-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Talaria panic to auth Azure when runs on AWS #88
Comments
Could you share the stack trace because in theory |
Here is the log. @ocassetti
|
It is trying to hit Azure instance metadata from AWS? Looks like this cannot work |
@kelindar Yes, it can't work, of course. Therefore we should skip this logic and use ENV setting as auth for Talaria not on Azure. |
But |
@ocassetti hi, you can check the implementation of |
Oh I see, then I guess we need to check if the |
Good idea, better than skipping on other cloud services. |
Talaria panic to auth Azure when runs on AWS
Background
169.254.169.254
is a magic IP(Link-local address) used by most cloud services (AWS & Azure) for metadata.This line of code introduced in the latest MR will set the URL
http://169.254.169.254/metadata/identity/oauth2/token
to get the metadata and send HTTP requests when refreshing. The Azure library did this.However, when you run the Talaria on AWS, there is no such URL/info provided by it; it will be a timeout as there is no route.
Propose
Skip the auth here when Talaria is not running on Azure; directly uses the Env to auth.
The text was updated successfully, but these errors were encountered: