Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

control-service: fix integration tests #1211

Merged
merged 1 commit into from
Oct 5, 2022

Conversation

antoniivanov
Copy link
Collaborator

@antoniivanov antoniivanov commented Oct 4, 2022

Latest changes in Kubernetes have broken our KUBECONFIG which uses older version of API resource and we get errors like "invalid apiVersion "client.authentication.k8s.io/v1alpha1" (similar to aws/aws-cli#6920)

I am upgrading things around to fix it.

Amazon EKS uses the aws eks get-token command, available in version 1.16.156 or later. Until now we used aws-iam-authenticator but it seems latest changes in Kubernetes do not work there.

I have also regenerated the KUBECONFIG and updated in Gitlab CI Variables (using https://docs.aws.amazon.com/eks/latest/userguide/create-kubeconfig.html)

Signed-off-by: Antoni Ivanov aivanov@vmware.com

Amazon EKS uses the aws eks get-token command, available in version
1.16.156 or later

Latest changes in Kubernetes have broken our KUBECONFIG which uses older
version of API resource and we get errors like "invalid apiVersion
"client.authentication.k8s.io/v1alpha1"

I am upgrading everything I see around to try to fix it.

I have also regenerated the KUBECONFIG and updated in Gitlab CI
Variables (using https://aws.amazon.com/premiumsupport/knowledge-center
/eks-generate-kubeconfig-file-for-cluster/)

Signed-off-by: Antoni Ivanov <aivanov@vmware.com>
@antoniivanov antoniivanov marked this pull request as ready for review October 4, 2022 18:34
@antoniivanov antoniivanov merged commit c967637 into main Oct 5, 2022
@antoniivanov antoniivanov deleted the person/aivanov/control-service-kube branch October 5, 2022 08:16
antoniivanov added a commit that referenced this pull request Oct 6, 2022
Same change as in #1211

Signed-off-by: Antoni Ivanov <aivanov@vmware.com>
@@ -27,11 +27,8 @@
variables:
_JAVA_OPTIONS: "-Xms2048m -Xmx4096m"
before_script:
- apk --no-cache add git openjdk11-jdk curl --repository=http://dl-cdn.alpinelinux.org/alpine/edge/community
- curl -o aws-iam-authenticator https://amazon-eks.s3.us-west-2.amazonaws.com/1.21.2/2021-07-05/bin/linux/amd64/aws-iam-authenticator
- chmod +x ./aws-iam-authenticator
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Amazon EKS uses the aws eks get-token command, available in version 1.16.156 or later. Until now we used aws-iam-authenticator but it seems latest changes in Kubernetes do not work there.

Could you link the official docs used in terms of aws-iam-authenticator changes required? For traceability on what has changed, and how

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

They are linked in the PR. All the context I have is in aws/aws-cli#6920
I am not 100% sure why it happened now.

I decided to fix it by upgrading the KUBECONFIG and the way its used following https://docs.aws.amazon.com/eks/latest/userguide/create-kubeconfig.html

antoniivanov added a commit that referenced this pull request Oct 7, 2022
Same change as in #1211

Signed-off-by: Antoni Ivanov <aivanov@vmware.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants