Skip to content

Add SKIP_CHECK_FORMAT environment variable to skip check_format when …#455

Merged
mattklein123 merged 1 commit intoenvoyproxy:masterfrom
htuch:skip-check-format
Feb 9, 2017
Merged

Add SKIP_CHECK_FORMAT environment variable to skip check_format when …#455
mattklein123 merged 1 commit intoenvoyproxy:masterfrom
htuch:skip-check-format

Conversation

@htuch
Copy link
Copy Markdown
Member

@htuch htuch commented Feb 9, 2017

…iterating locally.

It's somewhat distracting to be forced to fix_format while debugging.

…iterating locally.

It's somewhat distracting to be forced to fix_format while debugging.
@mattklein123 mattklein123 merged commit 3bf1d94 into envoyproxy:master Feb 9, 2017
@htuch htuch deleted the skip-check-format branch February 10, 2017 19:07
rshriram pushed a commit to rshriram/envoy that referenced this pull request Oct 30, 2018
… class (envoyproxy#455)

* create EVP_MD object in JwtVerifier constructor

* split verification function into another class

* update merged part according to this PR

* add TODO comment
lizan pushed a commit to lizan/envoy that referenced this pull request Apr 24, 2020
Signed-off-by: Pengyuan Bian <bianpengyuan@google.com>
bianpengyuan added a commit to bianpengyuan/envoy that referenced this pull request May 15, 2020
Signed-off-by: Pengyuan Bian <bianpengyuan@google.com>
istio-testing pushed a commit to istio/envoy that referenced this pull request May 18, 2020
Signed-off-by: Pengyuan Bian <bianpengyuan@google.com>
mathetake pushed a commit that referenced this pull request Mar 3, 2026
**Commit Message**

Update `Rotate` to return the expiration time in addition to the error.
This will allow us to get the expiration time without having to make a
`GET` API request to Kubernetes.



**Related Issues/PRs (if applicable)**


https://github.com/envoyproxy/ai-gateway/blob/8f38c672ee11e6e724fff7b1e430979417fd3ce6/internal/controller/backend_security_policy.go#L106-L108

```
2025-03-02T20:12:23Z    INFO    controller.backend-security-policy      successfully rotated credentials for credentials in namespace default of auth type AWSCredentials, renewing in -0.009733 minutes
```

The requeue time after rotating a set of credentials (AWS in this case)
returns a negative number of minutes occasionally. It requires a manual
action/global sync to restart the rotation logic.

Upon further investigation, the issue found lies with
`rotator.GetPreRotationTime` returning the incorrect time.
GetPreRotation gets the expiration time from the secret's annotation,
and the assumption is it's getting a cached previous secret's annotation
instead of the new expiration time.


https://github.com/envoyproxy/ai-gateway/blob/8f38c672ee11e6e724fff7b1e430979417fd3ce6/internal/controller/backend_security_policy.go#L143-L147

---------

Signed-off-by: Aaron Choo <achoo30@bloomberg.net>
Co-authored-by: Dan Sun <dsun20@bloomberg.net>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants