KSA token for Kubelet image credential providers alpha#128372
KSA token for Kubelet image credential providers alpha#128372k8s-ci-robot merged 6 commits intokubernetes:masterfrom
Conversation
|
@aramase: You must be a member of the kubernetes/milestone-maintainers GitHub team to set the milestone. If you believe you should be able to issue the /milestone command, please contact your Milestone Maintainers Team and have them propose you as an additional delegate for this responsibility. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
Hey @aramase Just a reminder that the code freeze is starting |
8236d95 to
f6c268d
Compare
8ab96f0 to
8b87dd2
Compare
I created an issue for sig-node - #130271 to track this. As far as I can tell, at least one of the NodeConformance tests would be affected, hopefully this will be prioritized in a triage. |
|
/test pull-kubernetes-node-kubelet-credential-provider |
just removed in #130162 and broke these test suites |
|
Thanks for the info 👍 I see there were some fixes, I'll try to rerun again and perhaps see if more fixing is needed. /test pull-kubernetes-node-kubelet-credential-provider |
|
I haven't dealt with k8s test infra before but kubernetes/test-infra#34374 should hopefully fix the permafails in these and couple other jobs. |
|
/retest |
|
kubernetes/kops#17270 merged, let's see if it got picked by the CI /test pull-kubernetes-node-kubelet-credential-provider |
|
Hello @aramase @stlaz Friendly reminder that code freeze is starting at 02:00 UTC Friday 21st March 2025 (about 4 weeks from now), and while there is still time, we want to ensure that each PR has a chance to be merged on time. Please make sure the PR has both lgtm and approved labels before the code freeze. Thanks! |
@mrunalp could you review the PR? cross posting my comment from slack (xref: https://kubernetes.slack.com/archives/C04UMAUC4UA/p1738772703138039?thread_ts=1738000047.329689&cid=C04UMAUC4UA)
|
thanks @stlaz for opening kubernetes/test-infra#34374. CI failures in this PR ( |
|
this LGTM thanks @aramase |
Signed-off-by: Anish Ramasekar <anish.ramasekar@gmail.com>
Signed-off-by: Anish Ramasekar <anish.ramasekar@gmail.com>
Signed-off-by: Anish Ramasekar <anish.ramasekar@gmail.com>
Signed-off-by: Anish Ramasekar <anish.ramasekar@gmail.com>
Signed-off-by: Anish Ramasekar <anish.ramasekar@gmail.com>
Signed-off-by: Anish Ramasekar <anish.ramasekar@gmail.com>
|
/lgtm |
|
LGTM label has been added. DetailsGit tree hash: b74ac7e23d53f50e5e9760a3f46c85f912b366bc |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: aramase, enj, hashim21223445, liggitt The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Expand the on-disk kubelet credential provider configuration to allow an optional
tokenAttributefield to be configured. When this field is not set, no KSA token will be sent to the plugin. When it is set, the Kubelet will provision a token with the given audience bound to the current pod and its service account. This KSA token along with required annotations on the KSA defined in configuration will be sent to the credential provider plugin via its standard input (along with the image information that is already sent today). The KSA annotations to be sent are configurable in the kubelet credential provider configuration./kind feature
/sig auth
/triage accepted
/milestone v1.32
/priority important-soon