-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
STOR-1856: add STS hook for EFS credentials request controller #251
STOR-1856: add STS hook for EFS credentials request controller #251
Conversation
@RomanBednar: This pull request references STOR-1856 which is a valid jira issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: RomanBednar The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/cc @openshift/storage |
@RomanBednar: GitHub didn't allow me to request PR reviews from the following users: openshift/storage. Note that only openshift members and repo collaborators can review this PR, and authors cannot review their own PRs. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/retest-required |
d29fcf1
to
1e80562
Compare
@RomanBednar: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
/retest-required |
/label docs-approved |
/lgtm |
/label qe-approved # Check the role ARN propagated to credentialsrequest
$ oc -n openshift-cloud-credential-operator get credentialsrequest/openshift-aws-efs-csi-driver -o json | jq '.spec.providerSpec.stsIAMRoleARN'
"arn:aws:iam::301721915996:role/pewang-0806sts-p2ksf-efs-operator-role"
# Regression e2e test all passed
54 pass, 15 skip (29m10s) |
@RomanBednar: This pull request references STOR-1856 which is a valid jira issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
8b88a33
into
openshift:master
[ART PR BUILD NOTIFIER] Distgit: ose-aws-efs-csi-driver-operator |
[ART PR BUILD NOTIFIER] Distgit: ose-azure-disk-csi-driver-operator |
[ART PR BUILD NOTIFIER] Distgit: azure-file-csi-driver-operator |
[ART PR BUILD NOTIFIER] Distgit: ose-aws-ebs-csi-driver-operator |
[ART PR BUILD NOTIFIER] Distgit: ose-smb-csi-driver-operator |
PR #237 for migrating EFS operator to csi-operator repo was missing credentials request hook - as a result EFS operator was not working in STS clusters due to missing secret:
Patch was tested to verify EFS dynamic provisioning on STS cluster and correct handling of role ARN provided via Operator Hub: