-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(azure): sovereign cloud support #3942
fix(azure): sovereign cloud support #3942
Conversation
Hi @jbpaux. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Would it make sense to extract the construction of the |
@johngmyers @njuettner can we get this over the finish line. This is blocking some gov customers. |
/lgtm |
/retitle fix(azure): sovereign cloud support |
It's doable. Maybe the |
The structure of the initialization is weird and complicated. Both providers call Would it not make sense to have |
I agree for the first part, the What do you think ? |
I think it's okay to expand the responsibility of |
Will this be going into a release soon? We were going from 0.13.4 to 0.13.6 to address a vulnerability, but the issue with sovereign clouds is preventing us. |
Signed-off-by: jbpaux <[email protected]>
91cae9b
to
45e2c2f
Compare
ok, done in latest commit
it must be merged first in master then in a few month a new release will be out. So in the meantime you'll have to either use master image or a custom made image with this fix included |
I'm unsure why you didn't use the client factory, but the code looks good. |
Hey @jbpaux , can you address @mloiseleur's comment. The implementation looks good enough to me, but I'm not too familiar with azure sdk, so I'd love to get that comment answered. @jhongturney this is on my radar, so it will be merged soon. that said, it's right that there won't be a new released right away. You can consider using an image from the master branch if you need it sooner than released. |
I didn't use the client factory as the initial implementation didn't use it either. I didn't tought it was worth switching to it for only 2 clients. If it's really wanted I can rerefactor to use it but I think it's good enough :) |
@mloiseleur given that you mention that, what do you think? For me it's okay like this. |
Yes, it's okay for me like this too. |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: johngmyers The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Great to see this fix got merged. When can we expect to see a tagged release version with this included? This fixed a bug that is currently completely breaking externaldns for us |
@nbjohnson we still have to plan a release. I think towards the end of October is realistic. In the meantime you can use one of the images built from master. |
@Raffo Just want to check again now that we have reached November what the status of a new tagged release with this fix. We need to deploy with a tagged release with this critical fix. We look forward for a release, Thanks! |
We talked about it and it's planned, I need to get the time to do it, likely next week. |
Description
The old implementation allowed use of alternative Azure Clouds (Azure China, Azure Gov etc.)
With the changes to the new SDK, the other clouds were partially implemented : the authentication to the other clouds was working but the calls to the management endpoints to create/delete records was only targeting public Azure Cloud.
This PR aims to fix this bug.
To test it, an access to an sovereign cloud is required. The requestor who filled the issue has access to one and validated the fix.
Fixes #3927
Checklist