-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
replace behavior for @aws hostnameOverride #7185
Conversation
Hi @jacksontj. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/ok-to-test |
eb66d02
to
d223c63
Compare
The failures now seem to be related to bazel; but I don't see docs anywhere on what I should be updating to make bazel happy with the new imports :/ |
b66b834
to
356e858
Compare
356e858
to
a0f93f8
Compare
a0f93f8
to
7780430
Compare
@mikesplain tests are passing now :) |
cc @KashifSaadat and @rdrgmnzs (since they are marked as reviewers) This unblocks usage of NodeAuthorizer in AWS VPCs with DHCP options set. |
cc @gambol99 (since it seems that you own the NodeAuthorizer stuff) :) |
If the cluster's VPC includes DHCP options the local-hostname includes the DHCP zone instead of the private DNS name from AWS (which is what k8s uses regardless of flags). This patch simply makes the hostnameOverride implementation match by using the AWS api to get the private DNS name Related to kubernetes#7172
7780430
to
ea61fb8
Compare
Interesting, I just squashed the commits and now the tests are failing.. have to look into this but I expect some issue with the testing harness |
/test pull-kops-e2e-kubernetes-aws |
Thanks for tracking down the project @jacksontj ... I'm inclined to go with this fix as it matches the aws cloudprovider code. It's a new EC2 call, but it's only one, and we should have the IAM role anyway because kubelet needs it. It should be no-change in the case of users not using a custom DHCP domain. (We probably should also clean up the code duplication here!) /lgtm |
I agree, I just figured we should get the fix in sooner rather than later (especially since the duplication was already there ;) ) Also seems that tests are passing now, so ready to merge :) Once this is merged I'll open backports for this like my other patches. |
We talked about this in office-hours ... /approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: jacksontj, justinsb The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Cherry pick of #7185 onto release-1.13
Cherry pick of #7185 onto release-1.14
…5-upstream-release-1.12 Automated cherry pick of #7185: Replace behavior for aws hostnameOverride
Potential fix for #7172