-
Notifications
You must be signed in to change notification settings - Fork 196
fix: lease based controller when using mTLS #728
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ipochi The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
currently when the lease based server count is enabled along with mTLS between apiserver and konnectivity server, it breaks. this fixes this by setting up the k8s clientset correctly. Signed-off-by: Imran Pochi <imranpochi@microsoft.com>
1ecc404
to
cd7c550
Compare
@ipochi: The following test failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
Currently the setting up of k8s client is broken if service account authentication is not used between server and agent. This condition `if o.AgentNamespace != "" {` acts as a gatekeeper for setting the k8s client which worked fine previously as server never needed to talk to apiserver apart from authenticating agents using service account token. However when lease controller logic was added, it meant that setting up k8s client was required if lease controller was enabled but authentication was done using mTLS instead of service account authentication. This fixes that. Closing kubernetes-sigs#728 in favour of this. Signed-off-by: Imran Pochi <imranpochi@microsoft.com>
Currently the setting up of k8s client is broken if service account authentication is not used between server and agent. This condition `if o.AgentNamespace != "" {` acts as a gatekeeper for setting the k8s client which worked fine previously as server never needed to talk to apiserver apart from authenticating agents using service account token. However when lease controller logic was added, it meant that setting up k8s client was required if lease controller was enabled but authentication was done using mTLS instead of service account authentication. This fixes that. Closing kubernetes-sigs#728 in favour of this. Signed-off-by: Imran Pochi <imranpochi@microsoft.com>
Currently the setting up of k8s client is broken if service account authentication is not used between server and agent. This condition `if o.AgentNamespace != "" {` acts as a gatekeeper for setting the k8s client which worked fine previously as server never needed to talk to apiserver apart from authenticating agents using service account token. However when lease controller logic was added, it meant that setting up k8s client was required if lease controller was enabled but authentication was done using mTLS instead of service account authentication. This fixes that. Closing #728 in favour of this. Signed-off-by: Imran Pochi <imranpochi@microsoft.com>
Currently the setting up of k8s client is broken if service account authentication is not used between server and agent. This condition `if o.AgentNamespace != "" {` acts as a gatekeeper for setting the k8s client which worked fine previously as server never needed to talk to apiserver apart from authenticating agents using service account token. However when lease controller logic was added, it meant that setting up k8s client was required if lease controller was enabled but authentication was done using mTLS instead of service account authentication. This fixes that. Closing kubernetes-sigs#728 in favour of this. Signed-off-by: Imran Pochi <imranpochi@microsoft.com>
currently when the lease based server count is enabled along with mTLS between apiserver and konnectivity server, it breaks.
this fixes this by setting up the k8s clientset correctly.