-
Notifications
You must be signed in to change notification settings - Fork 423
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
update k8s dependencies to v1.24 #466
Conversation
Welcome @kinarashah! |
Hi @kinarashah. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: kinarashah The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@wongma7 @micahhausler Hi, I just signed CLA..could you please take a look and add |
@kinarashah: PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@micahhausler Would you please merge this PR? Go modules causing conflict in our CI, because of the missing package |
@micahhausler can you please merge this PR. Go modules causing issues due to which are unable to use v1 storages apis, because of the missing package |
@micahhausler please merge this soon as it has become a blocker for us to update our packages |
Those who are awaiting for merge, you can go ahead and fork this branch and use the For lazy people, add the following line in your
|
We can’t merge this CR as it's gonna break clients that still have kubectls and kubeconfigs configured for In a nutshell, we'll need to:
If you could pick this up that'd be amazing. But if not, someone from AWS will pick it up in the next month or so. For more context see: |
no it won't, authenticator does not depend on client-go for this at all, whatever the apiversion is in the kubeconfig the ExecCredential returned is set to the same and this works for v1, v1alpha1, v1beta1, because the ExecCredential returned is valid for all of those. REF: https://github.com/kubernetes-sigs/aws-iam-authenticator/blob/master/pkg/token/token.go#L350 |
{ | ||
Name: "KUBERNETES_EXEC_INFO with v1alpha1", | ||
EnvKey: "KUBERNETES_EXEC_INFO", | ||
ExpectApiVersion: clientauthv1alpha1.SchemeGroupVersion.String(), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
keep the test but replace this with string client.authentication.k8s.io/v1alpha1
.
If there is further doubt about whether simply updating client-go could affect authenticator's compatibility to client.authentication.k8s.io/v1alpha1 i suggest someone implement in a follow-up PR an e2e test to validate kubeconfigs with all versions, v1alpha1 v1beta1, v1. (Could be me, IDK, I'm not volunteering at this time just suggesting)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The v1alpha1 test was already removed in a previous PR so this is no longer relevant to this PR.
/close Vendor was also removed in a previous PR so I'm going to close this in favor of a new PR. |
@nckturner: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
No description provided.