-
Notifications
You must be signed in to change notification settings - Fork 39.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support cluster using network resources (VNet, LB, IP, etc.) across AAD Tenants. #88384
Support cluster using network resources (VNet, LB, IP, etc.) across AAD Tenants. #88384
Conversation
Welcome @bowen5! |
Hi @bowen5. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/priority important-soon |
@bowen5 looks like bazel is broken, pls run following check first before sending out PR:
|
333f188
to
db52672
Compare
staging/src/k8s.io/legacy-cloud-providers/azure/auth/azure_auth.go
Outdated
Show resolved
Hide resolved
staging/src/k8s.io/legacy-cloud-providers/azure/auth/azure_auth.go
Outdated
Show resolved
Hide resolved
staging/src/k8s.io/legacy-cloud-providers/azure/clients/vmclient/azure_vmclient.go
Outdated
Show resolved
Hide resolved
staging/src/k8s.io/legacy-cloud-providers/azure/clients/vmssclient/azure_vmssclient.go
Outdated
Show resolved
Hide resolved
staging/src/k8s.io/legacy-cloud-providers/azure/clients/vmssvmclient/azure_vmssvmclient.go
Outdated
Show resolved
Hide resolved
staging/src/k8s.io/legacy-cloud-providers/azure/auth/azure_auth.go
Outdated
Show resolved
Hide resolved
Done. Thank you. |
staging/src/k8s.io/legacy-cloud-providers/azure/auth/azure_auth.go
Outdated
Show resolved
Hide resolved
staging/src/k8s.io/legacy-cloud-providers/azure/auth/azure_auth.go
Outdated
Show resolved
Hide resolved
/test pull-kubernetes-e2e-aks-engine-azure |
/retest |
1 similar comment
/retest |
/test pull-kubernetes-verify |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
looks good, thanks for addressing comments. Could you squash the commits?
/milestone v1.18 |
534dc71
to
b38ed04
Compare
Sure. Done. Thank you. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/approve
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: bowen5, feiskyer The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Hey @bowen5 👋, may I ask you to remove the The explicit |
Hey @saschagrunert , sorry about that as I'm new to this project :). I've rephrased the release notes section to make it more user friendly. Meanwhile, would you please kindly guide me that how could I make change if I want the statement in my release notes only appear in "Changes by Kind" -> "Feature" section instead of "Urgent Upgrade Notes" section? Since I think this change is only important for those who want to use this feature but not for all K8s audience. Putting in "Urgent Upgrade Notes" section might introduce unnecessary noise to them. Thank you! |
Thank you 🙏 @bowen5 I think we’re all set. Now the note will only appear in the kind/feature section if we re-generate them. If you want, then you could adjust the note manually in two PRs for the master and release-1.18 branch. :) |
Awesome, I'll leave the re-generation flow to do that. Thank you @saschagrunert ! |
What type of PR is this?
/kind feature
What this PR does / why we need it:
This PR is on target to enable the scenario that Kubernetes Clusters deployed on Azure can create/use Azure Network Resources (VNet, LB, IP, RouteTable, etc.) in a different AAD Tenant than the one cluster located in.
Which issue(s) this PR fixes:
N/A
Special notes for your reviewer:
This PR need to catch Kubernetes release v1.18. Thank you.
Does this PR introduce a user-facing change?:
Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.: