compare
Co-authored-by: Nawaz Hussain K <[email protected]>
67d25cd
to
49f8572
Compare
@nawazkh PTAL. |
@maciaszczykm: The following test failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Thank you for putting this together and working through the conversations. Let's get this merged! 🚀 |
LGTM label has been added. Git tree hash: 60c96b64916993fed31f10f87e0476c2557a5fc3
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/approve
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: CecileRobertMichon The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Should this PR be cherry-picked to other release branches ? |
@nawazkh IMO it's not eligible for cherry-pick because it's a feature |
Makes sense, thank you! |
What type of PR is this?
/kind feature
What this PR does / why we need it:
In order to be able to not set
LinuxProfile
in AKS I have changedAzureManagedControlPlane
SSHPublicKey
to be optional. If it is null then new key will not be autogenerated andLinuxProfile
will not be set, if it is set to empty string then new key will be generated just like it was done until now.See Slack thread: https://kubernetes.slack.com/archives/CEX9HENG7/p1687961825757119
Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Special notes for your reviewer:
TODOs:
Release note: