Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Don't panic when HashiCorp Vault path doesn't exist #1867

Merged
merged 2 commits into from
Jun 7, 2021

Conversation

zroubalik
Copy link
Member

Signed-off-by: Zbynek Roubalik zroubali@redhat.com

If HashiCorp Vault is being used and the input path is non existent, the library for reading the secret doesn't return error. In this case we need to handle this case and return error, instead of panic caused by accessing non existent secret.

Checklist

  • Commits are signed with Developer Certificate of Origin (DCO - learn more)
  • Changelog has been updated

Fixes #1864

Signed-off-by: Zbynek Roubalik <zroubali@redhat.com>
Signed-off-by: Zbynek Roubalik <zroubali@redhat.com>
@zroubalik zroubalik changed the title don't panic when HC Vault path doesn't exist Don't panic when HashiCorp Vault path doesn't exist Jun 7, 2021
@zroubalik zroubalik merged commit b68db58 into kedacore:main Jun 7, 2021
@zroubalik zroubalik added this to the v2.4.0 milestone Jul 14, 2021
nilayasiktoprak pushed a commit to nilayasiktoprak/keda that referenced this pull request Oct 23, 2021
Signed-off-by: Zbynek Roubalik <zroubali@redhat.com>
Signed-off-by: nilayasiktoprak <nilayasiktoprak@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

azure-servicebus scaler with Hashicorp Vault - keda-operator crashes when secret path is non-exsistent
2 participants