aws-iam-authenticator icon indicating copy to clipboard operation
aws-iam-authenticator copied to clipboard

update k8s dependencies to v1.24

Open kinarashah opened this issue 2 years ago • 11 comments

kinarashah avatar Jun 21 '22 19:06 kinarashah

CLA Signed

The committers listed above are authorized under a signed CLA.

  • :white_check_mark: login: kinarashah / name: Kinara Shah (d0e490d3e017a752db48143ffa34e2005b57a70f, bbcd7082d35aa5bdeedd99ae563ccbb934730117)

Welcome @kinarashah!

It looks like this is your first PR to kubernetes-sigs/aws-iam-authenticator 🎉. Please refer to our pull request process documentation to help your PR have a smooth ride to approval.

You will be prompted by a bot to use commands during the review process. Do not be afraid to follow the prompts! It is okay to experiment. Here is the bot commands documentation.

You can also check if kubernetes-sigs/aws-iam-authenticator has its own contribution guidelines.

You may want to refer to our testing guide if you run into trouble with your tests not passing.

If you are having difficulty getting your pull request seen, please follow the recommended escalation practices. Also, for tips and tricks in the contribution process you may want to read the Kubernetes contributor cheat sheet. We want to make sure your contribution gets all the attention it needs!

Thank you, and welcome to Kubernetes. :smiley:

k8s-ci-robot avatar Jun 21 '22 19:06 k8s-ci-robot

Hi @kinarashah. Thanks for your PR.

I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

k8s-ci-robot avatar Jun 21 '22 19:06 k8s-ci-robot

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: kinarashah To complete the pull request process, please assign nckturner after the PR has been reviewed. You can assign the PR to them by writing /assign @nckturner in a comment when ready.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment Approvers can cancel approval by writing /approve cancel in a comment

k8s-ci-robot avatar Jun 21 '22 19:06 k8s-ci-robot

@wongma7 @micahhausler Hi, I just signed CLA..could you please take a look and add /ok-to-test if all is good?

kinarashah avatar Jun 22 '22 17:06 kinarashah

@kinarashah: PR needs rebase.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

k8s-ci-robot avatar Jul 02 '22 11:07 k8s-ci-robot

@micahhausler Would you please merge this PR? Go modules causing conflict in our CI, because of the missing package v1alpha1 in client-go, which is used by token_test.go

nilesh-akhade avatar Aug 24 '22 09:08 nilesh-akhade

@micahhausler can you please merge this PR. Go modules causing issues due to which are unable to use v1 storages apis, because of the missing package v1alpha1 in client-go

pallav-trilio avatar Sep 12 '22 12:09 pallav-trilio

@micahhausler please merge this soon as it has become a blocker for us to update our packages

madhurtrilio avatar Sep 13 '22 05:09 madhurtrilio

Those who are awaiting for merge, you can go ahead and fork this branch and use the replace directive in your go.mod.

For lazy people, add the following line in your go.mod

replace sigs.k8s.io/aws-iam-authenticator => github.com/catalogicsoftware/aws-iam-authenticator v0.5.10

nilesh-akhade avatar Sep 13 '22 06:09 nilesh-akhade

We can’t merge this CR as it's gonna break clients that still have kubectls and kubeconfigs configured for v1alpha1 api.

In a nutshell, we'll need to:

  • import 2 versions of client-go (this will be much easier if we start using go mods instead of vendors)
  • support both v1alpha1 and v1 options from KUBERNETES_EXEC_INFO
  • default to v1beta1 if no KUBERNETES_EXEC_INFO var is provided

If you could pick this up that'd be amazing. But if not, someone from AWS will pick it up in the next month or so.

For more context see:

  • https://kubernetes.io/docs/reference/access-authn-authz/authentication/#configuration
  • https://github.com/aws/aws-cli/pull/6940

melnikalex avatar Sep 15 '22 01:09 melnikalex

We can’t merge this CR as it's gonna break clients that still have kubectls and kubeconfigs configured for v1alpha1 api.

no it won't, authenticator does not depend on client-go for this at all, whatever the apiversion is in the kubeconfig the ExecCredential returned is set to the same and this works for v1, v1alpha1, v1beta1, because the ExecCredential returned is valid for all of those.

REF: https://github.com/kubernetes-sigs/aws-iam-authenticator/blob/master/pkg/token/token.go#L350

wongma7 avatar Nov 30 '22 22:11 wongma7

/close

Vendor was also removed in a previous PR so I'm going to close this in favor of a new PR.

nckturner avatar Dec 05 '22 21:12 nckturner

@nckturner: Closed this PR.

In response to this:

/close

Vendor was also removed in a previous PR so I'm going to close this in favor of a new PR.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

k8s-ci-robot avatar Dec 05 '22 21:12 k8s-ci-robot