-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Clear env var so Azure e2e generates a local keypair #19498
Conversation
Hi @mboersma. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
The key is short lived. I feel good about this change.
/ok-to-test |
/lgtm cancel Looks like there is more work to be done. |
/approve cancel |
I thought overriding the env var was the least disruptive way, but apparently that won't work. I think either we could remove the |
Pretty sure we need |
34765e2
to
2b68cc0
Compare
I made a new config label that retains everything e2e appears to need, but removes the |
@mboersma what do you think about reusing |
Sure, but it appears we need |
I think we should be ok with the default registry via https://github.com/kubernetes-sigs/cluster-api-provider-azure/blob/2e100d19787016a78130fd5b9440dedbad754c85/scripts/ci-e2e.sh#L53-L64. We run other |
2b68cc0
to
e2a8713
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
@@ -38,7 +38,7 @@ presubmits: | |||
labels: | |||
preset-dind-enabled: "true" | |||
preset-kind-volume-mounts: "true" | |||
preset-azure-cred: "true" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
are there any other jobs (eg. periodic CAPI e2e) that we're expecting to get logs from that should also be updated?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, looks like we should do the same for pull-cluster-api-provider-azure-capi-e2e
--good thinking. Those are the two places that ./scripts/ci-e2e.sh
is called.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Derp, nevermind--we are already there: that was why preset-azure-cred-only
was added in the first place. So I think that covers it.
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: devigned, dims, mboersma The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@mboersma: Updated the following 2 configmaps:
In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
To implement
ClusterLogCollector
for CAPZ using an SSH mechanism, Azure e2e tests need access to the private key as well. By leavingAZURE_SSH_PUBLIC_KEY_FILE
empty, testing will fall back to generating a local keypair just for that run.This works well as demonstrated in kubernetes-sigs/cluster-api-provider-azure#976.
Since the key materials aren't accessible outside of the prow CI environment, I don't think this introduces a security risk. But please let me know if you disagree or have any other feedback. cc: @nader-ziada @CecileRobertMichon @devigned