-
Notifications
You must be signed in to change notification settings - Fork 3.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(eks): changing the subnets or securityGroupIds order causes an error #24163
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The pull request linter has failed. See the aws-cdk-automation comment below for failure reasons. If you believe this pull request should receive an exemption, please comment and provide a justification.
A comment requesting an exemption should contain the text Exemption Request
. Additionally, if clarification is needed add Clarification Request
to a comment.
Clarification Request How can I perform integration test for that change? |
Hi, have you looked at the information present in https://github.com/aws/aws-cdk/blob/main/INTEGRATION_TESTS.md already? |
@Naumel Any ideas? |
Ah, actually this is a really good question because we don't have a function specifically for update operations. We can, however, edit one of these fields on an existing test because then it deploys the original template first, and then performs the update on it as long as you use the flag |
Removing the label for now but please feel free to add it back (using the same phrase in a comment) if you need more information or further clarification. |
✅ Updated pull request passes all PRLinter validations. Dissmissing previous PRLinter review.
@TheRealAmazonKendra can you please review it now? |
Please make sure that your PR body describes the problem the PR is solving, and the design approach and alternatives considered. Explain why the PR solves the problem. A link to an issue is helpful, but does not replace an explanation of your thought process (See Contributing Guide, Pull Requests) |
Here is my concern about this change, and perhaps you can provide clarity on whether or not this will be a problem, by using |
It won't cause an existing cluster to be failed and I'll explain why. The change is analyzed by a lambda function that returns for each component if it changed or not. The expected behavior is not to consider the order of the list but the Subnets IDs only. So if we compare the sorted subnets that passed to the function, new ones and old we will get the same object if the new subnets IDs are not changed. |
Oh, wonderful! Thank you for clarifying! |
@Mergifyio update |
❌ Base branch update has failedrefusing to allow a GitHub App to create or update workflow |
AWS CodeBuild CI Report
Powered by github-codebuild-logs, available on the AWS Serverless Application Repository |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Approving as long as the build succeeds.
Oh, it already did. Great! |
Thank you for contributing! Your pull request will be updated from main and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork). |
…ror (#24163) When the subnet list is passed to the EKS Cluster construct in a different order, an update is triggered to the EKS cluster. The update process fails as it falsely identifies a change for an unsupported update, although the list has the same items. The solution is to change the analyzeUpdate function to return `updateVpc: false` if only the securityGroups/subnetsId order has been changed. Fixes: [#24162](#24162) --- By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license
…ror (aws#24163) When the subnet list is passed to the EKS Cluster construct in a different order, an update is triggered to the EKS cluster. The update process fails as it falsely identifies a change for an unsupported update, although the list has the same items. The solution is to change the analyzeUpdate function to return `updateVpc: false` if only the securityGroups/subnetsId order has been changed. Fixes: [aws#24162](aws#24162) --- By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license
…ror (aws#24163) When the subnet list is passed to the EKS Cluster construct in a different order, an update is triggered to the EKS cluster. The update process fails as it falsely identifies a change for an unsupported update, although the list has the same items. The solution is to change the analyzeUpdate function to return `updateVpc: false` if only the securityGroups/subnetsId order has been changed. Fixes: [aws#24162](aws#24162) --- By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license
…ror (aws#24163) When the subnet list is passed to the EKS Cluster construct in a different order, an update is triggered to the EKS cluster. The update process fails as it falsely identifies a change for an unsupported update, although the list has the same items. The solution is to change the analyzeUpdate function to return `updateVpc: false` if only the securityGroups/subnetsId order has been changed. Fixes: [aws#24162](aws#24162) --- By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license
When the subnet list is passed to the EKS Cluster construct in a different order, an update is triggered to the EKS cluster.
The update process fails as it falsely identifies a change for an unsupported update, although the list has the same items.
The solution is to change the analyzeUpdate function to return
updateVpc: false
if only the securityGroups/subnetsId order has been changed.Fixes: #24162
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license