{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":634928406,"defaultBranch":"master","name":"csi-driver-smb","ownerLogin":"yerenkow","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2023-05-01T15:13:10.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/1080762?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1684530297.733909","currentOid":""},"activityList":{"items":[{"before":"d7c86af05258661b0755c070e2e2c3a1af8ff7a7","after":"384f709e8c7f1a0d433e84c310d51e4f3937332b","ref":"refs/heads/cleanup-kerberos-tickets","pushedAt":"2023-05-20T13:49:57.392Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"yerenkow","name":null,"path":"/yerenkow","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1080762?s=80&v=4"},"commit":{"message":"Cleaning kerberos cache files on unstage phase\n\nExtending initial support for kerberos-based ticket mounting.\nPreviously, cache has been written directly to the expected file - krb5cc_*.\nWith this change, cache is written to the base64(volumeID) file,\nand then symlink krb5cc_* created pointing to the file with the cache.\nDuring unstage phase only volumeID and mount path is available, and\nhaving volumeID it's possible to do the cleanup with simple traversing\ndirectory containing the caches.","shortMessageHtmlLink":"Cleaning kerberos cache files on unstage phase"}},{"before":"f8bbd04b133b02c44b5e57aea57224b1e2d00ad9","after":"d7c86af05258661b0755c070e2e2c3a1af8ff7a7","ref":"refs/heads/cleanup-kerberos-tickets","pushedAt":"2023-05-20T13:18:03.043Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"yerenkow","name":null,"path":"/yerenkow","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1080762?s=80&v=4"},"commit":{"message":"Cleaning kerberos cache files on unstage phase\n\nExtending initial support for kerberos-based ticket mounting.\nPreviously, cache has been written directly to the expected file - krb5cc_*.\nWith this change, cache is written to the base64(volumeID) file,\nand then symlink krb5cc_* created pointing to the file with the cache.\nDuring unstage phase only volumeID and mount path is available, and\nhaving volumeID it's possible to do the cleanup with simple traversing\ndirectory containing the caches.","shortMessageHtmlLink":"Cleaning kerberos cache files on unstage phase"}},{"before":"5f132fc3fb48a6dad76a660d07b32709a231d4df","after":"f8bbd04b133b02c44b5e57aea57224b1e2d00ad9","ref":"refs/heads/cleanup-kerberos-tickets","pushedAt":"2023-05-20T02:56:52.897Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"yerenkow","name":null,"path":"/yerenkow","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1080762?s=80&v=4"},"commit":{"message":"Cleaning kerberos cache files on unstage phase\n\nExtending initial support for kerberos-based ticket mounting.\nPreviously, cache has been written directly to the expected file - krb5cc_*.\nWith this change, cache is written to the base64(volumeID) file,\nand then symlink krb5cc_* created pointing to the file with the cache.\nDuring unstage phase only volumeID and mount path is available, and\nhaving volumeID it's possible to do the cleanup with simple traversing\ndirectory containing the caches.","shortMessageHtmlLink":"Cleaning kerberos cache files on unstage phase"}},{"before":"beaf2a436a371717659d5ffd8bbc6d0aff67cf97","after":"5f132fc3fb48a6dad76a660d07b32709a231d4df","ref":"refs/heads/cleanup-kerberos-tickets","pushedAt":"2023-05-19T23:44:44.213Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"yerenkow","name":null,"path":"/yerenkow","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1080762?s=80&v=4"},"commit":{"message":"Cleaning kerberos cache files on unstage phase\n\nExtending initial support for kerberos-based ticket mounting.\nPreviously, cache has been written directly to the expected file - krb5cc_*.\nWith this change, cache is written to the base64(volumeID) file,\nand then symlink krb5cc_* created pointing to the file with the cache.\nDuring unstage phase only volumeID and mount path is available, and\nhaving volumeID it's possible to do the cleanup with simple traversing\ndirectory containing the caches.","shortMessageHtmlLink":"Cleaning kerberos cache files on unstage phase"}},{"before":null,"after":"beaf2a436a371717659d5ffd8bbc6d0aff67cf97","ref":"refs/heads/cleanup-kerberos-tickets","pushedAt":"2023-05-19T21:04:57.733Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"yerenkow","name":null,"path":"/yerenkow","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1080762?s=80&v=4"},"commit":{"message":"Cleaning kerberos cache files on unstage phase\n\nExtending initial support for kerberos-based ticket mounting.\nPreviously, cache has been written directly to the expected file - krb5cc_*.\nWith this change, cache is written to the base64(volumeID) file,\nand then symlink krb5cc_* created pointing to the file with the cache.\nDuring unstage phase only volumeID and mount path is available, and\nhaving volumeID it's possible to do the cleanup with simple traversing\ndirectory containing the caches.","shortMessageHtmlLink":"Cleaning kerberos cache files on unstage phase"}},{"before":"91c55ab1df037a81a75c37e429fa67cc6e72cb41","after":"9e4406197700ee85a8907e686984834b44e6ea0e","ref":"refs/heads/master","pushedAt":"2023-05-19T16:46:11.094Z","pushType":"push","commitsCount":28,"pusher":{"login":"yerenkow","name":null,"path":"/yerenkow","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1080762?s=80&v=4"},"commit":{"message":"Merge pull request #621 from kubernetes-csi/dependabot/go_modules/golang.org/x/net-0.10.0\n\nchore(deps): bump golang.org/x/net from 0.7.0 to 0.10.0","shortMessageHtmlLink":"Merge pull request kubernetes-csi#621 from kubernetes-csi/dependabot/…"}},{"before":"57cf14018853e47104b97e2e534e4a6c23579b37","after":"d9aa489da5d816a0bb1fe1554961b58bc2e064db","ref":"refs/heads/support-kerberos-ticket","pushedAt":"2023-05-05T17:39:02.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"yerenkow","name":null,"path":"/yerenkow","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1080762?s=80&v=4"},"commit":{"message":"Adding support for sec=krb5 mounting\n\nWhen mounting with kerberos security, ticket cache\nis expected to be set up on the host, pointing to the\n/var/lib/kubelet/kubernetes/krb5cc_${uid}.\nCredential cache is then taken from the creds secret and\nwritten to the file, that is available to the host for\nusing.","shortMessageHtmlLink":"Adding support for sec=krb5 mounting"}},{"before":"56f67427573b18b84dd8921397a1febb633ffbb7","after":"57cf14018853e47104b97e2e534e4a6c23579b37","ref":"refs/heads/support-kerberos-ticket","pushedAt":"2023-05-03T15:49:42.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"yerenkow","name":null,"path":"/yerenkow","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1080762?s=80&v=4"},"commit":{"message":"Adding support for sec=krb5 mounting\n\nWhen mounting with kerberos security, ticket cache\nis expected to be set up on the host, pointing to the\n/var/lib/kubelet/kubernetes/krb5cc_${uid}.\nCredential cache is then taken from the creds secret and\nwritten to the file, that is available to the host for\nusing.","shortMessageHtmlLink":"Adding support for sec=krb5 mounting"}},{"before":"fe9fbdf56e86162b64092659e5c96d686ca023f8","after":"56f67427573b18b84dd8921397a1febb633ffbb7","ref":"refs/heads/support-kerberos-ticket","pushedAt":"2023-05-03T15:46:12.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"yerenkow","name":null,"path":"/yerenkow","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1080762?s=80&v=4"},"commit":{"message":"Adding support for sec=krb5 mounting\n\nWhen mounting with kerberos security, ticket cache\nis expected to be set up on the host, pointing to the\n/var/lib/kubelet/kubernetes/krb5cc_${uid}.\nCredential cache is then taken from the creds secret and\nwritten to the file, that is available to the host for\nusing.","shortMessageHtmlLink":"Adding support for sec=krb5 mounting"}},{"before":null,"after":"fe9fbdf56e86162b64092659e5c96d686ca023f8","ref":"refs/heads/support-kerberos-ticket","pushedAt":"2023-05-02T17:56:26.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"yerenkow","name":null,"path":"/yerenkow","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1080762?s=80&v=4"},"commit":{"message":"Adding support for sec=krb5 mounting\n\nWhen mounting with kerberos security, ticket cache\nis expected to be set up on the host, pointing to the\n/var/lib/kubelet/kubernetes/krb5cc_${uid}.\nCredential cache is then taken from the creds secret and\nwritten to the file, that is available to the host for\nusing.","shortMessageHtmlLink":"Adding support for sec=krb5 mounting"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAADMLI7wQA","startCursor":null,"endCursor":null}},"title":"Activity · yerenkow/csi-driver-smb"}