Skip to content

Commit

Permalink
Set fake AWS credentials on controller to workaround aws-sdk bug
Browse files Browse the repository at this point in the history
Several issues have now reared their head which are directly caused
by an update to the aws-sdk. The update results in extremely long
delays in the execution of tasks after the Pipelines controller is
first deployed in a cluster. The aws-sdk is initialized through
a transitive dependency that pipelines pulls in via k8schain.

Here are the recent issues directly related to this aws-sdk bug:

- #3627 (Since December!)
- #4084

One quick way to work around this problem is to set fake AWS
credentials in the environment of the deployed controller. This
apparently causes the aws-sdk to skip whatever process it has
introduced that causes massive delays in execution. So this commit
does exactly that - set fake aws creds in the deployments env vars.

This is an unfortunate hack to try and mitigate the problem until
a better solution presents itself.
  • Loading branch information
Scott authored and tekton-robot committed Jul 12, 2021
1 parent 5a4d1f9 commit 49a7fa2
Showing 1 changed file with 10 additions and 0 deletions.
10 changes: 10 additions & 0 deletions config/controller.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -93,6 +93,16 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
# These phony AWS credentials are here to work around a bug in the aws go sdk
# that causes extremely long delays in the execution of tasks after the initial
# deployment of the Tekton Pipelines controller.
- name: AWS_ACCESS_KEY_ID
value: foobarbaz
- name: AWS_SECRET_ACCESS_KEY
value: foobarbaz
- name: AWS_DEFAULT_REGION
value: foobarbaz

# If you are changing these names, you will also need to update
# the controller's Role in 200-role.yaml to include the new
# values in the "configmaps" "get" rule.
Expand Down

0 comments on commit 49a7fa2

Please sign in to comment.