-
Notifications
You must be signed in to change notification settings - Fork 191
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add configuration for file permission #751
Conversation
* feat: implements outbound proxy support for arc extension Signed-off-by: Nilekh Chaudhari <1626598+nilekhc@users.noreply.github.com>
Signed-off-by: Nilekh Chaudhari <1626598+nilekhc@users.noreply.github.com>
Signed-off-by: Nilekh Chaudhari <1626598+nilekhc@users.noreply.github.com>
Signed-off-by: Nilekh Chaudhari <1626598+nilekhc@users.noreply.github.com>
Codecov Report
@@ Coverage Diff @@
## master #751 +/- ##
==========================================
- Coverage 62.09% 62.02% -0.08%
==========================================
Files 7 7
Lines 765 782 +17
==========================================
+ Hits 475 485 +10
- Misses 257 263 +6
- Partials 33 34 +1 |
/azp run pr-e2e-azure |
Azure Pipelines successfully started running 1 pipeline(s). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added few comments! To summarize,
- If no file permission is provided, we should default to the permission provided by the driver (same as today). This can be done when the objects to retrieve are unmarshalled.
- The validation for file permission should happen before actual call to keyvault to avoid making keyvault API calls when final result is an error.
Let's move the validation to a function so we can also unit test it
Signed-off-by: Nilekh Chaudhari <1626598+nilekhc@users.noreply.github.com>
/azp run pr-e2e-azure |
Azure Pipelines successfully started running 1 pipeline(s). |
Signed-off-by: Nilekh Chaudhari <1626598+nilekhc@users.noreply.github.com>
Signed-off-by: Nilekh Chaudhari <1626598+nilekhc@users.noreply.github.com>
/azp run pr-e2e-azure |
Azure Pipelines successfully started running 1 pipeline(s). |
Signed-off-by: Nilekh Chaudhari <1626598+nilekhc@users.noreply.github.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could we also an e2e test to validate this change?
Signed-off-by: Nilekh Chaudhari <1626598+nilekhc@users.noreply.github.com>
Signed-off-by: Nilekh Chaudhari <1626598+nilekhc@users.noreply.github.com>
Signed-off-by: Nilekh Chaudhari <1626598+nilekhc@users.noreply.github.com>
Signed-off-by: Nilekh Chaudhari <1626598+nilekhc@users.noreply.github.com>
Signed-off-by: Nilekh Chaudhari <1626598+nilekhc@users.noreply.github.com>
Signed-off-by: Nilekh Chaudhari <1626598+nilekhc@users.noreply.github.com>
Signed-off-by: Nilekh Chaudhari <1626598+nilekhc@users.noreply.github.com>
/azp run pr-e2e-azure |
Azure Pipelines successfully started running 1 pipeline(s). |
Signed-off-by: Nilekh Chaudhari <1626598+nilekhc@users.noreply.github.com>
/azp run pr-e2e-azure |
Azure Pipelines successfully started running 1 pipeline(s). |
I have added e2e tests for kind cluster. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The changes look good! Could you update the documentation here to add the new field? You can add available for version > v1.1.0
so users know it's not yet released.
Signed-off-by: Nilekh Chaudhari <1626598+nilekhc@users.noreply.github.com>
added. |
Signed-off-by: Nilekh Chaudhari <1626598+nilekhc@users.noreply.github.com>
Reason for Change:
This PR adds support for file permission for secrets being written to the pod.
Requirements
Issue Fixed:
fixes #712
Does this change contain code from or inspired by another project?
If "Yes," did you notify that project's maintainers and provide attribution?
Special Notes for Reviewers: