Skip to content

Commit e401591

Browse files
authoredJul 16, 2024··
fix(postgresql): no valid backups for read replica (#791)
1 parent e29c3f5 commit e401591

File tree

4 files changed

+11
-3
lines changed

4 files changed

+11
-3
lines changed
 

‎.github/workflows/tests.yml

+1
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,7 @@ jobs:
4040
needs: [setup_aiven_project_suffix, find_tests]
4141
runs-on: ubuntu-latest
4242
strategy:
43+
fail-fast: false
4344
max-parallel: 5
4445
matrix:
4546
name: ${{ fromJson(needs.find_tests.outputs.matrix) }}

‎CHANGELOG.md

+3-2
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,9 @@
22

33
## [MAJOR.MINOR.PATCH] - YYYY-MM-DD
44

5+
- Fix `PostgreSQL`: wait for a valid backup to create read replica
6+
- Fix `ClickhouseGrant`: grant privileges for an unknown table (Clickhouse can do that)
7+
- Fix `ClickhouseGrant`: track the state to revoke only known privileges
58
- Add `Cassandra` field `userConfig.cassandra.read_request_timeout_in_ms`, type `integer`: How long the
69
coordinator waits for read operations to complete before timing it out
710
- Add `Cassandra` field `userConfig.cassandra.write_request_timeout_in_ms`, type `integer`: How long
@@ -22,8 +25,6 @@
2225
- Fix `ClickhouseGrant` invalid remote and local privileges comparison
2326
- Fix `ClickhouseGrant`: doesn't escape role name to grant
2427
- Fix `ClickhouseUser`: password was reset due to an incorrect processing cycle
25-
- Fix `ClickhouseGrant`: grant privileges for an unknown table (Clickhouse can do that)
26-
- Fix `ClickhouseGrant`: track the state to revoke only known privileges
2728

2829
## v0.22.0 - 2024-07-02
2930

‎controllers/generic_service_handler.go

+6
Original file line numberDiff line numberDiff line change
@@ -236,6 +236,12 @@ func (h *genericServiceHandler) checkPreconditions(ctx context.Context, avn *aiv
236236
if !r || err != nil {
237237
return false, err
238238
}
239+
240+
// Covers error "No valid backups for service"
241+
list, err := avnGen.ServiceBackupsGet(ctx, spec.Project, s.SourceServiceName)
242+
if len(list) == 0 || err != nil {
243+
return false, err
244+
}
239245
}
240246
}
241247
return true, nil

‎tests/kafkschemaregistryaacl_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ func TestKafkaSchemaRegistryACL(t *testing.T) {
101101
require.NoError(t, err)
102102
assert.Equal(t, kafkaAvn.ServiceName, kafka.GetName())
103103
assert.Equal(t, serviceRunningState, kafka.Status.State)
104-
assert.EqualValues(t, kafkaAvn.State, kafka.Status.State)
104+
assert.Contains(t, serviceRunningStatesAiven, string(kafkaAvn.State))
105105
assert.Equal(t, kafkaAvn.Plan, kafka.Spec.Plan)
106106
assert.Equal(t, kafkaAvn.CloudName, kafka.Spec.CloudName)
107107

0 commit comments

Comments
 (0)
Please sign in to comment.