Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix #5608 Support authentication with certificate in exec-credentials #5612

Merged
merged 10 commits into from
Nov 29, 2023

Conversation

qingboooo
Copy link
Contributor

@qingboooo qingboooo commented Nov 27, 2023

Description

Fix #5608

ExecCredentialStatus also contains clientKeyData and clientCertificateData fields

https://kubernetes.io/docs/reference/config-api/client-authentication.v1beta1/#client-authentication-k8s-io-v1beta1-ExecCredentialStatus

Type of change

  • Bug fix (non-breaking change which fixes an issue)
  • Feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to change
  • Chore (non-breaking change which doesn't affect codebase;
    test, version modification, documentation, etc.)

Checklist

  • Code contributed by me aligns with current project license: Apache 2.0
  • I Added CHANGELOG entry regarding this change
  • I have implemented unit tests to cover my changes
  • I have added/updated the javadocs and other documentation accordingly
  • No new bugs, code smells, etc. in SonarCloud report
  • I tested my code in Kubernetes
  • I tested my code in OpenShift

@rohanKanojia
Copy link
Member

@qingboooo : Thanks, is it possible to add some test to validate this?

@qingboooo
Copy link
Contributor Author

qingboooo commented Nov 27, 2023 via email

@qingboooo qingboooo marked this pull request as ready for review November 27, 2023 12:38
@qingboooo qingboooo changed the title Fix #5608 support certificate authentication Fix #5608 Support authentication with certificate in exec-credentials Nov 27, 2023
@qingboooo
Copy link
Contributor Author

qingboooo commented Nov 28, 2023

@rohanKanojia some checks failed, seems some of them are not related to the code change, see my quick analysis below:

Do you have some suggestions? thanks in advance.

@rohanKanojia
Copy link
Member

Openshift CI failure is a known issue #5545 . Other failures might be due to flaky tests

Let's see if we see then on re-runs.

@qingboooo
Copy link
Contributor Author

Openshift CI failure is a known issue #5545 . Other failures might be due to flaky tests

Let's see if we see then on re-runs.

Thanks, checks are passed, do you have a release plan recently? when this change will be merged?

@rohanKanojia
Copy link
Member

It would require review from other team members as well. Maybe in a week or two it might get merged.

Copy link
Contributor

@shawkins shawkins left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@qingboooo thank you for the pr - the tests look great.

@manusa manusa self-assigned this Nov 29, 2023
Signed-off-by: Marc Nuri <[email protected]>
Copy link
Member

@manusa manusa left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, thx!

@manusa manusa added this to the 6.10.0 milestone Nov 29, 2023
Copy link

SonarCloud Quality Gate failed.    Quality Gate failed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell B 3 Code Smells

82.4% 82.4% Coverage
0.0% 0.0% Duplication

warning The version of Java (11.0.21) you have used to run this analysis is deprecated and we will stop accepting it soon. Please update to at least Java 17.
Read more here

idea Catch issues before they fail your Quality Gate with our IDE extension sonarlint SonarLint

@manusa manusa merged commit d729dd8 into fabric8io:main Nov 29, 2023
18 of 20 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Support authentication with certificate in exec-credentials
4 participants