-
Notifications
You must be signed in to change notification settings - Fork 40.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add kubeconfig file properly #3316
add kubeconfig file properly #3316
Conversation
This reverts commit 02dbad7.
Rebase? (I was about to double check the GKE provider as well but couldn't just yet.) |
b03fbf9 rather. |
25dd3cf
to
cf462b3
Compare
@smarterclayton The rebase required changes in pkg/client/helper.go where behavior of defaultServerUrlFor changed. You'll want to look at the last commit to see if you agree. |
Hm. This may be clutter in my home directory, but:
As a note, I previously had both GCE and GKE E2E clusters up, so it may be confused. But ... is this some sort of upgrade behavior gone awry? (Sorry, just trying to vet this for cluster creation on the GKE provider, because it's about to get enabled on Jenkins.) |
Yeah, I think this is currently failing to create clusters with the GKE provider (sorry). I removed |
@zmerlynn I'm most appreciative. Do you have a .kubeconfig file? One possibility is that you have a .kubeconfig file that specifies a client cert and you're also specifying a --auth-path or you could be trying to expression both --auth-path and --client-certificate . I think it probably makes sense for me to eliminate the restriction of a single means of identification for now, to be revisited at a later time. |
I need to disappear for the day, but perhaps @jlowdermilk or @mbforbes can help answer questions. I don't have a specific .kubeconfig file - this just a plain out-of-box config (that I tried to roll back to vanilla, but that's remarkably fidgety). If you have Google Compute access, you should be able to run the GKE provider as well, so it's not too hard to test on your side. But yes, removing that restriction sounds wise. :) |
I can take a look. Attempting to run gce/gke e2e now. |
@jlowdermilk: You may not want to assign unless you want to review the whole thing. :) I was just doing a sniff test on GKE cluster creation by taking the pull request into a local branch (since it broke GCE yesterday). |
@deads2k: FWIW, I'm totally excited for this to land finally. Looking forward to parallel configs without having to hack around it. |
@zmerlynn, yup, that's intentional, I reviewed most of this already in #2861. @deads2k, for GKE at least, the problem is what you suggested. gcloud specifies both --auth-path and --client-certificate. It does this because it is using an older template of the kubernetes_auth file that contains only "User" and "Password". We can fix that in a future release, but for now, is it reasonable to allow both authFile and clientCert and merge them in that order? |
@jlowdermilk I'm working on doing that now. I've got to get the different merge orders and defaulting correct. I'll have it this afternoon. |
6073f54
to
138254a
Compare
@jlowdermilk Rebased, clean travis, and my hack/e2e-test.sh using the GCE provider finished clean. You should definitely take the time to review "fixes e2e failure on gce with new .kubeconfig, kick travis". The loading rules are significantly more complex that they were in #2861, but I think I've broken them down enough to be understandable. EDIT
|
138254a
to
60a46e7
Compare
LGTM |
Ready to try again.... :) |
This restores #2861, but it has an additional commit to fix two problems with loading existing .kubernetes_auth files that caused the e2e failure forcing #3282.
@derekwaynecarr Can you please take a look?