-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Updated aws-sdk-go to 1.23.18 #2323
Conversation
Welcome @alexpekurovsky! |
Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please follow instructions at https://git.k8s.io/community/CLA.md#the-contributor-license-agreement to sign the CLA. It may take a couple minutes for the CLA signature to be fully registered; after that, please reply here with a new comment and we'll verify. Thanks.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
1a70102
to
af83150
Compare
/assign @piosz |
Could it also be backported? EKS currently is 1.14, so even releasing it to 1.16/1.17 won't help with EKS |
I would also love to have this backported. The alternative would be to wait for Kubernetes 1.16 on EKS or everyone needs to build their own image with this fix included to get the advantage of IAM roles for serviceaccounts. |
The contents of this PR are unexpected. Why the only file changed in vendor is Btw. Did you run the
|
The point of upgrading of AWS SDK is to get support of new way of getting IAM Roles credentials (without reading them from metadata). I just did search&replace of aws-sdk-go version. If something is needed additionally - please process. Identical PR for external-dns: kubernetes-sigs/external-dns#1182 |
@alexpekurovsky The external-dns change was only to #2305 includes an updated version of the AWS SDK which will support this |
@micahhausler, I see. However #2305 upgrades aws-sdk-go to 1.23.12, but for WebIdentity at least 1.23.13 is required |
af83150
to
bd61a0d
Compare
@losipiuk, PR updated using |
Looks fine to me. |
One thing @alexpekurovsky . If you could extract change to go.mod-extra to separate commit, it would be easier to track changes in git history. |
@losipiuk Do you prefer change to |
Before :) |
…7f76dba706ed1e7dc4b4c3a53f63b0b7544a (708a7f76dba706ed1e7dc4b4c3a53f63b0b7544a)
bd61a0d
to
e60c446
Compare
@losipiuk Done |
That version is only for the front end model change. The credential provider SDK changes came in 1.23.2 and 1.21.0 That said, this PR doesn’t hurt anything, but it also doesn’t add anything required. |
Thanks @micahhausler for details. @alexpekurovsky What you ask has been supported in the version. I don't see downside to merge this one. Always good to get higher version. :D /lgtm |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: losipiuk The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@micahhausler I noticed you're working in EKS team, so can we update documentation on AWS website, that states minimum version of Go to be 1.23.13 to support Web Identity? @losipiuk Can this PR be cherry-picked to 1.13+ releases? I've checked 1.14 release is based on aws 1.16.26, so it shouldn't support Web Identity according to information from @micahhausler |
I am not big fan of the idea. This is not a bugfix. And also it cannot be cherry picked directly as all the release branches have very different set of libraries in vendor folder (each matching different k8s minor version). Revendoring 1.14 and and below is painful and risky process (see https://github.com/kubernetes/autoscaler/blob/cluster-autoscaler-release-1.14/cluster-autoscaler/FAQ.md#how-can-i-update-ca-dependencies-particularly-k8siokubernetes) and doing that for patch release feels to me as bad idea. |
Is it not possible to revendor only the AWS SDK for 1.14? After all, updating the AWS SDK to support this feature is pointless if EKS does not support the version in question. It may be months before EKS catches up to the k8s version, and it strikes me as very bad if SDKs for a cloud provider cannot be updated at a cadence that matches the cloud provider instead of mainline Kubernetes. |
@losipiuk I think that maintaining the auto-scaler 1.14 branch is a necessary consequence of not supporting backward compatibility in the cluster autoscaler. If each cluster autoscaler release supported the current and previous couple k8s releases, then I see your point about not back-porting features. But since releases are 1:1, old cluster autoscaler releases need to be maintained and supported until that release of k8s is EOL. For 1.14 on AWS/EKS, EOL is still 9 months away. And 1.16 won't even be available to deploy on AWS for another ~5 months. https://aws.amazon.com/blogs/compute/updates-to-amazon-eks-version-lifecycle/ |
We mostly follow the OSS k8s release cycle (which unless something changed) provide patch fixes for 3 most recent releases. We try our best to support a wider set of releases, as we understand that service providers are lagging behind OSS. Yet all that happens within constraints coming from how much resources we can put to maintenance. |
Update the AWS SDK to support Web Identity providers for IAM credentials
More infos here: