-
Notifications
You must be signed in to change notification settings - Fork 143
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bug 1954765: v1beta1 to v1 mutatingwebhookconfiguration #333
Bug 1954765: v1beta1 to v1 mutatingwebhookconfiguration #333
Conversation
b783b33
to
12908d4
Compare
New kubernetes versions have removed support for v1beta1 MutatingWebhookConfiguration CRs. Migrate to deploying v1. Update pod-identity-webhook ClusterRole to grant permissions around certificatesigningrequests (fixes `E0503 15:37:23.227864 1 certificate_manager.go:434] Failed while requesting a signed certificate from the master: cannot create certificate signing request : certificatesigningrequests.certificates.k8s.io is forbidden: User "system:serviceaccount:openshift-cloud-credential-operator:pod-identity-webhook" cannot creat e resource "certificatesigningrequests" in API group "certificates.k8s.io" at the cluster scope`). Add the newly required `admissionReviewVersions` field to the v1 MutatingWebhookConfiguration. Update awspodidentity controller to stop reading in v1beta1 versions of MutatingWebhookConfiguration CRs.
12908d4
to
7797601
Compare
@joelddiaz: This pull request references Bugzilla bug 1954765, which is valid. The bug has been moved to the POST state. The bug has been updated to refer to the pull request using the external bug tracker. 3 validation(s) were run on this bug
Requesting review from QA contact: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/assign @dgoodwin |
/retest |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
@dgoodwin PTAL |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: dgoodwin, joelddiaz The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@joelddiaz: All pull requests linked via external trackers have merged: Bugzilla bug 1954765 has been moved to the MODIFIED state. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
New kubernetes versions have removed support for v1beta1
MutatingWebhookConfiguration CRs. Migrate to deploying v1.
Update pod-identity-webhook ClusterRole to grant permissions around
certificatesigningrequests (fixes
E0503 15:37:23.227864 1 certificate_manager.go:434] Failed while requesting a signed certificate from the master: cannot create certificate signing request: certificatesigningrequests.certificates.k8s.io is forbidden: User "system:serviceaccount:openshift-cloud-credential-operator:pod-identity-webhook" cannot create resource "certificatesigningrequests" in API group "certificates.k8s.io" at the cluster scope
).Add the newly required
admissionReviewVersions
field to the v1MutatingWebhookConfiguration.
Update awspodidentity controller to stop reading in v1beta1 versions of
MutatingWebhookConfiguration CRs.