Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rabbitmq scaler: Allow providing separate paremeters for user and password #2513

Closed
iordaniordanov opened this issue Jan 24, 2022 · 16 comments · Fixed by #6180
Closed

Rabbitmq scaler: Allow providing separate paremeters for user and password #2513

iordaniordanov opened this issue Jan 24, 2022 · 16 comments · Fixed by #6180
Labels
feature-request All issues for new features that have not been committed to good first issue Good for newcomers help wanted Looking for support from community stale-bot-ignore All issues that should not be automatically closed by our stale bot

Comments

@iordaniordanov
Copy link

iordaniordanov commented Jan 24, 2022

Proposal

I would like to be able to provide username/password as separate parameters for the RabbitMQ scaler, in order to be able to get host from Environment variable and username/password from separate environment variables/secrets

Use-Case

We are using single RabbitMQ deployment for multiple applications which have separate secrets containing their credentials. Since credentials are generated by helm templates we have no way to know what they will be in advance. Adding to this we are using podpreset to inject the environment variables containing the username and password, which means we cannot combine everything in 1 variable using the pod manifest, because the username/password variables are injected at the end of the variables array. Having the option to reference separate secret/environment variables from which username and password to be taken is crucial for such deployments.

Anything else?

No response

@iordaniordanov iordaniordanov added feature-request All issues for new features that have not been committed to needs-discussion labels Jan 24, 2022
@wasabii
Copy link

wasabii commented Mar 17, 2022

I strongly second this. Another obvious use case is using the Rabbit MQ Message Topology Operator to generate users. This operator produces secrets with separate username, password data. Additionally, you need to fetch the host, amqpPort, vhost, etc from another secret produced by the Rabbit MQ Cluster Operator.

Providing each of these as separate parameters to the TriggerAuthentication would allow us to simply point to the existing secrets, instead of having to devise a crazy way to combine them all into a URL on yet another secret.

@zroubalik
Copy link
Member

I think this makes sense, WDYT @JorTurFer ?

@JorTurFer
Copy link
Member

yes, IMO it totally makes sense.
Are you willing to contribute with this @wasabii @iordaniordanov ?

@stale
Copy link

stale bot commented May 16, 2022

This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 7 days if no further activity occurs. Thank you for your contributions.

@stale stale bot added the stale All issues that are marked as stale due to inactivity label May 16, 2022
@stale
Copy link

stale bot commented May 23, 2022

This issue has been automatically closed due to inactivity.

@stale stale bot closed this as completed May 23, 2022
@JorTurFer JorTurFer added the stale-bot-ignore All issues that should not be automatically closed by our stale bot label May 23, 2022
@JorTurFer JorTurFer reopened this May 23, 2022
@stale stale bot removed the stale All issues that are marked as stale due to inactivity label May 23, 2022
@xoanmm
Copy link
Contributor

xoanmm commented May 23, 2022

I would like to tackle this issue

@JorTurFer
Copy link
Member

it's yours

@b1czu
Copy link

b1czu commented Mar 9, 2023

What about this feature? Any ETA? We have deployment to multiple namespaces using kustomize and without ability of providing each of these as separate parameters to the TriggerAuthentication we can't simply point to the existing secrets generated by RabbitMQ Cluster Operator and/or RabbitMQ Messaging Topology Operator. Using KEDA's RabbitMQ Scaler's hostFromEnv with something like this inside example-deployment definition:

envFrom:
  - prefix: RABBITMQ_
    secretRef:
      name: example-deployment-default-user
env:
  - name: RABBITMQ_ConnectionString
    value: amqp://$(RABBITMQ_username):$(RABBITMQ_password)@$(RABBITMQ_host):$(RABBITMQ_port)

also does not work because keda sees these variables before expansion, although it works inside example-deployment's container just fine.

@JorTurFer
Copy link
Member

@xoanmm

@xoanmm
Copy link
Contributor

xoanmm commented Mar 13, 2023

@b1czu I'm working in the PR associated, I think that I'll be able to finish in the following weeks, I'm having a hard time since I haven't programmed anything in go for a few weeks

@zargarf
Copy link

zargarf commented Aug 30, 2023

Is there an approx timeline on this feature? This is one that's important to us too

@JorTurFer
Copy link
Member

AFAIK, the PR was abandoned, so you can open another PR adding the support if you are willing to contribute @zargarf

@cecilphillip
Copy link

This feature would be particularly useful when using the secrets generated from the RabbitMQ Operator

@JorTurFer
Copy link
Member

@xoanmm , are you still interested on contributing with this? If you cannot any other folk can tackle it

@hkhairy
Copy link

hkhairy commented Jul 5, 2024

Any update regarding this feature? We're facing a similar situation, and it would be great to have the username and password as separate fields.

@JorTurFer
Copy link
Member

There isn't any news AFAIK. Are you willing to continue with the feature?

@JorTurFer JorTurFer added help wanted Looking for support from community good first issue Good for newcomers and removed needs-discussion labels Jul 22, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature-request All issues for new features that have not been committed to good first issue Good for newcomers help wanted Looking for support from community stale-bot-ignore All issues that should not be automatically closed by our stale bot
Projects
Status: Ready To Ship
Development

Successfully merging a pull request may close this issue.

9 participants