Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vendor aws sdk in cloudprovider #4950

Merged

Conversation

AustinSiu
Copy link
Contributor

Which component this PR applies to?

Cluster Autoscaler

What type of PR is this?

/kind feature
/kind api-change

What this PR does / why we need it:

To get around issues with updating the version of Cluster Autoscaler's direct dependency on aws-sdk-go, this PR adds a copy of the aws-sdk-go at a specific newer version within the AWS cloudprovider.

Which issue(s) this PR fixes:

Unblocks several PRs: #4424 (comment) and #4588

Special notes for your reviewer:

Does this PR introduce a user-facing change?

NONE

Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.:


@k8s-ci-robot k8s-ci-robot added kind/feature Categorizes issue or PR as related to a new feature. kind/api-change Categorizes issue or PR as related to adding, removing, or otherwise changing an API cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. labels Jun 6, 2022
@AustinSiu
Copy link
Contributor Author

/assign @gjtempleton who has full surrounding context

@k8s-triage-robot
Copy link

This PR may require API review.

If so, when the changes are ready, complete the pre-review checklist and request an API review.

Status of requested reviews is tracked in the API Review project.

@jaypipes
Copy link
Contributor

/approve

@gjtempleton this is a huge PR because it replaces the vendored aws-sdk-go package, but other than that doesn't do anything functional. Can we send this along?

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jun 28, 2022
@gjtempleton
Copy link
Member

@AustinSiu Sorry for the delay, now getting round to this.

You'll need to exclude the newly vendored package from the verification scripts to pass the failing test. You can follow the approach taken by this commit.

@AustinSiu AustinSiu force-pushed the vendor-aws-sdk-in-cloudprovider branch from e80f143 to c6a74ed Compare July 6, 2022 04:37
@gjtempleton
Copy link
Member

A couple of notes/queries/requests before this looks good to merge:

  • Do we need some instructions for those who might want/need to update the vendored code in the future given it's not as simple as just copying the SDK code in?
  • Could you squash the commits down a bit before merge? I'm thinking something around the 4 commits mark, though if you have. an alternative suggestion, more than happy to listen:
    • Initial vendoring
    • Changes made to the vendored code to make it work
    • Changes to the core go.mod etc.
    • Changes to the verify scripts

@AustinSiu AustinSiu force-pushed the vendor-aws-sdk-in-cloudprovider branch from 4c04202 to aac78b6 Compare July 12, 2022 23:05
@AustinSiu
Copy link
Contributor Author

AustinSiu commented Jul 12, 2022

A couple of notes/queries/requests before this looks good to merge:

  • Do we need some instructions for those who might want/need to update the vendored code in the future given it's not as simple as just copying the SDK code in?

  • Could you squash the commits down a bit before merge? I'm thinking something around the 4 commits mark, though if you have. an alternative suggestion, more than happy to listen:

    • Initial vendoring
    • Changes made to the vendored code to make it work
    • Changes to the core go.mod etc.
    • Changes to the verify scripts

@gjtempleton Makes sense, I've cleaned up the commits and added some instructions around the vendored SDK. Please let me know if there are any other instructions I should add, etc. Thanks!

@gjtempleton
Copy link
Member

Nope, that looks good to go, thanks for your persistence with this!

/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Jul 15, 2022
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: AustinSiu, gjtempleton, jaypipes

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot merged commit 68e4f4a into kubernetes:master Jul 15, 2022
k8s-ci-robot added a commit that referenced this pull request Sep 5, 2022
…#4424-#4588-upstream-cluster-autoscaler-release-1.24

Automated cherry pick of #4950: Initial vendoring
#4424: feat(aws): reduce auto-discovery API calls
#4588: Support attribute-based instance selection for AWS
navinjoy pushed a commit to navinjoy/autoscaler that referenced this pull request Oct 26, 2022
…loudprovider

Vendor aws sdk in cloudprovider
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. area/cluster-autoscaler cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/api-change Categorizes issue or PR as related to adding, removing, or otherwise changing an API kind/feature Categorizes issue or PR as related to a new feature. lgtm "Looks good to me", indicates that a PR is ready to be merged. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants