Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(sdk): Add required auth scopes to RegistryClient for GCP service accounts credentials #10819

Conversation

PChambino
Copy link
Contributor

The scopes are defined in registry context file. Additional scopes must be comma separated.

Fixes #8878. Previous PR #8895 was approved, but tests failed and became stale.

I fixed the tests, and confirmed it worked for my case. Using a GCP Service Account with RegistryClient no longer requires me to explicitly provide the required scopes.

Checklist:

Copy link

Hi @PChambino. Thanks for your PR.

I'm waiting for a kubeflow member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

The scopes are defined in registry context file. Additional scopes must
be comma separated.

Fixes kubeflow#8878. Previous PR kubeflow#8895 was approved, but tests failed and
became stale.

I fixed the tests, and confirmed it worked for my case. Using a GCP
Service Account with RegistryClient no longer needs me to explicitly
provide the required scopes.

Signed-off-by: Pedro Chambino <pchambino@gmail.com>
@PChambino PChambino force-pushed the sdk-kfp-registry-client-google-auth-scopes branch from 4492b38 to 9aa3bd1 Compare May 11, 2024 17:32
@hbelmiro
Copy link
Contributor

/ok-to-test

Copy link

@PChambino: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
kfp-kubernetes-execution-tests 9aa3bd1 link false /test kfp-kubernetes-execution-tests

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@PChambino
Copy link
Contributor Author

@hbelmiro Thanks! I am pretty sure the failing tests are unrelated. They don't seem to be using the RegisteryClient and they fail for me when running them locally on the main branch too. We can see them failing for this recent PR #10750 as well which was merged two weeks ago.

So this shouldn't be a blocker but can you confirm or should we ping the sdk/codeowners?

Copy link
Contributor

@hbelmiro hbelmiro left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

Failing tests seem unrelated.

@rimolive
Copy link
Member

Even though test failure is a non-blocker, it's better check with sdk owners to inspect.

cc @connor-mccarthy

Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: chensun

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@google-oss-prow google-oss-prow bot merged commit 04b4cad into kubeflow:master May 30, 2024
24 of 25 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[sdk] Invalid OAuth Scope error when uploading pipeline to Artifact Registry using Service Account Credentials
4 participants