Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AWS: trust region if found from AWS metadata #38880

Merged
merged 1 commit into from
Jan 24, 2017

Conversation

justinsb
Copy link
Member

AWS: trust region if found from AWS metadata

Means we can run in newly announced regions without a code change.

We don't register the ECR provider in new regions, so we will still need
a code change for now.

Fix #35014

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Dec 16, 2016
@k8s-reviewable
Copy link

This change is Reviewable

@k8s-github-robot k8s-github-robot added size/L Denotes a PR that changes 100-499 lines, ignoring generated files. release-note Denotes a PR that will be considered when it comes time to generate release notes. labels Dec 16, 2016
@justinsb justinsb force-pushed the peninsula_club branch 2 times, most recently from d7aea6a to 1133b41 Compare December 20, 2016 17:50
@k8s-github-robot k8s-github-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Dec 20, 2016
@justinsb justinsb force-pushed the peninsula_club branch 2 times, most recently from 6ab00b0 to 80e8897 Compare December 20, 2016 18:05
@k8s-github-robot k8s-github-robot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Dec 20, 2016
@derekwaynecarr
Copy link
Member

This is extremely useful. Thanks for putting this together.

@justinsb
Copy link
Member Author

Thanks @derekwaynecarr - you can see the ECR issue as well ... with this PR we won't have to register new regions in our code, but we still won't be able to use ECR in a new region unless we are running in that region.

To tackle that I think we would have to either change it so that we could build docker configs on demand, or just issue a DescribeRegions call and automatically register all of those regions. Unsure which is better right now.

@chrislovecnm
Copy link
Contributor

you can see the ECR issue as well ... with this PR we won't have to register new regions in our code, but we still won't be able to use ECR in a new region unless we are running in that region.
To tackle that I think we would have to either change it so that we could build docker configs on demand, or just issue a DescribeRegions call and automatically register all of those regions. Unsure which is better right now.

Does this remove functionality that we have now with ECR?

Copy link
Contributor

@chrislovecnm chrislovecnm left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Quick question

@@ -100,21 +80,20 @@ type ecrProvider struct {

var _ credentialprovider.DockerConfigProvider = &ecrProvider{}

// Init creates a lazy provider for each AWS region, in order to support
// RegisterCredentialsProvider registers a credential provider for the specified region.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we have this documented anywhere? If so do we need to update the docs?

@chrislovecnm
Copy link
Contributor

@erictune a couple of questions, and since there actually is an active @kubernetes/sig-aws-misc group that is active, should we be doing code reviews now?

@justinsb
Copy link
Member Author

Does this remove functionality that we have now with ECR?

No, it just adds functionality: we automatically recognize the ECR region we are running in, even if it isn't in our hard-coded list.

Copy link
Contributor

@chrislovecnm chrislovecnm left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks great ... @erictune can we get this in? This is super important :)

@chrislovecnm
Copy link
Contributor

@erictune can I get a PR review :)

@colhom
Copy link

colhom commented Jan 6, 2017

fixes kubernetes-retired/kube-aws#198

@justinsb justinsb assigned zmerlynn and unassigned erictune Jan 10, 2017
@zmerlynn
Copy link
Member

@k8s-bot aws test this

@zmerlynn
Copy link
Member

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Jan 10, 2017
@justinsb
Copy link
Member Author

@zmerlynn OK if I reapply LGTM after the rebase I had to do?

@zmerlynn
Copy link
Member

/lgtm

@justinsb yup

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Jan 18, 2017
@k8s-ci-robot
Copy link
Contributor

Jenkins Bazel Build failed for commit 6f632d04cfe06fa4189fb0d60f710cdeb73ccfcd. Full PR test history. cc @justinsb

The magic incantation to run this job again is @k8s-bot bazel test this. Please help us cut down flakes by linking to an open flake issue when you hit one in your PR.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@k8s-github-robot k8s-github-robot removed the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Jan 18, 2017
@k8s-ci-robot
Copy link
Contributor

Jenkins GKE smoke e2e failed for commit 3eec5409f56583bc80912c581c2471ea4053d98a. Full PR test history. cc @justinsb

The magic incantation to run this job again is @k8s-bot cvm gke e2e test this. Please help us cut down flakes by linking to an open flake issue when you hit one in your PR.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@k8s-ci-robot
Copy link
Contributor

Jenkins verification failed for commit 3eec5409f56583bc80912c581c2471ea4053d98a. Full PR test history. cc @justinsb

The magic incantation to run this job again is @k8s-bot verify test this. Please help us cut down flakes by linking to an open flake issue when you hit one in your PR.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

Means we can run in newly announced regions without a code change.

We don't register the ECR provider in new regions, so we will still need
a code change for now.

This also means we do trust config / instance metadata, and don't reject
incorrectly configured zones.

Fix kubernetes#35014
@k8s-ci-robot
Copy link
Contributor

Jenkins GCI GCE e2e failed for commit 04b787b. Full PR test history. cc @justinsb

The magic incantation to run this job again is @k8s-bot gci gce e2e test this. Please help us cut down flakes by linking to an open flake issue when you hit one in your PR.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@justinsb
Copy link
Member Author

@k8s-bot gci gce e2e test this

@k8s-github-robot
Copy link

k8s-github-robot commented Jan 24, 2017

[APPROVALNOTIFIER] Needs approval from an approver in each of these OWNERS Files:

You can indicate your approval by writing /approve in a comment
You can cancel your approval by writing /approve cancel in a comment

@chrislovecnm
Copy link
Contributor

Can we get this cherry picked into 1.5.x??

@chrislovecnm
Copy link
Contributor

@zmerlynn can we get another looks good to me?

@zmerlynn
Copy link
Member

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Jan 24, 2017
@grodrigues3
Copy link
Contributor

@k8s-bot test this

Tests are more than 96 hours old. Re-running tests.

@deads2k
Copy link
Contributor

deads2k commented Jan 24, 2017

Wow, this approval thing is going to be really frustrating. Also, why would it suggest asking yourself for approval??

I trust @zmerlynn to know what this does.

/approve

@zmerlynn
Copy link
Member

zmerlynn commented Jan 24, 2017

@deads2k: Looks like the comment has to start with /approve

@deads2k
Copy link
Contributor

deads2k commented Jan 24, 2017

/approve

1 similar comment
@smarterclayton
Copy link
Contributor

/approve

@k8s-github-robot k8s-github-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jan 24, 2017
@k8s-github-robot
Copy link

@k8s-bot test this [submit-queue is verifying that this PR is safe to merge]

@k8s-ci-robot
Copy link
Contributor

Jenkins GCI GKE smoke e2e failed for commit 04b787b. Full PR test history.

cc @justinsb, your PR dashboard

The magic incantation to run this job again is @k8s-bot gci gke e2e test this. Please help us cut down flakes by linking to an open flake issue when you hit one in your PR.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@k8s-github-robot
Copy link

Automatic merge from submit-queue

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. release-note Denotes a PR that will be considered when it comes time to generate release notes. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet