-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support unsafeSsl
for RabbitMQ scaler
#4571
Support unsafeSsl
for RabbitMQ scaler
#4571
Conversation
Looking good but the HTTP is missing, the line 127 generated the httpClient: s.httpClient = kedautil.CreateHTTPClient(meta.timeout, false) That |
078c3e3
to
3210bc1
Compare
Thanks @JorTurFer for the pointer! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looking good :)
Could you update the changelog please?
/run-e2e rabbit |
Signed-off-by: dttung2905 <[email protected]>
Signed-off-by: dttung2905 <[email protected]>
Signed-off-by: dttung2905 <[email protected]>
Signed-off-by: dttung2905 <[email protected]>
Signed-off-by: dttung2905 <[email protected]>
Signed-off-by: dttung2905 <[email protected]>
d680bb4
to
b170615
Compare
unsafeSsl
for RabbitMQ scalerunsafeSsl
for RabbitMQ scaler
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM! Thanks for the improvement
/run-e2e rabbit |
Hi team,
This PR add support for
unsafeSsl
as currently the default option for RabbitMQ scaler is hard coded to beunsafeSsl
= false. This PR will make the RabbitMQ consistent with other scalersI also do minor refactoring of the method
parseRabbitMQMetadata
due to high cyclomatic complexity flagged in the CI check linkChecklist
unsafeSsl
feature in RabbitMQ keda-docs#1136Fixes #4448