Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Identity] [Hotfix] 1.4.0 increased the IMDS MSI default timeout #16055

Merged

Conversation

sadasant
Copy link
Contributor

@sadasant sadasant commented Jun 28, 2021

Includes an update of core-http on Identity to v2. I will update this after core-http is released with the 305 fix.

After this is merged, I will rename the base branch hotfix/identity_1.3.1 to hotfix/identity_1.4.0 before triggering the release build.

@sadasant sadasant self-assigned this Jun 28, 2021
@ghost ghost added the Azure.Identity label Jun 28, 2021
@@ -80,7 +80,7 @@
"homepage": "https://github.com/Azure/azure-sdk-for-js/tree/master/sdk/identity/identity/README.md",
"sideEffects": false,
"dependencies": {
"@azure/core-http": "^1.2.4",
"@azure/core-http": "^2.0.0",
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do you have to update the version of core-http? Seems like an unnecessary risk for a hotfix unless we have to take it

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think its because he needs the fix in #15906

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

On that note, should this hotfix branch take the update to core-tracing as well?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nah, we can do that when core-tracing goes GA.

Copy link
Member

@maorleger maorleger Jun 29, 2021

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I still don't think this is the right thing to do. I worry about surprising someone with a whole host of changes unintentionally especially a major version change in core-http. Instead (and I know it's more painful, so sorry!), I would recommend releasing a hotfix to core-http with just the fix you need, then using that as the core-http version to release the hotfix to identity

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

After investigating about the new types, doing some simple tests and discussing this with @chradek , it seems safe for us to upgrade to core-http 2.0.0 on this Identity release.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The reason I believe it is safe is because

  • @azure/identity only re-exports PipelineOptions for @azure/core-http
  • PipelineOptions doesn't include any enums (doesn't appear to include them directly or transitively)
  • Other than transpiling core-http to ES2017, there weren't any breaking changes to the interfaces.
  • We're bumping identity to 1.4.0 because we're dropping node 8 support, which means ES2017 should be safe to use.

@maorleger is there anything in particular that worries you? Any testing we could do to assuage your concerns?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm fine with going to 1.4.0 with this, but was concerned when going to 1.3.1 👍 thanks for verifying the changes are safe

const { span, updatedOptions: newOptions } = createSpan(
"IdentityClient-refreshAccessToken",
options
);
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I ran rushx format and it changed a bunch of files. I rather have these formatting changes than not have them. It will make it easier to do further hotfixes if necessary.

name: "/tenant/oauth2/v2.0/token"
}
]
children: []
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Core-http changes do change the tracing contexts. I am not too worried about this for this hotfix.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is that because of core-http or because the core-tracing used ends up being updated?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I’ve updated Identity to 1.0.0-preview.12 as part of this PR now! Let me know what you think 🌞

@sadasant sadasant marked this pull request as ready for review July 8, 2021 22:20
@sadasant sadasant changed the title [Identity] [Hotfix] 1.3.1 increased the IMDS MSI default timeout [Identity] [Hotfix] 1.4.0 increased the IMDS MSI default timeout Jul 8, 2021
Copy link
Contributor

@chradek chradek left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good to me!

common/config/rush/common-versions.json Outdated Show resolved Hide resolved
@sadasant sadasant merged commit a62797f into Azure:hotfix/identity_1.3.1 Jul 9, 2021
@sadasant sadasant deleted the hotfix/identity_1.3.1-changes branch July 9, 2021 15:57
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants