-
Notifications
You must be signed in to change notification settings - Fork 39.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: Allow automatic ACR auth in private Azure clouds #90425
fix: Allow automatic ACR auth in private Azure clouds #90425
Conversation
Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please follow instructions at https://git.k8s.io/community/CLA.md#the-contributor-license-agreement to sign the CLA. It may take a couple minutes for the CLA signature to be fully registered; after that, please reply here with a new comment and we'll verify. Thanks.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Welcome @DavidParks8! |
Hi @DavidParks8. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
e58d9af
to
9d68467
Compare
/area provider/azure |
@feiskyer @andyzhangx PTAL |
/ok-to-test |
/retest |
/retest |
@andyzhangx can I please get an official lgtm now that the flakey tests have passed? I will also need this change squash merged because I do not have merge rights. Thanks for your time! |
can you squash the commits first? thanks |
818ad00
to
d805661
Compare
Squashed. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/approve
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: andyzhangx, DavidParks8 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
BTW, this PR is for Azure stack, right? @DavidParks8 |
The PR is for private Azure clouds, including Azure stack. |
d805661
to
333b049
Compare
@DavidParks8: The following test failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
/test pull-kubernetes-e2e-aks-engine-azure |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
…0425-upstream-release-1.16 Automated cherry pick of #90425: fix: ACR auth fails in private azure clouds
…0425-upstream-release-1.17 Automated cherry pick of #90425: fix: ACR auth fails in private azure clouds
…0425-upstream-release-1.18 Automated cherry pick of #90425: fix: ACR auth fails in private azure clouds
What type of PR is this?
/kind bug
What this PR does / why we need it:
Provides a fix to allow a cluster in a private Azure cloud to authenticate to ACR in the same cloud.
Which issue(s) this PR fixes:
Fixes #90412
Does this PR introduce a user-facing change?:
NONE