-
Notifications
You must be signed in to change notification settings - Fork 578
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
🐛 Create a aws.Config
with region to be able to work different AWS partition (like gov cloud or china AWS partition)
#4860
Conversation
Hi @calvix. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/ok-to-test |
e318bdb
to
a617ca1
Compare
@calvix: The following test failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
@@ -154,7 +156,7 @@ func (p *AWSRolePrincipalTypeProvider) Name() string { | |||
// Retrieve returns the credential values for the AWSRolePrincipalTypeProvider. | |||
func (p *AWSRolePrincipalTypeProvider) Retrieve() (credentials.Value, error) { | |||
if p.credentials == nil || p.IsExpired() { | |||
awsConfig := aws.NewConfig() | |||
awsConfig := aws.NewConfig().WithRegion(p.region) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this line is the core change, the rest is just wiring the region
value to be able to use it here
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/approve
/assign @nrb
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: vincepri The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/lgtm |
What type of PR is this?
/kind bug
What this PR does / why we need it:
When creating
aws.Config
without specifying a region the AWS SDK will by default call AWS commercial partition (known as justaws
) .If you wanna use a different AWS partition (https://docs.aws.amazon.com/whitepapers/latest/aws-fault-isolation-boundaries/partitions.html and https://docs.aws.amazon.com/IAM/latest/UserGuide/reference-arns.html ) like for example
aws-cn
and provide static access keys to the user that is inaws-cn
partition then the controller fails with error since AWS SDK tries to validate the access keys inaws
commercial partition.When the
aws.Config
is created with the proper region then the AWS SDK will connect to the right aws partition and correctly check for the validity of the static access key. And this is exactly what this PR fixesRelease note: