-
Notifications
You must be signed in to change notification settings - Fork 544
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fixed Duplicate Client-token issue #1170
Conversation
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: mskanth972 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
The Kubernetes project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
@k8s-triage-robot: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@bittracer: You can't reopen an issue/PR unless you authored it or you are a collaborator. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Is this no longer required? |
Hi.
Client-1 is created ok, but when adding client-2, we start getting the errors mentioned above. If this is the intended behaviour, this means that the potential for conflict is huge, as any cluster can "block" any other cluster in same region that uses the If this was not intended behaviour, could you please let us know when this could be merged? |
Hi @joaocc I can update the doc accordingly for now, you can turn off the parameter if there is no special reason for turning it on. |
Hi. Thanks. We already removed/disabled the param, as the understanding was incorrect and it is not needed. I tried to bump this so that all the work already done could be submitted and save someone else the headache :) Thanks! |
2f1d1cb
to
40b443f
Compare
40b443f
to
2ed7ce9
Compare
/test pull-aws-efs-csi-driver-unit |
1 similar comment
/test pull-aws-efs-csi-driver-unit |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
@k8s-triage-robot: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Is this a bug fix or adding new feature?
Currently the client-token of an EFS Access Point is unique only to region and not to a specific File system. So when using
reuseAccessPoint
feature there maybe a chance that two different File systems can use the same PVC name with this parameter enabled and which can lead toErrorCode: "AccessPointAlreadyExists"
. To overcome this I just added the FS-ID also to the hashed value along with PVC name.What is this PR about? / Why do we need it?
What testing is done?
Already have the existing test cases around the hash