Skip to content

Add support for parameter store authentication#7572

Open
stegojulia wants to merge 7 commits intokedacore:mainfrom
stegojulia:paramstore
Open

Add support for parameter store authentication#7572
stegojulia wants to merge 7 commits intokedacore:mainfrom
stegojulia:paramstore

Conversation

@stegojulia
Copy link
Copy Markdown

@stegojulia stegojulia commented Mar 26, 2026

Provide a description of what has been changed

Checklist

  • When introducing a new scaler, I agree with the scaling governance policy
  • I have verified that my change is according to the deprecations & breaking changes policy
  • Tests have been added (if applicable)
  • Ensure make generate-scalers-schema has been run to update any outdated generated files
  • Changelog has been updated and is aligned with our changelog requirements, only when the change impacts end users
  • A PR is opened to update our Helm chart (repo) (if applicable, ie. when deployment manifests are modified)
  • A PR is opened to update the documentation on (repo) (if applicable)
  • Commits are signed with Developer Certificate of Origin (DCO - learn more)

Fixes #6311

Relates to #840 and #1725

@stegojulia stegojulia requested a review from a team as a code owner March 26, 2026 10:01
@github-actions
Copy link
Copy Markdown

Thank you for your contribution! 🙏

Please understand that we will do our best to review your PR and give you feedback as soon as possible, but please bear with us if it takes a little longer as expected.

While you are waiting, make sure to:

  • Add an entry in our changelog in alphabetical order and link related issue
  • Update the documentation, if needed
  • Add unit & e2e tests for your changes
  • GitHub checks are passing
  • Is the DCO check failing? Here is how you can fix DCO issues

Once the initial tests are successful, a KEDA member will ensure that the e2e tests are run. Once the e2e tests have been successfully completed, the PR may be merged at a later date. Please be patient.

Learn more about our contribution guide.

@keda-automation keda-automation requested a review from a team March 26, 2026 10:01
@snyk-io
Copy link
Copy Markdown

snyk-io Bot commented Mar 26, 2026

⚠️ Snyk checks are incomplete.

Status Scan Engine Critical High Medium Low Total (0)
⚠️ Open Source Security 0 0 0 0 See details

💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse.

Copy link
Copy Markdown
Member

@rickbrouwer rickbrouwer left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the PR 🙏🏼

Can you also add a changelog entry for this change?

// +kubebuilder:validation:MinItems=1
Parameters []AwsParameterStoreParameter `json:"parameters"`
// +optional
Credentials *AwsParameterStoreCredentials `json:"credentials"`
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should omitempty appear here too?

Copy link
Copy Markdown
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I believe omitempty isn't needed for pointers, same pattern is used for here

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could you include the line number in the reference, so I can check exactly which one you mean?

Copy link
Copy Markdown
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

// +optional
Credentials *AwsParameterStoreCredentials `json:"credentials"`
// +optional
PodIdentity *AuthPodIdentity `json:"podIdentity"`
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should omitempty appear here too?

Copy link
Copy Markdown
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I believe omitempty isn't needed for pointers, same pattern is used for here

Parameter string `json:"parameter"`
Name string `json:"name"`
// +optional
WithDecryption *bool `json:"withDecryption,omitempty"`
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you add here a comment to clarify what omitting WithDecryption (leaving it nil) means? Users likely need to set this to true to get the plaintext, right?

Copy link
Copy Markdown
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

that's updated

@keda-automation keda-automation requested a review from a team March 31, 2026 12:50
@stegojulia stegojulia force-pushed the paramstore branch 2 times, most recently from 29068c9 to 089c265 Compare March 31, 2026 13:07
@rickbrouwer rickbrouwer added merge-conflict This PR has a merge conflict and removed merge-conflict This PR has a merge conflict labels Apr 9, 2026
@stegojulia stegojulia force-pushed the paramstore branch 2 times, most recently from 548b0de to aca39e8 Compare April 9, 2026 13:00
Signed-off-by: Julia Jablonska <julia.jablonska@zestia.com>
Signed-off-by: Julia Jablonska <julia.jablonska@zestia.com>
Signed-off-by: Julia Jablonska <julia.jablonska@zestia.com>
Signed-off-by: Julia Jablonska <julia.jablonska@zestia.com>
Signed-off-by: Julia Jablonska <julia.jablonska@zestia.com>
Signed-off-by: Julia Jablonska <julia.jablonska@zestia.com>
Signed-off-by: Julia Jablonska <julia.jablonska@zestia.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants