-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add AWS region to the AWS Config Cache key #6134
base: main
Are you sure you want to change the base?
Conversation
e025102
to
a67350c
Compare
a67350c
to
569eeb9
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The build is broken
Signed-off-by: Maksymilian Boguń <[email protected]>
569eeb9
to
8e5b30f
Compare
Signed-off-by: Maksymilian Boguń <[email protected]>
8e5b30f
to
baa3cc1
Compare
@zroubalik I fixed the build |
/run-e2e aws |
/run-e2e aws |
@zroubalik Is something wrong with the e2e tests? I see they failed twice now :( |
yeah, issue on our side, will rerun once it is fixed |
@zroubalik any updates on the e2e testing? |
/run-e2e aws |
Signed-off-by: Maksymilian Boguń <[email protected]>
@JorTurFer I rebased the PR |
/run-e2e aws |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
PTAL @kedacore/keda-core-contributors
Any insight into why it paniced/failed on the amd64 validation? |
@JorTurFer is the validate - amd64 stage failure an issue with the action or an issue with the code changes in this pr? |
I've triggered it again because probably it was a transient error |
@zroubalik @wozniakjan PTAL |
That's a good idea tbh. Could you update the PR @maxbog ? |
@JorTurFer @ThaSami
Please let me know, if, after taking the above into account, you still want to update the PR and add the region to the |
Exactly - that's what sparked this idea for me. Since credentials are part of identity, obtaining them in the AWS SDK requires specifying a region as STS endpoints are regional.
would like to hear from @JorTurFer |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I like the proposal from @ThaSami
Me too :). About passing the value, I'd say that Metadata |
Ok then, I'll make the change |
One more question: keda/pkg/scalers/aws/aws_common.go Lines 42 to 45 in 68b6ca8
|
# Conflicts: # CHANGELOG.md
Head branch was pushed to by a user without write access
f9428d5
to
1fe7209
Compare
yeah, makes sense! |
1fe7209
to
7597f80
Compare
@JorTurFer @ThaSami please take another look |
Unit test are failing, could you take a look? |
7597f80
to
dc06dde
Compare
The failing tests are for prometheus scaler, and the error message is: "HTTP transport must be Google OAuth2" |
Prometheus scaler uses multiple auth providers, maybe the region change of the latest commit has had a side effect here: keda/pkg/scalers/prometheus_scaler.go Lines 96 to 128 in 68b6ca8
In any case, I've triggered the tests again |
Most probably it's returning an error here: keda/pkg/scalers/prometheus_scaler.go Lines 119 to 123 in 68b6ca8
An error in that line will make fail the test although is GCP because it returns error and not the GCP transport |
Signed-off-by: Maksymilian Boguń <[email protected]>
dc06dde
to
1e6115b
Compare
Unit tests are passing now |
Signed-off-by: Maksymilian Boguń <[email protected]>
675b2dd
to
d536acb
Compare
/run-e2e aws |
Signed-off-by: Maksymilian Boguń <[email protected]>
Can we merge the PR? I'd rather not be stuck in the conflict -> merge -> e2e test -> conflict death spiral ;) |
it seems e2e tests got stuck again? otherwise can you merge this pr @zroubalik, please? |
The PR adds the AWS region to the key used by the AWS config cache
Checklist
Fixes #6128