Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

NE-1323: Add default to AWS credentials field #199

Merged
merged 1 commit into from
Oct 26, 2023

Conversation

gcs278
Copy link
Contributor

@gcs278 gcs278 commented Sep 28, 2023

By adding a default value to the spec.provider.aws.credentials field, it enables the configuration of spec.provider.aws.assumeRole for an OpenShift user that doesn't need to explicitly specify the credentials field. Otherwise, an OpenShift user must manually insert "" as the credentials name to use the assumeRole field.

This improves user experience for the current v1beta1 release of ExternalDNS Operator while not introducing any breaking changes to the API. We are planning to properly fix this issue in a future ExternalDNS Operator API version by converting Credentials to an optional pointer.

Epic: https://issues.redhat.com/browse/NE-1299

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Sep 28, 2023
@openshift-ci-robot
Copy link

openshift-ci-robot commented Sep 28, 2023

@gcs278: This pull request references NE-1323 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.15.0" version, but no target version was set.

In response to this:

By adding a default value to the spec.provider.aws.credentials field, it enables the configuration of spec.provider.aws.assumeRole for an OpenShift user that doesn't need to explicitly specify the credentials field. Otherwise, an OpenShift user must manually insert "" as the credentials name to use the assumeRole field.

This improves user experience for the current v1beta1 release of ExternalDNS Operator while not introducing any breaking changes to the API. We are planning to properly fix this issue in a future ExternalDNS Operator API version by converting Credentials to an optional pointer.

Epic: https://issues.redhat.com/browse/NE-1299

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci openshift-ci bot requested review from knobunc and rfredette September 28, 2023 19:18
@gcs278 gcs278 force-pushed the shared-vpc-API-default branch from ecc4cbe to a926f16 Compare September 28, 2023 21:40
By adding a default value to the spec.provider.aws.credentials field,
it enables the configuration of spec.provider.aws.assumeRole for an
OpenShift user that doesn't need to explicitly specify the credentials
field. Otherwise, an OpenShift user must manually insert "" as the
credentials name to use the assumeRole field. Revert docs update about
requiring to add empty ("") credentials field.
@alebedev87
Copy link
Contributor

/retest

@alebedev87
Copy link
Contributor

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Sep 29, 2023
@openshift-ci-robot
Copy link

openshift-ci-robot commented Sep 29, 2023

@gcs278: This pull request references NE-1323 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.15.0" version, but no target version was set.

In response to this:

By adding a default value to the spec.provider.aws.credentials field, it enables the configuration of spec.provider.aws.assumeRole for an OpenShift user that doesn't need to explicitly specify the credentials field. Otherwise, an OpenShift user must manually insert "" as the credentials name to use the assumeRole field.

This improves user experience for the current v1beta1 release of ExternalDNS Operator while not introducing any breaking changes to the API. We are planning to properly fix this issue in a future ExternalDNS Operator API version by converting Credentials to an optional pointer.

Epic: https://issues.redhat.com/browse/NE-1299

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Sep 29, 2023

@gcs278: all tests passed!

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@alebedev87
Copy link
Contributor

/approve

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Sep 29, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: alebedev87

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Sep 29, 2023
@openshift-ci-robot
Copy link

openshift-ci-robot commented Sep 29, 2023

@gcs278: This pull request references NE-1323 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.15.0" version, but no target version was set.

In response to this:

By adding a default value to the spec.provider.aws.credentials field, it enables the configuration of spec.provider.aws.assumeRole for an OpenShift user that doesn't need to explicitly specify the credentials field. Otherwise, an OpenShift user must manually insert "" as the credentials name to use the assumeRole field.

This improves user experience for the current v1beta1 release of ExternalDNS Operator while not introducing any breaking changes to the API. We are planning to properly fix this issue in a future ExternalDNS Operator API version by converting Credentials to an optional pointer.

Epic: https://issues.redhat.com/browse/NE-1299

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@gcs278
Copy link
Contributor Author

gcs278 commented Sep 29, 2023

Going to put a hold on this while we get approval from docs, px, and qe and finish up enhancement review.
/hold

@openshift-ci openshift-ci bot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Sep 29, 2023
@openshift-ci-robot
Copy link

openshift-ci-robot commented Sep 29, 2023

@gcs278: This pull request references NE-1323 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.15.0" version, but no target version was set.

In response to this:

By adding a default value to the spec.provider.aws.credentials field, it enables the configuration of spec.provider.aws.assumeRole for an OpenShift user that doesn't need to explicitly specify the credentials field. Otherwise, an OpenShift user must manually insert "" as the credentials name to use the assumeRole field.

This improves user experience for the current v1beta1 release of ExternalDNS Operator while not introducing any breaking changes to the API. We are planning to properly fix this issue in a future ExternalDNS Operator API version by converting Credentials to an optional pointer.

Epic: https://issues.redhat.com/browse/NE-1299

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@ahardin-rh
Copy link

/label docs-approved

@openshift-ci openshift-ci bot added the docs-approved Signifies that Docs has signed off on this PR label Oct 12, 2023
@melvinjoseph86
Copy link

/label qe-approved

@openshift-ci openshift-ci bot added the qe-approved Signifies that QE has signed off on this PR label Oct 13, 2023
@openshift-ci-robot
Copy link

openshift-ci-robot commented Oct 13, 2023

@gcs278: This pull request references NE-1323 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.15.0" version, but no target version was set.

In response to this:

By adding a default value to the spec.provider.aws.credentials field, it enables the configuration of spec.provider.aws.assumeRole for an OpenShift user that doesn't need to explicitly specify the credentials field. Otherwise, an OpenShift user must manually insert "" as the credentials name to use the assumeRole field.

This improves user experience for the current v1beta1 release of ExternalDNS Operator while not introducing any breaking changes to the API. We are planning to properly fix this issue in a future ExternalDNS Operator API version by converting Credentials to an optional pointer.

Epic: https://issues.redhat.com/browse/NE-1299

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@gcs278
Copy link
Contributor Author

gcs278 commented Oct 26, 2023

/unhold
We have approval on openshift/enhancements#1436 (minus some minor comments) so I am proceeding with the implementation PRs.
CC: @Miciah

@openshift-ci openshift-ci bot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Oct 26, 2023
@CFields651
Copy link

/label px-approved

@openshift-ci openshift-ci bot added the px-approved Signifies that Product Support has signed off on this PR label Oct 26, 2023
@openshift-ci openshift-ci bot merged commit 049d22c into openshift:main Oct 26, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. docs-approved Signifies that Docs has signed off on this PR jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged. px-approved Signifies that Product Support has signed off on this PR qe-approved Signifies that QE has signed off on this PR
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants