-
Notifications
You must be signed in to change notification settings - Fork 56
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: Add retry loop for secret client if initial token is invalid #60
Conversation
With the recent change of #58 the proxy-setup has same issue as described here. This will be a pre-required PR for proxy-setup to move forward. |
@AnthonyMBonafide are you open to help review this? |
Yes, l will take a look |
Codecov Report
@@ Coverage Diff @@
## master #60 +/- ##
==========================================
+ Coverage 55.76% 56.18% +0.41%
==========================================
Files 8 9 +1
Lines 208 493 +285
==========================================
+ Hits 116 277 +161
- Misses 91 206 +115
- Partials 1 10 +9
Continue to review full report at Codecov.
|
Complete rewrite to use the startupTimer instead. Please re-review. |
Address a race condition where the container may be started before security-secrets-setup has created the secrets token for the service. Signed-off-by: Bryon Nevis <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM! I verified these changes with unit tests.
Address a race condition where the container may be started before
security-secrets-setup has created the secrets token for the service.
Signed-off-by: Bryon Nevis [email protected]
PR Checklist
Please check if your PR fulfills the following requirements:
PR Type
What kind of change does this PR introduce?
What is the current behavior?
When user performs
A number of core services such as support-logging, core-metadata, core-data, and others will fail to start with a message:
Issue Number:
What is the new behavior?
Expect to see messages similar to the following which shows that retries are happening. You will either get secrets-token.json doesn't exist, OR will fail to lookup token, depending on whether or not /tmp/edgex/secrets is empty.
Does this PR introduce a breaking change?
Are there any specific instructions or things that should be known prior to reviewing?
In order to test, modify go.mod in edgex-go
and rebuild docker containers. Update developer scripts to refer to newly built containers. Bring up compose stack as above.
Other information