-
Notifications
You must be signed in to change notification settings - Fork 1.4k
🌱Use inCluster kubeconfig if empty var provided #11865
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
🌱Use inCluster kubeconfig if empty var provided #11865
Conversation
5ff9e33 to
d8b6f51
Compare
|
/test pull-cluster-api-e2e-blocking-main |
|
/test pull-cluster-api-e2e-main |
|
/lgtm |
|
LGTM label has been added. Git tree hash: 439ad1d61b4c83b248895e91c1644cf43378221c
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/approve
|
[APPROVALNOTIFIER] This PR is APPROVED Approval requirements bypassed by manually added approval. This pull-request has been approved by: vincepri The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
This was apparently a breaking change for CAPZ tests: see kubernetes-sigs/cluster-api-provider-azure#5530 and kubernetes-sigs/cluster-api-provider-azure#5533. I'd appreciate some advice on how to work around this change. |
|
How did this break your test? I.e. in which case & how is it failing because of this change? |
|
Apparently CAPZ was relying on the default behavior of I think I've worked around it when updating to v1.9.6 by adding this line to our test setup before we create bootstrap clusters: kubeconfigPath = clientcmd.NewDefaultClientConfigLoadingRules().GetDefaultFilename() |
|
Ah, I see. That is a good point |
What this PR does / why we need it:
The current cluster_proxy behaves differently from what is expected for empty kubeconfig variables in kubectl load rules.
The behaviour forbids the usage of cluster proxy inside the pod in the cluster.
This checks the possibility of in-cluster configuration and keeps the same behaviour, which is not found.
/area testing