-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Azure provider no longer supports Sovereign clouds #3927
Comments
@phillebaba Sorry to ping you, but since you were the one to make the changeover to the new azure sdk in #3040, are you more familiar with how the new library should be configured to be able to call sovereign clouds? |
I am currently on a biking trip so I don't have my computer with me. I won't be home for another 10 days. @miwithro you might be able to help with this? |
I can have a look if needed :) |
@jbpaux Any help would be greatly appreciated. From what I can see the identity request is properly having its cloud env set and doing the correct call, but it seems like the code change means that the actual resource call isnt getting the cloud env information and always sends the request to the public management endpoint rather than the env specific one. Docs werent the most clear on how to make sure the cloud env is being sent with the resource request |
Yes after a quick review we can see the auth requests goes to the correct environment but all other requests are using default client options. |
if you want to give a try as I don't have any sovereign cloud access on this image docker hub image : |
@jbpaux Thanks for taking a look at that. Is it an easy build process? Might be easiest for me to manually build the changes to test. But if I have time I can try to test on Monday to see if those changes solve my issue with the sovereign cloud env |
you have build instructions in contributing doc if you want to build it yourself. Clone my repo and checkout the |
@jbpaux These changes appear to have fixed my issue, it is now connecting to the env specific management endpoint. Thanks for proposing the changes, I cannot wait until they are merged in and in a release version |
What happened:
When configuring the azure provider to use sovereign clouds, it always contacts the pubcloud management endpoint
What you expected to happen:
It should be reaching out to the cloud specific management endpoint
How to reproduce it (as minimally and precisely as possible):
Configure provider to be azure and cloud to be any sovereign cloud, it will always reach out to
management.azure.com
rather than the cloud specific management endpointAnything else we need to know?:
I think the issue was during the changeover to the new azure identity provider. The old code did a different call that directly included the specific environment's management endpoint:
external-dns/provider/azure/azure_private_dns.go
Line 73 in 1f6340a
external-dns/provider/azure/azure_private_dns.go
Line 71 in 0483ffd
According to the azure docs it looks like some sort of client option needs to be passed in:
Not sure if it can directly be passed in to the current client call or if a factory call is needed like in the example: https://github.com/Azure/azure-sdk-for-go/tree/main/sdk/resourcemanager/privatedns/armprivatedns#client-factory
Environment:
external-dns --version
): 0.13.6cloud: AZUREUSGOVERNMENTCLOUD
The text was updated successfully, but these errors were encountered: