-
Notifications
You must be signed in to change notification settings - Fork 46
Pass non-driver volumeAttributes to the created CertificateRequest #212
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Hi @Cisien. Thanks for your PR. I'm waiting for a cert-manager member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Hi @Cisien, thanks for your contribution! This all looks pretty good to me, especially since the code change itself is so small. /ok-to-test |
unit-tests currently fail because annotations are being returned. Unless there's a reason not to, i'll update this test to not fail based on annotations not being nil Edit: Instead i'll update the logic to exclude the "csi.storage.k8s.io" group name |
Signed-off-by: Chris Curwick <[email protected]>
I have updated the tests to expect annotations to no longer be nil, and excluded the csi.storage.k8s.io group from being included in the annotations added to the CertificateRequest. /retest |
the test failure of the e2e test appears to be unrelated to my change. {"component":"entrypoint","file":"k8s.io/test-infra/prow/entrypoint/run.go:173","func":"k8s.io/test-infra/prow/entrypoint.Options.ExecuteProcess","level":"error","msg":"Entrypoint received interrupt: terminated","severity":"error","time":"2024-03-07T18:44:07Z"} |
requesting a re-test in case it was simply transient. |
@ThatsMrTalbot Tests are passing again. Are you okay with the most recent change? |
Tests look good, I've also tried it locally and it all works as expected /lgtm |
For the purpose of my planning, what is a reasonable timeline to expect for getting this merged and into a release? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/approve
Thansk for raising this and thank for the reviews!
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: SgtCoDFish The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
This was released with https://github.com/cert-manager/csi-driver/releases/tag/v0.8.0 |
[CI] Self-upgrade merging self-upgrade-main into main
This change provides alignment between the csi-driver and the Certificate resource by passing non-standard volumeAttributes defined on the csi volume through to the generated CertificateRequest. This behavior exists when cert-manager consumes the Certificate resource, allowing custom values to be passed on to the issuer that is signing the certificate.
In my use case, I depend on several values that need to be forwarded to the signing service. I have implemented this in the external issuer as annotations on the CertificateRequest.
A (sanitized) example of a Certificate resource:
With this change, I will be able to define the same CertificateRequest using the following volume spec