-
Notifications
You must be signed in to change notification settings - Fork 5.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Add support for Azure workload identity for Git and OCI repositories. #21118
base: master
Are you sure you want to change the base?
Conversation
🔴 Preview Environment stopped on BunnyshellSee: Environment Details | Pipeline Logs Available commands (reply to this comment):
|
d15b63d
to
fdf129b
Compare
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## master #21118 +/- ##
==========================================
+ Coverage 55.19% 55.24% +0.04%
==========================================
Files 337 339 +2
Lines 57058 57352 +294
==========================================
+ Hits 31496 31685 +189
- Misses 22863 22948 +85
- Partials 2699 2719 +20 ☔ View full report in Codecov by Sentry. |
24d9816
to
2defb6b
Compare
2defb6b
to
2dfe9a2
Compare
c499219
to
94a0fbf
Compare
c0abdd4
to
06a0d1e
Compare
61b8f67
to
7202476
Compare
2716e26
to
beacb05
Compare
@@ -1008,6 +1009,7 @@ func getHelmRepos(appPath string, repositories []*v1alpha1.Repository, helmRepoC | |||
if _, err := url.Parse("oci://" + dep.Repo); err == nil && cred.EnableOCI && strings.HasPrefix(dep.Repo, cred.Repo) { | |||
repo.Username = cred.Username | |||
repo.Password = cred.Password | |||
repo.UseAzureWorkloadIdentity = cred.UseAzureWorkloadIdentity |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@blakepettersson please review
@reggie-k @andrii-korotkov-verkada Can you take a look? We're shooting for adding this in 2.15. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Generally LGTM, mostly minor cpomments
beacb05
to
0d1836a
Compare
Please, fix the DCO (click on the DCO link and follow the instructions from there). |
Also, please avoid force push, since it makes it harder to review incrementally and also gets rid of reasons for updates. |
0d1836a
to
7eff3e2
Compare
Sure, will take care for future changes |
Curious why you are merging from the master branch directly instead of a custom branch, and also why is commit message merge master into master. Maybe this has something to do with test artifacts step failure. |
It is because the branch from my fork is master branch. Hence it merges from upstream master to master on my fork which results in this message. |
Signed-off-by: Jagpreet Singh Tamber <jagpreetstamber@gmail.com>
Signed-off-by: Jagpreet Singh Tamber <jagpreetstamber@gmail.com>
Signed-off-by: Jagpreet Singh Tamber <jagpreetstamber@gmail.com>
Signed-off-by: Jagpreet Singh Tamber <jagpreetstamber@gmail.com>
ee2e48c
to
493651e
Compare
Had to force push by rebasing as the coverage report was incorrect it was considering the merges from master as the changes in the patch and reducing the code coverage. After rebasing it is now correct. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the PR! Made some comments/questions.
Generally, LGTM, but I think the test coverage should be improved.
Signed-off-by: Jagpreet Singh Tamber <jagpreetstamber@gmail.com>
347ef3b
to
671ad35
Compare
Signed-off-by: Jagpreet Singh Tamber <jagpreetstamber@gmail.com>
Signed-off-by: Jagpreet Singh Tamber <jagpreetstamber@gmail.com>
PR implements Azure workload identity authentication mechanism for authenticating with the Azure Git and OCI repositories
Azure Workload Identity enables the credential free authentication for Azure customers, enabling this feature will remove the credential management overhead from customers using argo on Azure Kubernetes clusters.
Checklist: